Sample records for computer network defense

  1. Active Computer Network Defense: An Assessment

    DTIC Science & Technology

    2001-04-01

    sufficient base of knowledge in information technology can be assumed to be working on some form of computer network warfare, even if only defensive in...the Defense Information Infrastructure (DII) to attack. Transmission Control Protocol/ Internet Protocol (TCP/IP) networks are inherently resistant to...aims to create this part of information superiority, and computer network defense is one of its fundamental components. Most of these efforts center

  2. A Strategic Approach to Network Defense: Framing the Cloud

    DTIC Science & Technology

    2011-03-10

    accepted network defensive principles, to reduce risks associated with emerging virtualization capabilities and scalability of cloud computing . This expanded...defensive framework can assist enterprise networking and cloud computing architects to better design more secure systems.

  3. Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods, and Results for a User Study

    DTIC Science & Technology

    2016-11-01

    Display Design, Methods , and Results for a User Study by Christopher J Garneau and Robert F Erbacher Approved for public...NOV 2016 US Army Research Laboratory Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods ...January 2013–September 2015 4. TITLE AND SUBTITLE Evaluation of Visualization Tools for Computer Network Defense Analysts: Display Design, Methods

  4. Emerging Roles of Combat Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation

    DTIC Science & Technology

    2011-06-01

    EMERGING ROLES OF COMBAT COMMUNICATION SQUADRONS IN CYBER WARFARE AS RELATED TO COMPUTER NETWORK ATTACK, DEFENSE AND EXPLOITATION GRADUATE RESEARCH...Communication Squadrons in Cyber Warfare as Related to Computer Network Attack, Defense and Exploitation GRADUATE RESEARCH PROJECT Presented to the Faculty...Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Cyber Warfare Michael J. Myers Major, USAF June 2011

  5. Engaging Cyber Communities

    DTIC Science & Technology

    2010-04-01

    technology centric operations such as computer network attack and computer network defense. 3 This leads to the question of whether the US military is... information and infrastructure. For the purpose of military operations, CNO are divided into CNA, CND, and computer network exploitation (CNE) enabling...of a CNA if they take undesirable action,” 21 and from a defensive stance in CND, “providing information about non-military threat to computers in

  6. Developing the Cyber Defenders of Tomorrow with Regional Collegiate Cyber Defense Competitions (CCDC)

    ERIC Educational Resources Information Center

    Carlin, Anna; Manson, Daniel P.; Zhu, Jake

    2010-01-01

    With the projected higher demand for Network Systems Analysts and increasing computer crime, network security specialists are an organization's first line of defense. The principle function of this paper is to provide the evolution of Collegiate Cyber Defense Competitions (CCDC), event planning required, soliciting sponsors, recruiting personnel…

  7. SEADE: Countering the Futility of Network Security

    DTIC Science & Technology

    2015-10-01

    guards, and computer cages) and logical security measures (network firewall and intrusion detection). However, no matter how many layers of network...security built-in and with minimal security dependence on network security appliances (e.g., firewalls ). As Secretary of Defense Ashton Carter...based analysis that assumes nothing bad will happen to applications/data if those defenses prevent malware transactions at the entrance. The

  8. Rationality Validation of a Layered Decision Model for Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wei, Huaqiang; Alves-Foss, James; Zhang, Du

    2007-08-31

    We propose a cost-effective network defense strategy built on three key: three decision layers: security policies, defense strategies, and real-time defense tactics for countering immediate threats. A layered decision model (LDM) can be used to capture this decision process. The LDM helps decision-makers gain insight into the hierarchical relationships among inter-connected entities and decision types, and supports the selection of cost-effective defense mechanisms to safeguard computer networks. To be effective as a business tool, it is first necessary to validate the rationality of model before applying it to real-world business cases. This paper describes our efforts in validating the LDMmore » rationality through simulation.« less

  9. Leveraging Social Networking in the United States Army

    DTIC Science & Technology

    2011-03-16

    ABSTRACT In 2007, the U. S. Department of Defense (DoD) began blocking social networking sites such as including YouTube and MySpace from its computer...issued a memorandum that set a new policy allowing access to social - networking services ( SNS ) from its network . The policy allows all users of...CLASSIFICATION: Unclassified In 2007, the U. S. Department of Defense (DoD) began blocking social networking sites such as including YouTube and MySpace

  10. Can the Analytical Hierarchy Process Model Be Effectively Applied in the Prioritization of Information Assurance Defense In-Depth Measures? --A Quantitative Study

    ERIC Educational Resources Information Center

    Alexander, Rodney T.

    2017-01-01

    Organizational computing devices are increasingly becoming targets of cyber-attacks, and organizations have become dependent on the safety and security of their computer networks and their organizational computing devices. Business and government often use defense in-depth information assurance measures such as firewalls, intrusion detection…

  11. From Conception to Birth: The Forces Responsible for AFCyber’s Evolution

    DTIC Science & Technology

    2014-06-01

    matter how good or bad my days were – and I experienced a fair number of both during the 11-month course – she provided a shoulder to cry on, a...Robert J.  Lamb , “Joint Task Force for Computer Network Defense,” IA Newsletter, Winter 98/99,  Vol 2, No. 3, http://www.iwar.org.uk/infocon/dtic‐ia...Future of Warfare.” Real Clear Defense, 24 February 2014. Lamb , Robert J. “Joint Task Force for Computer Network Defense.” IA Newsletter, Winter 98

  12. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... defense information. (e) Cyber incident means actions taken through the use of computer networks that... residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine...

  13. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... DEPARTMENT OF DEFENSE (DOD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... defense information. (e) Cyber incident means actions taken through the use of computer networks that... residing therein. (f) Cyber intrusion damage assessment means a managed, coordinated process to determine...

  14. Neural networks: Application to medical imaging

    NASA Technical Reports Server (NTRS)

    Clarke, Laurence P.

    1994-01-01

    The research mission is the development of computer assisted diagnostic (CAD) methods for improved diagnosis of medical images including digital x-ray sensors and tomographic imaging modalities. The CAD algorithms include advanced methods for adaptive nonlinear filters for image noise suppression, hybrid wavelet methods for feature segmentation and enhancement, and high convergence neural networks for feature detection and VLSI implementation of neural networks for real time analysis. Other missions include (1) implementation of CAD methods on hospital based picture archiving computer systems (PACS) and information networks for central and remote diagnosis and (2) collaboration with defense and medical industry, NASA, and federal laboratories in the area of dual use technology conversion from defense or aerospace to medicine.

  15. Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services

    DTIC Science & Technology

    2007-03-01

    potential of moving closer to the goal of a fully service-oriented GIG by allowing even computing - and bandwidth-constrained elements to participate...the functionality provided by core network assets with relatively unlimited bandwidth and computing resources. Finally, the nature of information is...the Department of Defense is a requirement for ubiquitous computer connectivity. An espoused vehicle for delivering that ubiquity is the Global

  16. Department of Defense High Performance Computing Modernization Program. 2008 Annual Report

    DTIC Science & Technology

    2009-04-01

    place to another on the network. Without it, a computer could only talk to itself - no email, no web browsing, and no iTunes . Most of the Internet...Your SecurID Card ), Ken Renard Secure Wireless, Rob Scott and Stephen Bowman Securing Today’s Networks, Rich Whittney, Juniper Networks, Federal

  17. Research and application of ARP protocol vulnerability attack and defense technology based on trusted network

    NASA Astrophysics Data System (ADS)

    Xi, Huixing

    2017-03-01

    With the continuous development of network technology and the rapid spread of the Internet, computer networks have been around the world every corner. However, the network attacks frequently occur. The ARP protocol vulnerability is one of the most common vulnerabilities in the TCP / IP four-layer architecture. The network protocol vulnerabilities can lead to the intrusion and attack of the information system, and disable or disable the normal defense function of the system [1]. At present, ARP spoofing Trojans spread widely in the LAN, the network security to run a huge hidden danger, is the primary threat to LAN security. In this paper, the author summarizes the research status and the key technologies involved in ARP protocol, analyzes the formation mechanism of ARP protocol vulnerability, and analyzes the feasibility of the attack technique. Based on the summary of the common defensive methods, the advantages and disadvantages of each defense method. At the same time, the current defense method is improved, and the advantage of the improved defense algorithm is given. At the end of this paper, the appropriate test method is selected and the test environment is set up. Experiment and test are carried out for each proposed improved defense algorithm.

  18. Computer network defense through radial wave functions

    NASA Astrophysics Data System (ADS)

    Malloy, Ian J.

    The purpose of this research is to synthesize basic and fundamental findings in quantum computing, as applied to the attack and defense of conventional computer networks. The concept focuses on uses of radio waves as a shield for, and attack against traditional computers. A logic bomb is analogous to a landmine in a computer network, and if one was to implement it as non-trivial mitigation, it will aid computer network defense. As has been seen in kinetic warfare, the use of landmines has been devastating to geopolitical regions in that they are severely difficult for a civilian to avoid triggering given the unknown position of a landmine. Thus, the importance of understanding a logic bomb is relevant and has corollaries to quantum mechanics as well. The research synthesizes quantum logic phase shifts in certain respects using the Dynamic Data Exchange protocol in software written for this work, as well as a C-NOT gate applied to a virtual quantum circuit environment by implementing a Quantum Fourier Transform. The research focus applies the principles of coherence and entanglement from quantum physics, the concept of expert systems in artificial intelligence, principles of prime number based cryptography with trapdoor functions, and modeling radio wave propagation against an event from unknown parameters. This comes as a program relying on the artificial intelligence concept of an expert system in conjunction with trigger events for a trapdoor function relying on infinite recursion, as well as system mechanics for elliptic curve cryptography along orbital angular momenta. Here trapdoor both denotes the form of cipher, as well as the implied relationship to logic bombs.

  19. Emergent Network Defense

    ERIC Educational Resources Information Center

    Crane, Earl Newell

    2013-01-01

    The research problem that inspired this effort is the challenge of managing the security of systems in large-scale heterogeneous networked environments. Human intervention is slow and limited: humans operate at much slower speeds than networked computer communications and there are few humans associated with each network. Enabling each node in the…

  20. 32 CFR 236.2 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... DEPARTMENT OF DEFENSE (DoD)-DEFENSE INDUSTRIAL BASE (DIB) VOLUNTARY CYBER SECURITY AND INFORMATION ASSURANCE... information. (e) Cyber incident means actions taken through the use of computer networks that result in an...) Cyber intrusion damage assessment means a managed, coordinated process to determine the effect on...

  1. A FORCEnet Framework for Analysis of Existing Naval C4I Architectures

    DTIC Science & Technology

    2003-06-01

    best qualities of humans and computers. f. Information Weapons Information weapons integrate the use of military deception, psychological ...operations, to include electronic warfare, psychological operations, computer network attack, computer network defense, operations security, and military...F/A-18 ( ATARS /SHARP), S-3B (SSU), SH-60 LAMPS (HAWKLINK) and P-3C (AIP, Special Projects). CDL-N consists of two antennas (one meter diameter

  2. Modeling and Analyzing Intrusion Attempts to a Computer Network Operating in a Defense in Depth Posture

    DTIC Science & Technology

    2004-09-01

    protection. Firewalls, Intrusion Detection Systems (IDS’s), Anti-Virus (AV) software , and routers are such tools used. In recent years, computer security...associated with operating systems, application software , and computing hardware. When IDS’s are utilized on a host computer or network, there are two...primary approaches to detecting and / or preventing attacks. Traditional IDS’s, like most AV software , rely on known “signatures” to detect attacks

  3. Computer network defense system

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves networkmore » connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.« less

  4. Air Force and the Cyberspace Mission: Defending the Air Force’s Computer Network in the Future

    DTIC Science & Technology

    2007-12-01

    computers, their operating systems and software purchased by the Air Force are commercial off-the-shelf (COTS) components, often manufactured abroad due...crystal clear 2003 information security report: “The U.S. Department of Defense (DOD) relies too much on commercial software , doesn’t know who is...creating the software , and faces other significant cybersecurity problems.”11 This paper explores the topic of defense of the cyberspace domain by

  5. The Use of Massive Multiplayer Online Games to Evaluate C4I Systems

    DTIC Science & Technology

    2004-03-01

    popularity in the gaming industry , the public and the Department of Defense. Improvements to computer technology and the increased data transfer rate...Multiplayer Online Games (MMOG) have gained in popularity in the gaming industry , the public and the Department of Defense. Improvements to...have gained in popularity in the gaming industry , the public and the Department of Defense. These networked virtual environments are “a software

  6. Dynamic Defensive Posture for Computer Network Defence

    DTIC Science & Technology

    2006-12-01

    12 4.1.1 Skybox View . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4.1.2 CycSecure...Commercial projects 4.1.1 Skybox View Skybox View is a commercial product that aims to evaluate network risk by iden- tifying network resources that are...changes before implementing them on the live network. In these respects, it is a tool for identifying exposed resources. Skybox View also permits some

  7. Targeting U.S. Technologies: A Trend Analysis of Reporting from Defense Industry 2008

    DTIC Science & Technology

    2009-01-16

    involving attempts to intrude or “ hack ” into the defense industrial base’s computer systems or networks originated from East Asia and the Pacifi c...easily mask IP addresses, utilize freely available anonymous proxies, or launch attacks from any of the open WiFi hotspots across the globe. These

  8. The Defense Message System and the U.S. Coast Guard

    DTIC Science & Technology

    1992-06-01

    these mail services, the Internet also provides a File Transfer Protocol (FTP) and remote login between host computers (TELNET) capabilities. 17 [Ref...the Joint Maritime Intelligence Element (JMIE), Zincdust, and Emerald . [Ref. 27] 4. Secure Data Network The Coast Guard’s Secure Data Network (SDN

  9. Addressing Software Security

    NASA Technical Reports Server (NTRS)

    Bailey, Brandon

    2015-01-01

    Historically security within organizations was thought of as an IT function (web sites/servers, email, workstation patching, etc.) Threat landscape has evolved (Script Kiddies, Hackers, Advanced Persistent Threat (APT), Nation States, etc.) Attack surface has expanded -Networks interconnected!! Some security posture factors Network Layer (Routers, Firewalls, etc.) Computer Network Defense (IPS/IDS, Sensors, Continuous Monitoring, etc.) Industrial Control Systems (ICS) Software Security (COTS, FOSS, Custom, etc.)

  10. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE PAGES

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.; ...

    2015-04-06

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  11. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S. V.; Poole, Stephen W.; Ma, Chris Y. T.

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical sub-infrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein theirmore » components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. In conclusion, the analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures.« less

  12. Defense of Cyber Infrastructures Against Cyber-Physical Attacks Using Game-Theoretic Models.

    PubMed

    Rao, Nageswara S V; Poole, Stephen W; Ma, Chris Y T; He, Fei; Zhuang, Jun; Yau, David K Y

    2016-04-01

    The operation of cyber infrastructures relies on both cyber and physical components, which are subject to incidental and intentional degradations of different kinds. Within the context of network and computing infrastructures, we study the strategic interactions between an attacker and a defender using game-theoretic models that take into account both cyber and physical components. The attacker and defender optimize their individual utilities, expressed as sums of cost and system terms. First, we consider a Boolean attack-defense model, wherein the cyber and physical subinfrastructures may be attacked and reinforced as individual units. Second, we consider a component attack-defense model wherein their components may be attacked and defended, and the infrastructure requires minimum numbers of both to function. We show that the Nash equilibrium under uniform costs in both cases is computable in polynomial time, and it provides high-level deterministic conditions for the infrastructure survival. When probabilities of successful attack and defense, and of incidental failures, are incorporated into the models, the results favor the attacker but otherwise remain qualitatively similar. This approach has been motivated and validated by our experiences with UltraScience Net infrastructure, which was built to support high-performance network experiments. The analytical results, however, are more general, and we apply them to simplified models of cloud and high-performance computing infrastructures. © 2015 Society for Risk Analysis.

  13. Quadrennial Defense Review Report

    DTIC Science & Technology

    2010-02-01

    medicine , and computer network operations. While we continue to employ a mix of programs and incentives to recruit quality personnel, we are also...Lithuania* Singapore Australia Finland Luxembourg* Slovakia* Austria France* Macedonia Slovenia* Azerbaijan Georgia Montenegro Spain* Belgium...20,000 positions by 2015. We will continue to significantly enhance Secretary of Defense Robert M. Gates meets with plant workers during a tour of an

  14. Protocol Interoperability Between DDN and ISO (Defense Data Network and International Organization for Standardization) Protocols

    DTIC Science & Technology

    1988-08-01

    Interconnection (OSI) in years. It is felt even more urgent in the past few years, with the rapid evolution of communication technologies and the...services and protocols above the transport layer are usually implemented as user- callable utilities on the host computers, it is desirable to offer them...Networks, Prentice-hall, New Jersey, 1987 [ BOND 87] Bond , John, "Parallel-Processing Concepts Finally Come together in Real Systems", Computer Design

  15. Visualization techniques for computer network defense

    NASA Astrophysics Data System (ADS)

    Beaver, Justin M.; Steed, Chad A.; Patton, Robert M.; Cui, Xiaohui; Schultz, Matthew

    2011-06-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operator to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.

  16. Application of Game Theory to Improve the Defense of the Smart Grid

    DTIC Science & Technology

    2012-03-01

    Computer Systems and Networks ...............................................22 2.4.2 Trust Models ...systems. In this environment, developers assumed deterministic communications mediums rather than the “best effort” models provided in most modern... models or computational models to validate the SPSs design. Finally, the study reveals concerns about the performance of load rejection schemes

  17. Coordinated Displays to Assist Cyber Defenders

    DTIC Science & Technology

    2016-09-23

    suspicious activity, such as the occurrence of a network event that is similar to a known attack signature, the system generates an alert which is then...presented to a human computer network defense analyst, or more succinctly, a network analyst, who must evaluate the veracity of that alert . To...display and select an alert to investigate further. Though alerts generally include some information about the nature of a potential threat, the

  18. Weighted link graphs: a distributed IDS for secondary intrusion detection and defense

    NASA Astrophysics Data System (ADS)

    Zhou, Mian; Lang, Sheau-Dong

    2005-03-01

    While a firewall installed at the perimeter of a local network provides the first line of defense against the hackers, many intrusion incidents are the results of successful penetration of the firewalls. One computer"s compromise often put the entire network at risk. In this paper, we propose an IDS that provides a finer control over the internal network. The system focuses on the variations of connection-based behavior of each single computer, and uses a weighted link graph to visualize the overall traffic abnormalities. The functionality of our system is of a distributed personal IDS system that also provides a centralized traffic analysis by graphical visualization. We use a novel weight assignment schema for the local detection within each end agent. The local abnormalities are quantitatively carried out by the node weight and link weight and further sent to the central analyzer to build the weighted link graph. Thus, we distribute the burden of traffic processing and visualization to each agent and make it more efficient for the overall intrusion detection. As the LANs are more vulnerable to inside attacks, our system is designed as a reinforcement to prevent corruption from the inside.

  19. First-Strike Advantage: The United States’ Counter to China’s Preemptive Integrated Network Electronic Warfare Strategy

    DTIC Science & Technology

    2013-06-01

    Ground: Chinese Capabilities for Computer Network Operations and Cyber Espionage,” 9. 57 Lolita C. Baldor, “Chinese Cyber Attacks On U.S. Continue...the Secretary of Defense, 2009. Baldor, Lolita C. “Chinese Cyber Attacks on U.S. Continue Totally Unabated, Leon Panetta.” Huffington Post (2012

  20. 75 FR 9548 - Reduction of Use of Social Security Numbers (SSN) in the Department of Defense (DoD)

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-03-03

    ... authorization to receive specific categories of information. Computer network. The constituent element of an... elements reside on a computer. Form. A fixed arrangement of captioned spaces designed for entering and... activities of the Government or because of the information value of the data in them. Survey. An instrument...

  1. Cyber Security Research Frameworks For Coevolutionary Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rush, George D.; Tauritz, Daniel Remy

    Several architectures have been created for developing and testing systems used in network security, but most are meant to provide a platform for running cyber security experiments as opposed to automating experiment processes. In the first paper, we propose a framework termed Distributed Cyber Security Automation Framework for Experiments (DCAFE) that enables experiment automation and control in a distributed environment. Predictive analysis of adversaries is another thorny issue in cyber security. Game theory can be used to mathematically analyze adversary models, but its scalability limitations restrict its use. Computational game theory allows us to scale classical game theory to larger,more » more complex systems. In the second paper, we propose a framework termed Coevolutionary Agent-based Network Defense Lightweight Event System (CANDLES) that can coevolve attacker and defender agent strategies and capabilities and evaluate potential solutions with a custom network defense simulation. The third paper is a continuation of the CANDLES project in which we rewrote key parts of the framework. Attackers and defenders have been redesigned to evolve pure strategy, and a new network security simulation is devised which specifies network architecture and adds a temporal aspect. We also add a hill climber algorithm to evaluate the search space and justify the use of a coevolutionary algorithm.« less

  2. Visualization Techniques for Computer Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Steed, Chad A; Patton, Robert M

    2011-01-01

    Effective visual analysis of computer network defense (CND) information is challenging due to the volume and complexity of both the raw and analyzed network data. A typical CND is comprised of multiple niche intrusion detection tools, each of which performs network data analysis and produces a unique alerting output. The state-of-the-practice in the situational awareness of CND data is the prevalent use of custom-developed scripts by Information Technology (IT) professionals to retrieve, organize, and understand potential threat events. We propose a new visual analytics framework, called the Oak Ridge Cyber Analytics (ORCA) system, for CND data that allows an operatormore » to interact with all detection tool outputs simultaneously. Aggregated alert events are presented in multiple coordinated views with timeline, cluster, and swarm model analysis displays. These displays are complemented with both supervised and semi-supervised machine learning classifiers. The intent of the visual analytics framework is to improve CND situational awareness, to enable an analyst to quickly navigate and analyze thousands of detected events, and to combine sophisticated data analysis techniques with interactive visualization such that patterns of anomalous activities may be more easily identified and investigated.« less

  3. Recent Naval Postgraduate School Publications.

    DTIC Science & Technology

    1980-04-01

    Numerical models of ocean circulation and Climate interaction Revs, of Geophis,.and Space Phys., vol. 17, no. 7, p. 1494-1507, (1 979) Haney, R 1...POSTGRADUATE SCHOOL Monterey, California DEPARTMENT OF COMPUTER SCIENCE C06FEBENCE PRESENTATIONS Bradley, G H Enerqy modelling with network optimization...Systems Analysis, Sept., 97 Bradley, G H; Brown, G G Network optimization and defense modeling Center for Nay. Analyses, Arlington, Va., Aug., 1976

  4. Using a Genome-Scale Metabolic Network Model to Elucidate the Mechanism of Chloroquine Action in Plasmodium falciparum

    DTIC Science & Technology

    2017-03-22

    Department of Defense Biotechnology High Performance Computing Software Applications Institute, Telemedicine and Advanced Technology Research Center, US...2017 Available online 22 March 2017 Keywords: Plasmodium Chloroquine Metabolic network modeling Redox metabolism Carbon fixation* Corresponding... available (Antony and Parija, 2016), their efficacy has declined appreciably in the last few decades owing to widespread drug resistance developed by the

  5. Students at the University of Abertay Dundee Learn Computer Hacking to Defend Networks

    ERIC Educational Resources Information Center

    Vance, Erik

    2007-01-01

    In this article, the author describes a new cybersecurity course at the University of Abertay Dundee in Scotland. Geoffrey R. Lund, leader of the software-applications program at Abertay, says the course prepares students for a rapidly growing job market by teaching that the best defense is a good offense. Professors set up a network of 20 or so…

  6. DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Qishi; Zhu, Mengxia; Rao, Nageswara S

    We propose an intelligent decision support system based on sensor and computer networks that incorporates various component techniques for sensor deployment, data routing, distributed computing, and information fusion. The integrated system is deployed in a distributed environment composed of both wireless sensor networks for data collection and wired computer networks for data processing in support of homeland security defense. We present the system framework and formulate the analytical problems and develop approximate or exact solutions for the subtasks: (i) sensor deployment strategy based on a two-dimensional genetic algorithm to achieve maximum coverage with cost constraints; (ii) data routing scheme tomore » achieve maximum signal strength with minimum path loss, high energy efficiency, and effective fault tolerance; (iii) network mapping method to assign computing modules to network nodes for high-performance distributed data processing; and (iv) binary decision fusion rule that derive threshold bounds to improve system hit rate and false alarm rate. These component solutions are implemented and evaluated through either experiments or simulations in various application scenarios. The extensive results demonstrate that these component solutions imbue the integrated system with the desirable and useful quality of intelligence in decision making.« less

  7. CTN summary of DSREDS, EDCARS, EDMICS CALS readiness testing. [Computer-aided Acquisition and Logistic Support (CALS) CALS Test Network (CTN), Digital Storage Retrieval Eng. Data System (DSREDS), Eng. Data Computer Assisted Retrieval System (EDCARS), Eng. Data Management Information and Control System (EDMICS)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Mitschkowetz, N.; Vickers, D.L.

    This report provides a summary of the Computer-aided Acquisition and Logistic Support (CALS) Test Network (CTN) Laboratory Acceptance Test (LAT) and User Application Test (UAT) activities undertaken to evaluate the CALS capabilities being implemented as part of the Department of Defense (DOD) engineering repositories. Although the individual testing activities provided detailed reports for each repository, a synthesis of the results, conclusions, and recommendations is offered to provide a more concise presentation of the issues and the strategies, as viewed from the CTN perspective.

  8. Arabidopsis Defense against Botrytis cinerea: Chronology and Regulation Deciphered by High-Resolution Temporal Transcriptomic Analysis[C][W

    PubMed Central

    Windram, Oliver; Madhou, Priyadharshini; McHattie, Stuart; Hill, Claire; Hickman, Richard; Cooke, Emma; Jenkins, Dafyd J.; Penfold, Christopher A.; Baxter, Laura; Breeze, Emily; Kiddle, Steven J.; Rhodes, Johanna; Atwell, Susanna; Kliebenstein, Daniel J.; Kim, Youn-sung; Stegle, Oliver; Borgwardt, Karsten; Zhang, Cunjin; Tabrett, Alex; Legaie, Roxane; Moore, Jonathan; Finkenstadt, Bärbel; Wild, David L.; Mead, Andrew; Rand, David; Beynon, Jim; Ott, Sascha; Buchanan-Wollaston, Vicky; Denby, Katherine J.

    2012-01-01

    Transcriptional reprogramming forms a major part of a plant’s response to pathogen infection. Many individual components and pathways operating during plant defense have been identified, but our knowledge of how these different components interact is still rudimentary. We generated a high-resolution time series of gene expression profiles from a single Arabidopsis thaliana leaf during infection by the necrotrophic fungal pathogen Botrytis cinerea. Approximately one-third of the Arabidopsis genome is differentially expressed during the first 48 h after infection, with the majority of changes in gene expression occurring before significant lesion development. We used computational tools to obtain a detailed chronology of the defense response against B. cinerea, highlighting the times at which signaling and metabolic processes change, and identify transcription factor families operating at different times after infection. Motif enrichment and network inference predicted regulatory interactions, and testing of one such prediction identified a role for TGA3 in defense against necrotrophic pathogens. These data provide an unprecedented level of detail about transcriptional changes during a defense response and are suited to systems biology analyses to generate predictive models of the gene regulatory networks mediating the Arabidopsis response to B. cinerea. PMID:23023172

  9. Proactive Self Defense in Cyberspace

    DTIC Science & Technology

    2009-02-17

    other security measures. A second theme is the continued expansion of cyber crime. Profit is the motivation for these cyber criminals and many of these...lawbreakers are very successful unfortunately. In fact, experts in the computer and network security fields see that in the future, the cyber criminals “will

  10. DDN (Defense Data Network) Protocol Implementations and Vendors Guide

    DTIC Science & Technology

    1989-02-01

    Announcement 286-259 6/16/86 MACHINE-TYPE/CPU: IBM RT/PC O/S: AIX DISTRIBUTOR: 1. IBM Marketing 2. IBM Authorized VAR’s 3. Authorized Personal Computer...Vendors Guide 12. PERSONAL AUTHOR(S) Dorio, Nan; Johnson, Marlyn; Lederman. Sol; Redfield, Elizabeth; Ward, Carol 13a. TYPE OF REPORT 13b. TIME COVERED 114...documentation, contact person , and distributor. The fourth section describes analysis tools. It includes information about network analysis products

  11. Security in MANETs using reputation-adjusted routing

    NASA Astrophysics Data System (ADS)

    Ondi, Attila; Hoffman, Katherine; Perez, Carlos; Ford, Richard; Carvalho, Marco; Allen, William

    2009-04-01

    Mobile Ad-Hoc Networks enable communication in various dynamic environments, including military combat operations. Their open and shared communication medium enables new forms of attack that are not applicable for traditional wired networks. Traditional security mechanisms and defense techniques are not prepared to cope with the new attacks and the lack of central authorities make identity verifications difficult. This work extends our previous work in the Biologically Inspired Tactical Security Infrastructure to provide a reputation-based weighing mechanism for linkstate routing protocols to protect the network from attackers that are corrupting legitimate network traffic. Our results indicate that the approach is successful in routing network traffic around compromised computers.

  12. Gross anatomy of network security

    NASA Technical Reports Server (NTRS)

    Siu, Thomas J.

    2002-01-01

    Information security involves many branches of effort, including information assurance, host level security, physical security, and network security. Computer network security methods and implementations are given a top-down description to permit a medically focused audience to anchor this information to their daily practice. The depth of detail of network functionality and security measures, like that of the study of human anatomy, can be highly involved. Presented at the level of major gross anatomical systems, this paper will focus on network backbone implementation and perimeter defenses, then diagnostic tools, and finally the user practices (the human element). Physical security measures, though significant, have been defined as beyond the scope of this presentation.

  13. Defamation Charges in a Networked Environment.

    ERIC Educational Resources Information Center

    Ferencz, Susan K.

    1997-01-01

    Considers how civil law might treat claims of defamation arising from computer newsgroup postings. Concludes that newsgroup postings will probably be treated as a hybrid of print and broadcast media, and that newsgroup users will vigorously and aggressively protect freedoms of speech and press. While traditional defenses to defamation charges will…

  14. Deadlock Detection in Computer Networks

    DTIC Science & Technology

    1977-09-01

    it entity class name (ndm-procownerref) = -:"node tab5le" I procnode_name z res-rnode-name call then return; nc ll c eck -for-deadlock(p_obplref...demo12 ~-exlusive sae con Caobridg Fina Sttonaa con0 Official Distribution List Defense Documentation Center New York Area Office Cameron Station 715

  15. Internet: road to heaven or hell for the clinical laboratory?

    PubMed

    Chou, D

    1996-05-01

    The Internet started as a research project by the Department of Defense Advanced Research Projects Agency for networking computers. Ironically, the networking project now predominantly supports human rather than computer communications. The Internet's growth, estimated at 20% per month, has been fueled by commercial and public perception that it will become an important medium for merchandising, marketing, and advertising. For the clinical laboratory, the Internet provides high-speed communications through e-mail and allows the retrieval of important information held in repositories. All this capability comes at a price, including the need to manage a complex technology and the risk of instrusions on patient privacy.

  16. Laboratory for Computer Science Progress Report 21, July 1983-June 1984.

    DTIC Science & Technology

    1984-06-01

    Systems 269 4. Distributed Consensus 270 5. Election of a Leader in a Distributed Ring of Processors 273 6. Distributed Network Algorithms 274 7. Diagnosis...multiprocessor systems. This facility, funded by the new!y formed Strategic Computing Program of the Defense Advanced Research Projects Agency, will enable...Academic Staff P. Szo)ovits, Group Leader R. Patil Collaborating Investigators M. Criscitiello, M.D., Tufts-New England Medical Center Hospital R

  17. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Letchford, Joshua

    While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.

  18. Middleware enabling computational self-reflection: exploring the need for and some costs of selfreflecting networks with application to homeland defense

    NASA Astrophysics Data System (ADS)

    Kramer, Michael J.; Bellman, Kirstie L.; Landauer, Christopher

    2002-07-01

    This paper will review and examine the definitions of Self-Reflection and Active Middleware. Then it will illustrate a conceptual framework for understanding and enumerating the costs of Self-Reflection and Active Middleware at increasing levels of Application. Then it will review some application of Self-Reflection and Active Middleware to simulations. Finally it will consider the application and additional kinds of costs applying Self-Reflection and Active Middleware to sharing information among the organizations expected to participate in Homeland Defense.

  19. Radar Versus Stealth: Passive Radar and the Future of U.S. Military Power

    DTIC Science & Technology

    2009-01-01

    minimizing, if not nul- lifying , the advantages of the defensive.”3 Douhet did not envision the many sur- face-to-air threats that would evolve over the...is emerging, enabled by advances in networked computing and passive radar technology. Because of their potential to counter stealth-based airpower...waveforms include FM and AM radio, television, digital audio/video broadcast, and cellular phone networks .38 Today, passive radar is often configured as a

  20. R-EACTR: A Framework for Designing Realistic Cyber Warfare Exercises

    DTIC Science & Technology

    2017-09-11

    2.1 Environment 3 2.2 Adversary 4 2.3 Communications 4 2.4 Tactics 5 2.5 Roles 5 3 Case Study – Cyber Forge 11 7 3.1 Environment 7 3.2...realism into each aspect of the exercise, and a case study of one exercise where the framework was successfully employed. CMU/SEI-2017-TR-005...network, emulation, logging, reporting Supporting: computer network defense service provider (CNDSP), intelligence, reach-back, higher

  1. Enhanced Cyberspace Defense through Covert Publish-Subscribe Broker Pattern Communications

    DTIC Science & Technology

    2008-06-01

    http://www.cnn.com/TECH/computing/9902/26/t_t/internet.time/, accessed June 2008. [3] C. V. Clausewitz, On War, 1st ed.. London, England: Kegan ...34 2003. [17] T. Greene . (2008 , Apr.) Network World. [Online]. http://www.networkworld.com/news/2008/040908-rsa-hack-power-grid.html, accessed

  2. Modeling Computer Communication Networks in a Realistic 3D Environment

    DTIC Science & Technology

    2010-03-01

    50 2. Comparison of visualization tools . . . . . . . . . . . . . . . . . 75 xi List of Abbreviations Abbreviation Page 2D two-dimensional...International Conference on, 77 –84, 2001. 20. National Defense and the Canadian Forces. “Joint Fires Support”. URL http: //www.cfd-cdf.forces.gc.ca/sites/ page ...Table of Contents Page Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv Acknowledgements

  3. Effects of Gain/Loss Framing in Cyber Defense Decision-Making

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bos, Nathan; Paul, Celeste; Gersh, John

    Cyber defense requires decision making under uncertainty. Yet this critical area has not been a strong focus of research in judgment and decision-making. Future defense systems, which will rely on software-defined networks and may employ ‘moving target’ defenses, will increasingly automate lower level detection and analysis, but will still require humans in the loop for higher level judgment. We studied the decision making process and outcomes of 17 experienced network defense professionals who worked through a set of realistic network defense scenarios. We manipulated gain versus loss framing in a cyber defense scenario, and found significant effects in one ofmore » two focal problems. Defenders that began with a network already in quarantine (gain framing) used a quarantine system more than those that did not (loss framing). We also found some difference in perceived workload and efficacy. Alternate explanations of these findings and implications for network defense are discussed.« less

  4. A Computer-Aided Instruction Program for Teaching the TOPS20-MM Facility on the DDN (Defense Data Network)

    DTIC Science & Technology

    1988-06-01

    Continue on reverse if necessary and identify by block number) FIELD GROUP SUB-GROUP Computer Assisted Instruction; Artificial Intelligence 194...while he/she tries to perform given tasks. Means-ends analysis, a classic technique for solving search problems in Artificial Intelligence, has been...he/she tries to perform given tasks. Means-ends analysis, a classic technique for solving search problems in Artificial Intelligence, has been used

  5. Social Network Modeling and Simulation of Integrated Resilient Command and Control (C2) in Contested Cyber Environments

    DTIC Science & Technology

    2011-12-09

    traced to non-state actors it provided the impetus to the creation of Joint Task Force Computer Network Defense (JTF-CND). Since the creation of JTF...telecommunications and IT systems. One of those many efforts by the USAF has been the creation of the 24th Air Force (24th AF), also known as US Air Force...Support For Organizational Structures, Policies, Technologies and People to Improve Resilience Prior to creation of USCYBERCOM, responsibility for

  6. Management of Risk and Uncertainty in Systems Acquisition: Proceedings of the 1983 Defense Risk and Uncertainty Workshop Held at Fort Belvoir, Virginia on 13-15 July 1983

    DTIC Science & Technology

    1983-07-15

    categories, however, represent the reality in major acquisition and are often overlooked. Although Figure 1 does not reflect tne dynamics and Interactions...networking and improved computer capabili- ties probabilistic network simulation became a reality . The Naval Sea Systems Command became involved in...reasons for using the WBS are plain: 1. Virtually all risk-prone activities are performed by the contractor, not Government. Government is responsible

  7. Planning for Information Resource Management by OSD.

    DTIC Science & Technology

    1987-12-01

    9,129 Objective 1.2- DSS 21,648 23,702 3,893 4,090 4,309 Objective 1.3- Computing 8,197 7,590 435 459 483 Objective 1.4- Distribute messages 75 213 29 ...System DCOAR 26 Office Automation Computer 1,961 3,483 Systems DCOAR 27 Network Performance and 125 454 Capital Budget DCOAR 29 Requirements Analysis...Defense Personnel Analysis 124 167 System ASD(FM&P) 15 Mobilization Training Base 29 63 Cap ASD(FM&P) 16 Manpower Management/ i 8 33 Program Review 01

  8. Information Warfare: Issues Associated with the Defense of DOD Computers and Computer Networks

    DTIC Science & Technology

    2002-04-12

    professionals; any mistakes that remain are mine and mine alone. Finally, I wish to thank my family, my wife Cecilia , my daughters Leslie and Marguerite, and my...Accessed 15 January 2002. Malicious Activity Continues to Climb Virus Growth Per Month (Internet - “Wild List”) J a n May NovS e pJul 130 140 150 160...28 Original brief previously unpublished. Briefing is currently held in Operation Directorate ( J -3) of the Joint Task

  9. Quantification of moving target cyber defenses

    NASA Astrophysics Data System (ADS)

    Farris, Katheryn A.; Cybenko, George

    2015-05-01

    Current network and information systems are static, making it simple for attackers to maintain an advantage. Adaptive defenses, such as Moving Target Defenses (MTD) have been developed as potential "game-changers" in an effort to increase the attacker's workload. With many new methods being developed, it is difficult to accurately quantify and compare their overall costs and effectiveness. This paper compares the tradeoffs between current approaches to the quantification of MTDs. We present results from an expert opinion survey on quantifying the overall effectiveness, upfront and operating costs of a select set of MTD techniques. We find that gathering informed scientific opinions can be advantageous for evaluating such new technologies as it offers a more comprehensive assessment. We end by presenting a coarse ordering of a set of MTD techniques from most to least dominant. We found that seven out of 23 methods rank as the more dominant techniques. Five of which are techniques of either address space layout randomization or instruction set randomization. The remaining two techniques are applicable to software and computer platforms. Among the techniques that performed the worst are those primarily aimed at network randomization.

  10. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills,more » and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.« less

  11. A Federal Vision for Future Computing: A Nanotechnology-Inspired Grand Challenge

    DTIC Science & Technology

    2016-07-29

    Science Foundation (NSF), Department of Defense (DOD), National Institute of Standards and Technology (NIST), Intelligence Community (IC) Introduction...multiple Federal agencies: • Intelligent big data sensors that act autonomously and are programmable via the network for increased flexibility, and... intelligence for scientific discovery enabled by rapid extreme-scale data analysis, capable of understanding and making sense of results and thereby

  12. Characterization of computer network events through simultaneous feature selection and clustering of intrusion alerts

    NASA Astrophysics Data System (ADS)

    Chen, Siyue; Leung, Henry; Dondo, Maxwell

    2014-05-01

    As computer network security threats increase, many organizations implement multiple Network Intrusion Detection Systems (NIDS) to maximize the likelihood of intrusion detection and provide a comprehensive understanding of intrusion activities. However, NIDS trigger a massive number of alerts on a daily basis. This can be overwhelming for computer network security analysts since it is a slow and tedious process to manually analyse each alert produced. Thus, automated and intelligent clustering of alerts is important to reveal the structural correlation of events by grouping alerts with common features. As the nature of computer network attacks, and therefore alerts, is not known in advance, unsupervised alert clustering is a promising approach to achieve this goal. We propose a joint optimization technique for feature selection and clustering to aggregate similar alerts and to reduce the number of alerts that analysts have to handle individually. More precisely, each identified feature is assigned a binary value, which reflects the feature's saliency. This value is treated as a hidden variable and incorporated into a likelihood function for clustering. Since computing the optimal solution of the likelihood function directly is analytically intractable, we use the Expectation-Maximisation (EM) algorithm to iteratively update the hidden variable and use it to maximize the expected likelihood. Our empirical results, using a labelled Defense Advanced Research Projects Agency (DARPA) 2000 reference dataset, show that the proposed method gives better results than the EM clustering without feature selection in terms of the clustering accuracy.

  13. Dynamic defense and network randomization for computer systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissancemore » stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.« less

  14. What is the current state of the science of Cyber defense?

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hurd, Alan J.

    My overall sense of the cyber defense field is one of an adolescent discipline currently bogged down in a cloud of issues, the most iconic of which is the great diversity of approaches that are being aggregated to form a coherent field. Because my own expertise is complex systems and materials physics research, I have limited direct experience in cyber security sciences except as a user of secure networks and computing resources. However, in producing this report, I have found with certainty that there exists no calculus for cyber risk assessment, mitigation, and response, although some hopeful precepts toward thismore » end are emerging.« less

  15. Defense switched network technology and experiments program

    NASA Astrophysics Data System (ADS)

    Weinstein, C. J.

    1983-09-01

    This report documents work performed during FY 1983 on the DCA-sponsored Defense Switched Network Technology and Experiments Program. The areas of work reported are: (1) development of routing algorithms for application in the Defense Switched Network (DSN); (2) instrumentation and integration of the Experimental Integrated Switched Network (EISN) test facility; (3) development and test of data communication techniques using DoD-standard data protocols in an integrated voice/data network; and (4) EISN system coordination and experiment planning.

  16. Defense Strategies for Asymmetric Networked Systems with Discrete Components.

    PubMed

    Rao, Nageswara S V; Ma, Chris Y T; Hausken, Kjell; He, Fei; Yau, David K Y; Zhuang, Jun

    2018-05-03

    We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.

  17. Defense Strategies for Asymmetric Networked Systems with Discrete Components

    PubMed Central

    Rao, Nageswara S. V.; Ma, Chris Y. T.; Hausken, Kjell; He, Fei; Yau, David K. Y.

    2018-01-01

    We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models. PMID:29751588

  18. AdaNET phase 0 support for the AdaNET Dynamic Software Inventory (DSI) management system prototype. Catalog of available reusable software components

    NASA Technical Reports Server (NTRS)

    Hanley, Lionel

    1989-01-01

    The Ada Software Repository is a public-domain collection of Ada software and information. The Ada Software Repository is one of several repositories located on the SIMTEL20 Defense Data Network host computer at White Sands Missile Range, and available to any host computer on the network since 26 November 1984. This repository provides a free source for Ada programs and information. The Ada Software Repository is divided into several subdirectories. These directories are organized by topic, and their names and a brief overview of their topics are contained. The Ada Software Repository on SIMTEL20 serves two basic roles: to promote the exchange and use (reusability) of Ada programs and tools (including components) and to promote Ada education.

  19. Search and Pursuit with Unmanned Aerial Vehicles in Road Networks

    DTIC Science & Technology

    2013-11-01

    production volume in each area for use in consumer electronics. Simultaneously, a shift in defense strategy towards unmanned vehicles, particularly...Vöcking. Randomized pursuit-evasion in graphs. Combinatorics, Probability and Computing, 12:225–244, May 2003. [3] AeroVironment Inc. Raven Product Data...Ali and Mubarak Shah. COCOA - tracking in aerial imagery. In SPIE Airborne Intelligence, Surveillance, Reconnaissance Systems and Applications, 2006

  20. Defense Data Network/TOPS-20 Tutorial. An Interative Computer Program.

    DTIC Science & Technology

    1985-12-01

    33 XI. ELECTRONIC MAIL HOST ( EMH )-------------------------- 34 XII. EMACS...contents of text buffer to a file X EXCHANGE , used to search for and replace text Z ZAP, puts your entire file into the print buffer 23 - -° SWITCH...prompt USC-ISIE.ARPA> Sample foreign host command level prompt FTP COMMAND LEVEL COMMANDS COMMAND USE(S) FTP Invokes the FTP protocol CONNECT Connects

  1. The Blurring of Lines Between Combatants and Civilians in Twenty-First Century Armed Conflict

    DTIC Science & Technology

    2013-03-28

    concern for retirement, pensions , placement, or medical care. Speed, technical expertise, continuity, and flexibility are advantages gained by using...including the Internet, telecommunications networks, computer systems , and embedded processors and controllers.”42 Cyberspace and the technologies that... systems . Additionally, the Department of Defense relies heavily on its National Security Agency to defend the United States from attacks against its

  2. High End Computer Network Testbedding at NASA Goddard Space Flight Center

    NASA Technical Reports Server (NTRS)

    Gary, James Patrick

    1998-01-01

    The Earth & Space Data Computing (ESDC) Division, at the Goddard Space Flight Center, is involved in development and demonstrating various high end computer networking capabilities. The ESDC has several high end super computers. These are used to run: (1) computer simulation of the climate systems; (2) to support the Earth and Space Sciences (ESS) project; (3) to support the Grand Challenge (GC) Science, which is aimed at understanding the turbulent convection and dynamos in stars. GC research occurs in many sites throughout the country, and this research is enabled by, in part, the multiple high performance network interconnections. The application drivers for High End Computer Networking use distributed supercomputing to support virtual reality applications, such as TerraVision, (i.e., three dimensional browser of remotely accessed data), and Cave Automatic Virtual Environments (CAVE). Workstations can access and display data from multiple CAVE's with video servers, which allows for group/project collaborations using a combination of video, data, voice and shared white boarding. The ESDC is also developing and demonstrating the high degree of interoperability between satellite and terrestrial-based networks. To this end, the ESDC is conducting research and evaluations of new computer networking protocols and related technologies which improve the interoperability of satellite and terrestrial networks. The ESDC is also involved in the Security Proof of Concept Keystone (SPOCK) program sponsored by National Security Agency (NSA). The SPOCK activity provides a forum for government users and security technology providers to share information on security requirements, emerging technologies and new product developments. Also, the ESDC is involved in the Trans-Pacific Digital Library Experiment, which aims to demonstrate and evaluate the use of high performance satellite communications and advanced data communications protocols to enable interactive digital library data access between the U. S. Library of Congress, the National Library of Japan and other digital library sites at 155 MegaBytes Per Second. The ESDC participation in this program is the Trans-Pacific access to GLOBE visualizations in real time. ESDC is participating in the Department of Defense's ATDNet with Multiwavelength Optical Network (MONET) a fully switched Wavelength Division Networking testbed. This presentation is in viewgraph format.

  3. Sequential defense against random and intentional attacks in complex networks.

    PubMed

    Chen, Pin-Yu; Cheng, Shin-Ming

    2015-02-01

    Network robustness against attacks is one of the most fundamental researches in network science as it is closely associated with the reliability and functionality of various networking paradigms. However, despite the study on intrinsic topological vulnerabilities to node removals, little is known on the network robustness when network defense mechanisms are implemented, especially for networked engineering systems equipped with detection capabilities. In this paper, a sequential defense mechanism is first proposed in complex networks for attack inference and vulnerability assessment, where the data fusion center sequentially infers the presence of an attack based on the binary attack status reported from the nodes in the network. The network robustness is evaluated in terms of the ability to identify the attack prior to network disruption under two major attack schemes, i.e., random and intentional attacks. We provide a parametric plug-in model for performance evaluation on the proposed mechanism and validate its effectiveness and reliability via canonical complex network models and real-world large-scale network topology. The results show that the sequential defense mechanism greatly improves the network robustness and mitigates the possibility of network disruption by acquiring limited attack status information from a small subset of nodes in the network.

  4. Using an Inductive Learning Algorithm to Improve Antibody Generation in a Single Packet Computer Defense Immune System

    DTIC Science & Technology

    2002-03-01

    allow the network to perform as a much better classifier. Another disadvantage of neural networks is that it is difficult to know what is going on...could be shown to have a cause and effect relationship in producing bad antibodies, the next phase of the research was destined to go more smoothly...Number Bad 2,402 1,803 80 253 266 Training File Number Good 1,201 316 307 312 266 Number Bad 1,201 901 40 127 133 Testing File Number Good 1,201 322 333

  5. Final Report: Sensorpedia Phases 1 and 2

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Gorman, Bryan L; Resseguie, David R

    2010-08-01

    Over the past several years, ORNL has been actively involved in research to formalize the engineering principles and best practices behind emerging social media and social networking concepts to solve real-time data sharing problems for national security and defense, public health and safety, environmental and infrastructure awareness, and disaster preparedness and response. Sensorpedia, an ORNL web site, is a practical application of several key social media principles. Dubbed the Wikipedia for sensors, Sensorpedia is currently in limited BETA testing and was selected in 2009 by Federal Computer Week as one of the government s top 10 social networking sites.

  6. 77 FR 35432 - Privacy Act of 1974, Computer Matching Program: United States Postal Service and the Defense...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-13

    ... the Defense Manpower Data Center, Department of Defense AGENCY: Postal Service TM . ACTION: Notice of Computer Matching Program--United States Postal Service and the Defense Manpower Data Center, Department of... as the recipient agency in a computer matching program with the Defense Manpower Data Center (DMDC...

  7. Defense strategies for cloud computing multi-site server infrastructures

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S.; Ma, Chris Y. T.; He, Fei

    We consider cloud computing server infrastructures for big data applications, which consist of multiple server sites connected over a wide-area network. The sites house a number of servers, network elements and local-area connections, and the wide-area network plays a critical, asymmetric role of providing vital connectivity between them. We model this infrastructure as a system of systems, wherein the sites and wide-area network are represented by their cyber and physical components. These components can be disabled by cyber and physical attacks, and also can be protected against them using component reinforcements. The effects of attacks propagate within the systems, andmore » also beyond them via the wide-area network.We characterize these effects using correlations at two levels using: (a) aggregate failure correlation function that specifies the infrastructure failure probability given the failure of an individual site or network, and (b) first-order differential conditions on system survival probabilities that characterize the component-level correlations within individual systems. We formulate a game between an attacker and a provider using utility functions composed of survival probability and cost terms. At Nash Equilibrium, we derive expressions for the expected capacity of the infrastructure given by the number of operational servers connected to the network for sum-form, product-form and composite utility functions.« less

  8. Applied Hypergame Theory for Network Defense

    DTIC Science & Technology

    2013-06-01

    information technology infrastructure as they are perhaps the most wired country on the planet . Government websites, banking systems, and even media...a long way from the simple lone youth down in the basement causing mischief. Organized swaths of intelligent computer savvy attackers now exist and...out of the five hypergames choose the hyperstrategy that is the same as the full game MSNE, with the Mid-Level defender being the lone difference. Thus

  9. Modeling Computer Communication Networks in a Realistic 3D Environment

    DTIC Science & Technology

    2010-03-01

    50 2. Comparison of visualization tools . . . . . . . . . . . . . . . . . 75 xi List of Abbreviations Abbreviation Page 2D two-dimensional...International Conference on, 77 –84, 2001. 20. National Defense and the Canadian Forces. “Joint Fires Support”. URL http: //www.cfd-cdf.forces.gc.ca/sites/ page ...UNLIMITED. Report Documentation Page Form ApprovedOMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour

  10. 2008 Defense Industrial Base Critical Infrastructure Protection Conference (DIB-CBIP)

    DTIC Science & Technology

    2008-04-09

    a cloak -and- dagger thing. It’s about computer architecture and the soundness of electronic systems." Joel Brenner, ODNI Counterintelligence Office...to support advanced network exploitation and launch attacks on the informational and physical elements of our cyber infrastructure. In order to...entities and is vulnerable to attacks and manipulation. Operations in the cyber domain have the ability to impact operations in other war-fighting

  11. A Novel Topology Link-Controlling Approach for Active Defense of a Node in a Network.

    PubMed

    Li, Jun; Hu, HanPing; Ke, Qiao; Xiong, Naixue

    2017-03-09

    With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes.

  12. A Novel Topology Link-Controlling Approach for Active Defense of Nodes in Networks

    PubMed Central

    Li, Jun; Hu, HanPing; Ke, Qiao; Xiong, Naixue

    2017-01-01

    With the rapid development of virtual machine technology and cloud computing, distributed denial of service (DDoS) attacks, or some peak traffic, poses a great threat to the security of the network. In this paper, a novel topology link control technique and mitigation attacks in real-time environments is proposed. Firstly, a non-invasive method of deploying virtual sensors in the nodes is built, which uses the resource manager of each monitored node as a sensor. Secondly, a general topology-controlling approach of resisting the tolerant invasion is proposed. In the proposed approach, a prediction model is constructed by using copula functions for predicting the peak of a resource through another resource. The result of prediction determines whether or not to initiate the active defense. Finally, a minority game with incomplete strategy is employed to suppress attack flows and improve the permeability of the normal flows. The simulation results show that the proposed approach is very effective in protecting nodes. PMID:28282962

  13. 78 FR 57845 - Notice of Availability (NOA) for Strategic Network Optimization (SNO) Program Environmental...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-09-20

    ... (NOA) for Strategic Network Optimization (SNO) Program Environmental Assessment AGENCY: Defense Logistics Agency, DoD. ACTION: Notice of Availability (NOA) for Strategic Network Optimization (SNO) Program... implement the SNO initiative for improvements to material distribution network for the Department of Defense...

  14. Secured network sensor-based defense system

    NASA Astrophysics Data System (ADS)

    Wei, Sixiao; Shen, Dan; Ge, Linqiang; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    Network sensor-based defense (NSD) systems have been widely used to defend against cyber threats. Nonetheless, if the adversary finds ways to identify the location of monitor sensors, the effectiveness of NSD systems can be reduced. In this paper, we propose both temporal and spatial perturbation based defense mechanisms to secure NSD systems and make the monitor sensor invisible to the adversary. The temporal-perturbation based defense manipulates the timing information of published data so that the probability of successfully recognizing monitor sensors can be reduced. The spatial-perturbation based defense dynamically redeploys monitor sensors in the network so that the adversary cannot obtain the complete information to recognize all of the monitor sensors. We carried out experiments using real-world traffic traces to evaluate the effectiveness of our proposed defense mechanisms. Our data shows that our proposed defense mechanisms can reduce the attack accuracy of recognizing detection sensors.

  15. Research on Network Defense Strategy Based on Honey Pot Technology

    NASA Astrophysics Data System (ADS)

    Hong, Jianchao; Hua, Ying

    2018-03-01

    As a new network security technology of active defense, The honeypot technology has become a very effective and practical method of decoy attackers. The thesis discusses the theory, structure, characteristic, design and implementation of Honeypot in detail. Aiming at the development of means of attack, put forward a kind of network defense technology based on honeypot technology, constructing a virtual Honeypot demonstrate the honeypot’s functions.

  16. A Systems Biology Approach to the Coordination of Defensive and Offensive Molecular Mechanisms in the Innate and Adaptive Host–Pathogen Interaction Networks

    PubMed Central

    Wu, Chia-Chou; Chen, Bor-Sen

    2016-01-01

    Infected zebrafish coordinates defensive and offensive molecular mechanisms in response to Candida albicans infections, and invasive C. albicans coordinates corresponding molecular mechanisms to interact with the host. However, knowledge of the ensuing infection-activated signaling networks in both host and pathogen and their interspecific crosstalk during the innate and adaptive phases of the infection processes remains incomplete. In the present study, dynamic network modeling, protein interaction databases, and dual transcriptome data from zebrafish and C. albicans during infection were used to infer infection-activated host–pathogen dynamic interaction networks. The consideration of host–pathogen dynamic interaction systems as innate and adaptive loops and subsequent comparisons of inferred innate and adaptive networks indicated previously unrecognized crosstalk between known pathways and suggested roles of immunological memory in the coordination of host defensive and offensive molecular mechanisms to achieve specific and powerful defense against pathogens. Moreover, pathogens enhance intraspecific crosstalk and abrogate host apoptosis to accommodate enhanced host defense mechanisms during the adaptive phase. Accordingly, links between physiological phenomena and changes in the coordination of defensive and offensive molecular mechanisms highlight the importance of host–pathogen molecular interaction networks, and consequent inferences of the host–pathogen relationship could be translated into biomedical applications. PMID:26881892

  17. A Systems Biology Approach to the Coordination of Defensive and Offensive Molecular Mechanisms in the Innate and Adaptive Host-Pathogen Interaction Networks.

    PubMed

    Wu, Chia-Chou; Chen, Bor-Sen

    2016-01-01

    Infected zebrafish coordinates defensive and offensive molecular mechanisms in response to Candida albicans infections, and invasive C. albicans coordinates corresponding molecular mechanisms to interact with the host. However, knowledge of the ensuing infection-activated signaling networks in both host and pathogen and their interspecific crosstalk during the innate and adaptive phases of the infection processes remains incomplete. In the present study, dynamic network modeling, protein interaction databases, and dual transcriptome data from zebrafish and C. albicans during infection were used to infer infection-activated host-pathogen dynamic interaction networks. The consideration of host-pathogen dynamic interaction systems as innate and adaptive loops and subsequent comparisons of inferred innate and adaptive networks indicated previously unrecognized crosstalk between known pathways and suggested roles of immunological memory in the coordination of host defensive and offensive molecular mechanisms to achieve specific and powerful defense against pathogens. Moreover, pathogens enhance intraspecific crosstalk and abrogate host apoptosis to accommodate enhanced host defense mechanisms during the adaptive phase. Accordingly, links between physiological phenomena and changes in the coordination of defensive and offensive molecular mechanisms highlight the importance of host-pathogen molecular interaction networks, and consequent inferences of the host-pathogen relationship could be translated into biomedical applications.

  18. Analysis of Network Vulnerability Under Joint Node and Link Attacks

    NASA Astrophysics Data System (ADS)

    Li, Yongcheng; Liu, Shumei; Yu, Yao; Cao, Ting

    2018-03-01

    The security problem of computer network system is becoming more and more serious. The fundamental reason is that there are security vulnerabilities in the network system. Therefore, it’s very important to identify and reduce or eliminate these vulnerabilities before they are attacked. In this paper, we are interested in joint node and link attacks and propose a vulnerability evaluation method based on the overall connectivity of the network to defense this attack. Especially, we analyze the attack cost problem from the attackers’ perspective. The purpose is to find the set of least costs for joint links and nodes, and their deletion will lead to serious network connection damage. The simulation results show that the vulnerable elements obtained from the proposed method are more suitable for the attacking idea of the malicious persons in joint node and link attack. It is easy to find that the proposed method has more realistic protection significance.

  19. Engaging the Nation’s Critical Infrastructure Sector to Deter Cyber Threats

    DTIC Science & Technology

    2013-03-01

    is the component of CyberOps that extends cyber power beyond the defensive boundaries of the GIG to detect, deter, deny, and defeat adversaries... economy .16 DDOS attacks are based on multiple, malware infected personal computers, organized into networks called botnets, and are directed by...not condemn the actions of those involved. Of the two attacks on Estonia and Georgia, it was Estonia that had the greatest damage to its economy

  20. Offensive Cybersecurity in the NIST Cybersecurity Framework

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Bulyk, Mykhaylo; Evans, Dr. Nathaniel

    Government and corporate computer systems are attacked, networks are penetrated by hackers, and enterprises are protected by demilitarized zones. Language that until recently was used to describe security and warfare in military settings has now become common-place in cybersecurity discussions. The concepts of pre-emptive attack, counterattack and offensive defense fit the linguistic cultural thread of security in cyberspace, at least in part due to the taxonomy adopted by cybersecurity as a discipline.

  1. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  2. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  3. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED... network security. Each agency head shall ensure that classified information electronically accessed...

  4. Computational Models and Emergent Properties of Respiratory Neural Networks

    PubMed Central

    Lindsey, Bruce G.; Rybak, Ilya A.; Smith, Jeffrey C.

    2012-01-01

    Computational models of the neural control system for breathing in mammals provide a theoretical and computational framework bringing together experimental data obtained from different animal preparations under various experimental conditions. Many of these models were developed in parallel and iteratively with experimental studies and provided predictions guiding new experiments. This data-driven modeling approach has advanced our understanding of respiratory network architecture and neural mechanisms underlying generation of the respiratory rhythm and pattern, including their functional reorganization under different physiological conditions. Models reviewed here vary in neurobiological details and computational complexity and span multiple spatiotemporal scales of respiratory control mechanisms. Recent models describe interacting populations of respiratory neurons spatially distributed within the Bötzinger and pre-Bötzinger complexes and rostral ventrolateral medulla that contain core circuits of the respiratory central pattern generator (CPG). Network interactions within these circuits along with intrinsic rhythmogenic properties of neurons form a hierarchy of multiple rhythm generation mechanisms. The functional expression of these mechanisms is controlled by input drives from other brainstem components, including the retrotrapezoid nucleus and pons, which regulate the dynamic behavior of the core circuitry. The emerging view is that the brainstem respiratory network has rhythmogenic capabilities at multiple levels of circuit organization. This allows flexible, state-dependent expression of different neural pattern-generation mechanisms under various physiological conditions, enabling a wide repertoire of respiratory behaviors. Some models consider control of the respiratory CPG by pulmonary feedback and network reconfiguration during defensive behaviors such as cough. Future directions in modeling of the respiratory CPG are considered. PMID:23687564

  5. Vehicle-network defensive aids suite

    NASA Astrophysics Data System (ADS)

    Rapanotti, John

    2005-05-01

    Defensive Aids Suites (DAS) developed for vehicles can be extended to the vehicle network level. The vehicle network, typically comprising four platoon vehicles, will benefit from improved communications and automation based on low latency response to threats from a flexible, dynamic, self-healing network environment. Improved DAS performance and reliability relies on four complementary sensor technologies including: acoustics, visible and infrared optics, laser detection and radar. Long-range passive threat detection and avoidance is based on dual-purpose optics, primarily designed for manoeuvring, targeting and surveillance, combined with dazzling, obscuration and countermanoeuvres. Short-range active armour is based on search and track radar and intercepting grenades to defeat the threat. Acoustic threat detection increases the overall robustness of the DAS and extends the detection range to include small calibers. Finally, detection of active targeting systems is carried out with laser and radar warning receivers. Synthetic scene generation will provide the integrated environment needed to investigate, develop and validate these new capabilities. Computer generated imagery, based on validated models and an acceptable set of benchmark vignettes, can be used to investigate and develop fieldable sensors driven by real-time algorithms and countermeasure strategies. The synthetic scene environment will be suitable for sensor and countermeasure development in hardware-in-the-loop simulation. The research effort focuses on two key technical areas: a) computing aspects of the synthetic scene generation and b) and development of adapted models and databases. OneSAF is being developed for research and development, in addition to the original requirement of Simulation and Modelling for Acquisition, Rehearsal, Requirements and Training (SMARRT), and is becoming useful as a means for transferring technology to other users, researchers and contractors. This procedure eliminates the need to construct ad hoc models and databases. The vehicle network can be modelled phenomenologically until more information is available. These concepts and approach will be discussed in the paper.

  6. 78 FR 30898 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Rights in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-23

    ... Data and Computer Software AGENCY: Defense Acquisition Regulations System; Department of Defense (DoD... in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software... are associated with rights in technical data and computer software. DoD needs this information to...

  7. 78 FR 45513 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-29

    ...; Computer Matching Program AGENCY: Defense Manpower Data Center (DMDC), DoD. ACTION: Notice of a Computer... individual's privacy, and would result in additional delay in determining eligibility and, if applicable, the... Defense. NOTICE OF A COMPUTER MATCHING PROGRAM AMONG THE DEFENSE MANPOWER DATA CENTER, THE DEPARTMENT OF...

  8. 76 FR 1410 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-01-10

    ...; Computer Matching Program AGENCY: Defense Manpower Data Center (DMDC), DoD. ACTION: Notice of a Computer... administrative burden, constitute a greater intrusion of the individual's privacy, and would result in additional... Liaison Officer, Department of Defense. Notice of a Computer Matching Program Among the Defense Manpower...

  9. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Telecommunications automated information systems and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National... network security. Each agency head shall ensure that classified information electronically accessed...

  10. 32 CFR 2001.50 - Telecommunications automated information systems and network security.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Telecommunications automated information systems and network security. 2001.50 Section 2001.50 National Defense Other Regulations Relating to National... network security. Each agency head shall ensure that classified information electronically accessed...

  11. Critical care and the World Wide Web.

    PubMed

    Varon, J; Marik, P E

    1999-07-01

    The Internet was created in 1969, when the Advanced Research Projects Agency of the United States Department of Defense fired up an experimental network consisting of only four computers. Over the past five years there has been an exponential explosion in the number of computers added to this network. It is estimated that Internet traffic doubles every 100 days with more than 100 million people worldwide now on-line. The Internet is so vast that practically every aspect of human interest is represented is some form or fashion. From recreation to applied science and technology, and from Critical Care Medicine case scenarios to digitized radiology images and pathology specimens, the Internet has become increasingly useful for critical care practitioners. To date, no resource is better equipped to assist critical care providers in many of their daily tasks. This article presents some of the historical developments of the Internet as well as common applications that are useful for critical care practitioners.

  12. Evolution of Hormone Signaling Networks in Plant Defense.

    PubMed

    Berens, Matthias L; Berry, Hannah M; Mine, Akira; Argueso, Cristiana T; Tsuda, Kenichi

    2017-08-04

    Studies with model plants such as Arabidopsis thaliana have revealed that phytohormones are central regulators of plant defense. The intricate network of phytohormone signaling pathways enables plants to activate appropriate and effective defense responses against pathogens as well as to balance defense and growth. The timing of the evolution of most phytohormone signaling pathways seems to coincide with the colonization of land, a likely requirement for plant adaptations to the more variable terrestrial environments, which included the presence of pathogens. In this review, we explore the evolution of defense hormone signaling networks by combining the model plant-based knowledge about molecular components mediating phytohormone signaling and cross talk with available genome information of other plant species. We highlight conserved hubs in hormone cross talk and discuss evolutionary advantages of defense hormone cross talk. Finally, we examine possibilities of engineering hormone cross talk for improvement of plant fitness and crop production.

  13. 78 FR 42080 - Privacy Act of 1974; CMS Computer Match No. 2013-07; HHS Computer Match No. 1303; DoD-DMDC Match...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-15

    ... with the Department of Defense (DoD), Defense Manpower Data Center (DMDC). We have provided background... & Medicaid Services and the Department of Defense, Defense Manpower Data Center for the Determination of...), Centers for Medicare & Medicaid Services (CMS), and Department of Defense (DoD), Defense Manpower Data...

  14. CyberPetri at CDX 2016: Real-time Network Situation Awareness

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arendt, Dustin L.; Best, Daniel M.; Burtner, Edwin R.

    CyberPetri is a novel visualization technique that provides a flexible map of the network based on available characteristics, such as IP address, operating system, or service. Previous work introduced CyberPetri as a visualization feature in Ocelot, a network defense tool that helped security analysts understand and respond to an active defense scenario. In this paper we present a case study in which we use the CyberPetri visualization technique to support real-time situation awareness during the 2016 Cyber Defense Exercise.

  15. Advanced Optical Burst Switched Network Concepts

    NASA Astrophysics Data System (ADS)

    Nejabati, Reza; Aracil, Javier; Castoldi, Piero; de Leenheer, Marc; Simeonidou, Dimitra; Valcarenghi, Luca; Zervas, Georgios; Wu, Jian

    In recent years, as the bandwidth and the speed of networks have increased significantly, a new generation of network-based applications using the concept of distributed computing and collaborative services is emerging (e.g., Grid computing applications). The use of the available fiber and DWDM infrastructure for these applications is a logical choice offering huge amounts of cheap bandwidth and ensuring global reach of computing resources [230]. Currently, there is a great deal of interest in deploying optical circuit (wavelength) switched network infrastructure for distributed computing applications that require long-lived wavelength paths and address the specific needs of a small number of well-known users. Typical users are particle physicists who, due to their international collaborations and experiments, generate enormous amounts of data (Petabytes per year). These users require a network infrastructures that can support processing and analysis of large datasets through globally distributed computing resources [230]. However, providing wavelength granularity bandwidth services is not an efficient and scalable solution for applications and services that address a wider base of user communities with different traffic profiles and connectivity requirements. Examples of such applications may be: scientific collaboration in smaller scale (e.g., bioinformatics, environmental research), distributed virtual laboratories (e.g., remote instrumentation), e-health, national security and defense, personalized learning environments and digital libraries, evolving broadband user services (i.e., high resolution home video editing, real-time rendering, high definition interactive TV). As a specific example, in e-health services and in particular mammography applications due to the size and quantity of images produced by remote mammography, stringent network requirements are necessary. Initial calculations have shown that for 100 patients to be screened remotely, the network would have to securely transport 1.2 GB of data every 30 s [230]. According to the above explanation it is clear that these types of applications need a new network infrastructure and transport technology that makes large amounts of bandwidth at subwavelength granularity, storage, computation, and visualization resources potentially available to a wide user base for specified time durations. As these types of collaborative and network-based applications evolve addressing a wide range and large number of users, it is infeasible to build dedicated networks for each application type or category. Consequently, there should be an adaptive network infrastructure able to support all application types, each with their own access, network, and resource usage patterns. This infrastructure should offer flexible and intelligent network elements and control mechanism able to deploy new applications quickly and efficiently.

  16. Army Communicator. Volume 37, Number 3, Fall 2012

    DTIC Science & Technology

    2012-01-01

    can our cyber defense experts be expected to stop every attack? Think of it like this: do you expect even the best goalie to stop every shot...responsibili- ties of network/system administrators and users. We are pulling Soldiers with IA skills because they understand what is happening in computer net...September 2010. This became a very unique situation in which we were not allowed to bring our CPN with us because of the GRF mission. We pulled all

  17. Strengthening National, Homeland, and Economic Security. Networking and Information Technology Research and Development Supplement to the President’s FY 2003 Budget

    DTIC Science & Technology

    2002-07-01

    Knowledge From Data .................................................. 25 HIGH-CONFIDENCE SOFTWARE AND SYSTEMS Reliability, Security, and Safety for...NOAA’s Cessna Citation flew over the 16-acre World Trade Center site, scanning with an Optech ALSM unit. The system recorded data points from 33,000...provide the data storage and compute power for intelligence analysis, high-performance national defense systems , and critical scientific research • Large

  18. A source-attractor approach to network detection of radiation sources

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Wu, Qishi; Barry, M. L..; Grieme, M.

    Radiation source detection using a network of detectors is an active field of research for homeland security and defense applications. We propose Source-attractor Radiation Detection (SRD) method to aggregate measurements from a network of detectors for radiation source detection. SRD method models a potential radiation source as a magnet -like attractor that pulls in pre-computed virtual points from the detector locations. A detection decision is made if a sufficient level of attraction, quantified by the increase in the clustering of the shifted virtual points, is observed. Compared with traditional methods, SRD has the following advantages: i) it does not requiremore » an accurate estimate of the source location from limited and noise-corrupted sensor readings, unlike the localizationbased methods, and ii) its virtual point shifting and clustering calculation involve simple arithmetic operations based on the number of detectors, avoiding the high computational complexity of grid-based likelihood estimation methods. We evaluate its detection performance using canonical datasets from Domestic Nuclear Detection Office s (DNDO) Intelligence Radiation Sensors Systems (IRSS) tests. SRD achieves both lower false alarm rate and false negative rate compared to three existing algorithms for network source detection.« less

  19. BaffleText: a Human Interactive Proof

    NASA Astrophysics Data System (ADS)

    Chew, Monica; Baird, Henry S.

    2003-01-01

    Internet services designed for human use are being abused by programs. We present a defense against such attacks in the form of a CAPTCHA (Completely Automatic Public Turing test to tell Computers and Humans Apart) that exploits the difference in ability between humans and machines in reading images of text. CAPTCHAs are a special case of 'human interactive proofs,' a broad class of security protocols that allow people to identify themselves over networks as members of given groups. We point out vulnerabilities of reading-based CAPTCHAs to dictionary and computer-vision attacks. We also draw on the literature on the psychophysics of human reading, which suggests fresh defenses available to CAPTCHAs. Motivated by these considerations, we propose BaffleText, a CAPTCHA which uses non-English pronounceable words to defend against dictionary attacks, and Gestalt-motivated image-masking degradations to defend against image restoration attacks. Experiments on human subjects confirm the human legibility and user acceptance of BaffleText images. We have found an image-complexity measure that correlates well with user acceptance and assists in engineering the generation of challenges to fit the ability gap. Recent computer-vision attacks, run independently by Mori and Jitendra, suggest that BaffleText is stronger than two existing CAPTCHAs.

  20. Campus network security model study

    NASA Astrophysics Data System (ADS)

    Zhang, Yong-ku; Song, Li-ren

    2011-12-01

    Campus network security is growing importance, Design a very effective defense hacker attacks, viruses, data theft, and internal defense system, is the focus of the study in this paper. This paper compared the firewall; IDS based on the integrated, then design of a campus network security model, and detail the specific implementation principle.

  1. Acquisition Planning at the Defense Communications Agency.

    DTIC Science & Technology

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  2. Network inference reveals novel connections in pathways regulating growth and defense in the yeast salt response.

    PubMed

    MacGilvray, Matthew E; Shishkova, Evgenia; Chasman, Deborah; Place, Michael; Gitter, Anthony; Coon, Joshua J; Gasch, Audrey P

    2018-05-01

    Cells respond to stressful conditions by coordinating a complex, multi-faceted response that spans many levels of physiology. Much of the response is coordinated by changes in protein phosphorylation. Although the regulators of transcriptome changes during stress are well characterized in Saccharomyces cerevisiae, the upstream regulatory network controlling protein phosphorylation is less well dissected. Here, we developed a computational approach to infer the signaling network that regulates phosphorylation changes in response to salt stress. We developed an approach to link predicted regulators to groups of likely co-regulated phospho-peptides responding to stress, thereby creating new edges in a background protein interaction network. We then use integer linear programming (ILP) to integrate wild type and mutant phospho-proteomic data and predict the network controlling stress-activated phospho-proteomic changes. The network we inferred predicted new regulatory connections between stress-activated and growth-regulating pathways and suggested mechanisms coordinating metabolism, cell-cycle progression, and growth during stress. We confirmed several network predictions with co-immunoprecipitations coupled with mass-spectrometry protein identification and mutant phospho-proteomic analysis. Results show that the cAMP-phosphodiesterase Pde2 physically interacts with many stress-regulated transcription factors targeted by PKA, and that reduced phosphorylation of those factors during stress requires the Rck2 kinase that we show physically interacts with Pde2. Together, our work shows how a high-quality computational network model can facilitate discovery of new pathway interactions during osmotic stress.

  3. Cascade defense via routing in complex networks

    NASA Astrophysics Data System (ADS)

    Xu, Xiao-Lan; Du, Wen-Bo; Hong, Chen

    2015-05-01

    As the cascading failures in networked traffic systems are becoming more and more serious, research on cascade defense in complex networks has become a hotspot in recent years. In this paper, we propose a traffic-based cascading failure model, in which each packet in the network has its own source and destination. When cascade is triggered, packets will be redistributed according to a given routing strategy. Here, a global hybrid (GH) routing strategy, which uses the dynamic information of the queue length and the static information of nodes' degree, is proposed to defense the network cascade. Comparing GH strategy with the shortest path (SP) routing, efficient routing (ER) and global dynamic (GD) routing strategies, we found that GH strategy is more effective than other routing strategies in improving the network robustness against cascading failures. Our work provides insight into the robustness of networked traffic systems.

  4. Network representations of immune system complexity

    PubMed Central

    Subramanian, Naeha; Torabi-Parizi, Parizad; Gottschalk, Rachel A.; Germain, Ronald N.; Dutta, Bhaskar

    2015-01-01

    The mammalian immune system is a dynamic multi-scale system composed of a hierarchically organized set of molecular, cellular and organismal networks that act in concert to promote effective host defense. These networks range from those involving gene regulatory and protein-protein interactions underlying intracellular signaling pathways and single cell responses to increasingly complex networks of in vivo cellular interaction, positioning and migration that determine the overall immune response of an organism. Immunity is thus not the product of simple signaling events but rather non-linear behaviors arising from dynamic, feedback-regulated interactions among many components. One of the major goals of systems immunology is to quantitatively measure these complex multi-scale spatial and temporal interactions, permitting development of computational models that can be used to predict responses to perturbation. Recent technological advances permit collection of comprehensive datasets at multiple molecular and cellular levels while advances in network biology support representation of the relationships of components at each level as physical or functional interaction networks. The latter facilitate effective visualization of patterns and recognition of emergent properties arising from the many interactions of genes, molecules, and cells of the immune system. We illustrate the power of integrating ‘omics’ and network modeling approaches for unbiased reconstruction of signaling and transcriptional networks with a focus on applications involving the innate immune system. We further discuss future possibilities for reconstruction of increasingly complex cellular and organism-level networks and development of sophisticated computational tools for prediction of emergent immune behavior arising from the concerted action of these networks. PMID:25625853

  5. 32 CFR 505.13 - Computer Matching Agreement Program.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Computer Matching Agreement Program. 505.13 Section 505.13 National Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.13 Computer Matching Agreement Program. (a...

  6. DDN (Defense Data Network) Protocol Handbook. Volume 3. Supplement

    DTIC Science & Technology

    1985-12-01

    the physical configuration which results from this arrangement, Michael Padlipsky has described this as the " milking machine" approach to computer...NEIRJS-3 74 NETRJS-4 75 77 79 FINGER 81 HOSTS2-NS 83 MIT-ML-DEV 85 MIT-ML-DEV 87 89 SU-MIT-TG 91 MIT-DOV 93 DCP 95 SUPDUP 97 SWIFT- RVF ...PUP QUOTE RDP RJE RLP RTELNET RVD SAT-EXPAK SAT-MON SFTT? SMTP ST SU-MIT-TG SUNRPC SUPDUP SUR-MEAS SWIFT- RVF TACACS-DS TACNEWS

  7. Stuxnet, Schmitt Analysis, and the Cyber Use-of-Force Debate

    DTIC Science & Technology

    2012-01-01

    demonstration during exercise Bold Alligator 2012 U . S . N av y (J os hu a J. W ah l) 46 JFQ / issue 67, 4 th quarter 2012 ndupress .ndu.edu...language; and Article 51’ s “armed attack ” threshold for self-defense actions. 18 Schmitt, “Computer Network Attack and the Use of Force,” 920. 19...sponsored cyber coercion. More importantly, the prospect of cyber attacks causing physical damage was largely theoretical.4 Beginning Stuxnet, Schmitt

  8. Research on information security in big data era

    NASA Astrophysics Data System (ADS)

    Zhou, Linqi; Gu, Weihong; Huang, Cheng; Huang, Aijun; Bai, Yongbin

    2018-05-01

    Big data is becoming another hotspot in the field of information technology after the cloud computing and the Internet of Things. However, the existing information security methods can no longer meet the information security requirements in the era of big data. This paper analyzes the challenges and a cause of data security brought by big data, discusses the development trend of network attacks under the background of big data, and puts forward my own opinions on the development of security defense in technology, strategy and product.

  9. Dissecting innate immune responses with the tools of systems biology.

    PubMed

    Smith, Kelly D; Bolouri, Hamid

    2005-02-01

    Systems biology strives to derive accurate predictive descriptions of complex systems such as innate immunity. The innate immune system is essential for host defense, yet the resulting inflammatory response must be tightly regulated. Current understanding indicates that this system is controlled by complex regulatory networks, which maintain homoeostasis while accurately distinguishing pathogenic infections from harmless exposures. Recent studies have used high throughput technologies and computational techniques that presage predictive models and will be the foundation of a systems level understanding of innate immunity.

  10. Pathway connectivity and signaling coordination in the yeast stress-activated signaling network

    PubMed Central

    Chasman, Deborah; Ho, Yi-Hsuan; Berry, David B; Nemec, Corey M; MacGilvray, Matthew E; Hose, James; Merrill, Anna E; Lee, M Violet; Will, Jessica L; Coon, Joshua J; Ansari, Aseem Z; Craven, Mark; Gasch, Audrey P

    2014-01-01

    Stressed cells coordinate a multi-faceted response spanning many levels of physiology. Yet knowledge of the complete stress-activated regulatory network as well as design principles for signal integration remains incomplete. We developed an experimental and computational approach to integrate available protein interaction data with gene fitness contributions, mutant transcriptome profiles, and phospho-proteome changes in cells responding to salt stress, to infer the salt-responsive signaling network in yeast. The inferred subnetwork presented many novel predictions by implicating new regulators, uncovering unrecognized crosstalk between known pathways, and pointing to previously unknown ‘hubs’ of signal integration. We exploited these predictions to show that Cdc14 phosphatase is a central hub in the network and that modification of RNA polymerase II coordinates induction of stress-defense genes with reduction of growth-related transcripts. We find that the orthologous human network is enriched for cancer-causing genes, underscoring the importance of the subnetwork's predictions in understanding stress biology. PMID:25411400

  11. Optimal Resource Allocation in Electrical Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Yao, Y; Edmunds, T; Papageorgiou, D

    2004-01-15

    Infrastructure networks supplying electricity, natural gas, water, and other commodities are at risk of disruption due to well-engineered and coordinated terrorist attacks. Countermeasures such as hardening targets, acquisition of spare critical components, and surveillance can be undertaken to detect and deter these attacks. Allocation of available countermeasures resources to sites or activities in a manner that maximizes their effectiveness is a challenging problem. This allocation must take into account the adversary's response after the countermeasure assets are in place and consequence mitigation measures the infrastructure operation can undertake after the attack. The adversary may simply switch strategies to avoid countermeasuresmore » when executing the attack. Stockpiling spares of critical energy infrastructure components has been identified as a key element of a grid infrastructure defense strategy in a recent National Academy of Sciences report [1]. Consider a scenario where an attacker attempts to interrupt the service of an electrical network by disabling some of its facilities while a defender wants to prevent or minimize the effectiveness of any attack. The interaction between the attacker and the defender can be described in three stages: (1) The defender deploys countermeasures, (2) The attacker disrupts the network, and (3) The defender responds to the attack by rerouting power to maintain service while trying to repair damage. In the first stage, the defender considers all possible attack scenarios and deploys countermeasures to defend against the worst scenarios. Countermeasures can include hardening targets, acquiring spare critical components, and installing surveillance devices. In the second stage, the attacker, with full knowledge of the deployed countermeasures, attempts to disable some nodes or links in the network to inflict the greatest loss on the defender. In the third stage, the defender re-dispatches power and restores disabled nodes or links to minimize the loss. The loss can be measured in costs, including the costs of using more expensive generators and the economic losses that can be attributed to loss of load. The defender's goal is to minimize the loss while the attacker wants to maximize it. Assuming some level of budget constraint, each side can only defend or attack a limited number of network elements. When an element is attacked, it is assumed that it will be totally disabled. It is assumed that when an element is defended it cannot be disabled, which may mean that it will be restored in a very short time after being attacked. The rest of the paper is organized as follows. Section 2 will briefly review literature related to multilevel programming and network defense. Section 3 presents a mathematical formulation of the electrical network defense problem. Section 4 describes the solution algorithms. Section 5 discusses computational results. Finally, Sec. 6 explores future research directions.« less

  12. History, structure, and function of the Internet.

    PubMed

    Glowniak, J

    1998-04-01

    The Internet stands at the forefront of telecommunications in medicine. This worldwide system of computers had its beginnings in networking projects in the United States and western Europe in the 1960s and 1970s. The precursor of the Internet was ARPANET, a long-distance telecommunication network funded by the Department of Defense that linked together computers throughout the United States. In the 1980s, ARPANET was superseded by NSFNET, a series of networks created by the National Science Foundation, which established the present-day structure of the Internet. The physical structure of the Internet resembles and is integrated with the telephone system. Long-distance data transport services are provided by large telecommunication companies, called network service providers (NSPs), through high-capacity, high-speed national and international fiber optic cables. These transport services are accessed through Internet service providers, ISPs. ISPs, the equivalent of regional Bell operating companies, provide the physical link to the NSPs for individuals and organizations. Telecommunications on the Internet are standardized by a set of communications protocols, the TCP/IP protocol suite, that describe routing of messages over the Internet, computer naming conventions, and commonly used Internet services such as e-mail. At present, the Internet consists of over 20 million computer worldwide and is continuing to grow at a rapid rate. Along with the growth of the Internet, higher speed access methods are offering a range of new services such as real-time video and voice communications. Medical education, teaching, and research, as well as clinical practice, will be affected in numerous different ways by these advances.

  13. Hybrid network defense model based on fuzzy evaluation.

    PubMed

    Cho, Ying-Chiang; Pan, Jen-Yi

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture.

  14. Indicators of Suicide Found on Social Networks: Phase 2

    DTIC Science & Technology

    2015-10-01

    Engagement in Sport and Suicide Risk. Archives of Suicide Research . 11(4), pp375-390. Chioqueta, A. P. & Stiles, T. C. (2007). The relationship between...Approved for Public Distribution: Distribution Unlimited Defense Personnel and Security Research Center Defense Manpower Data Center Technical...Report 15-04 October 2015 Indicators of Suicide Found on Social Networks: Phase 2 Andrée E. Rose Defense Personnel and Security Research

  15. IP Infrastructure Geolocation

    DTIC Science & Technology

    2015-03-01

    unlimited 13. ABSTRACT (maximum 200 words) Physical network maps are important to critical infrastructure defense and planning. Current state-of...the-art network infrastructure geolocation relies on Domain Name System (DNS) inferences. However, not only is using the DNS relatively inaccurate for...INTENTIONALLY LEFT BLANK iv ABSTRACT Physical network maps are important to critical infrastructure defense and planning. Cur- rent state-of-the-art

  16. On effectiveness of network sensor-based defense framework

    NASA Astrophysics Data System (ADS)

    Zhang, Difan; Zhang, Hanlin; Ge, Linqiang; Yu, Wei; Lu, Chao; Chen, Genshe; Pham, Khanh

    2012-06-01

    Cyber attacks are increasing in frequency, impact, and complexity, which demonstrate extensive network vulnerabilities with the potential for serious damage. Defending against cyber attacks calls for the distributed collaborative monitoring, detection, and mitigation. To this end, we develop a network sensor-based defense framework, with the aim of handling network security awareness, mitigation, and prediction. We implement the prototypical system and show its effectiveness on detecting known attacks, such as port-scanning and distributed denial-of-service (DDoS). Based on this framework, we also implement the statistical-based detection and sequential testing-based detection techniques and compare their respective detection performance. The future implementation of defensive algorithms can be provisioned in our proposed framework for combating cyber attacks.

  17. 77 FR 34941 - Privacy Act of 1974; Notice of a Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-12

    ...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, DoD. ACTION: Notice of a... computer matching program are the Department of Veterans Affairs (VA) and the Defense Manpower Data Center... identified as DMDC 01, entitled ``Defense Manpower Data Center Data Base,'' last published in the Federal...

  18. A Learning System for Discriminating Variants of Malicious Network Traffic

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Beaver, Justin M; Symons, Christopher T; Gillen, Rob

    Modern computer network defense systems rely primarily on signature-based intrusion detection tools, which generate alerts when patterns that are pre-determined to be malicious are encountered in network data streams. Signatures are created reactively, and only after in-depth manual analysis of a network intrusion. There is little ability for signature-based detectors to identify intrusions that are new or even variants of an existing attack, and little ability to adapt the detectors to the patterns unique to a network environment. Due to these limitations, the need exists for network intrusion detection techniques that can more comprehensively address both known unknown networkbased attacksmore » and can be optimized for the target environment. This work describes a system that leverages machine learning to provide a network intrusion detection capability that analyzes behaviors in channels of communication between individual computers. Using examples of malicious and non-malicious traffic in the target environment, the system can be trained to discriminate between traffic types. The machine learning provides insight that would be difficult for a human to explicitly code as a signature because it evaluates many interdependent metrics simultaneously. With this approach, zero day detection is possible by focusing on similarity to known traffic types rather than mining for specific bit patterns or conditions. This also reduces the burden on organizations to account for all possible attack variant combinations through signatures. The approach is presented along with results from a third-party evaluation of its performance.« less

  19. CNN for breaking text-based CAPTCHA with noise

    NASA Astrophysics Data System (ADS)

    Liu, Kaixuan; Zhang, Rong; Qing, Ke

    2017-07-01

    A CAPTCHA ("Completely Automated Public Turing test to tell Computers and Human Apart") system is a program that most humans can pass but current computer programs could hardly pass. As the most common type of CAPTCHAs , text-based CAPTCHA has been widely used in different websites to defense network bots. In order to breaking textbased CAPTCHA, in this paper, two trained CNN models are connected for the segmentation and classification of CAPTCHA images. Then base on these two models, we apply sliding window segmentation and voting classification methods realize an end-to-end CAPTCHA breaking system with high success rate. The experiment results show that our method is robust and effective in breaking text-based CAPTCHA with noise.

  20. 32 CFR 150.7 - Computation of time.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 1 2011-07-01 2011-07-01 false Computation of time. 150.7 Section 150.7 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO..., Sunday, or legal holiday, or, when the act to be done is the filing of a paper in court, a day on which...

  1. 32 CFR 150.7 - Computation of time.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 1 2014-07-01 2014-07-01 false Computation of time. 150.7 Section 150.7 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO..., Sunday, or legal holiday, or, when the act to be done is the filing of a paper in court, a day on which...

  2. 32 CFR 150.7 - Computation of time.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false Computation of time. 150.7 Section 150.7 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO..., Sunday, or legal holiday, or, when the act to be done is the filing of a paper in court, a day on which...

  3. 32 CFR 150.7 - Computation of time.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 1 2013-07-01 2013-07-01 false Computation of time. 150.7 Section 150.7 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO..., Sunday, or legal holiday, or, when the act to be done is the filing of a paper in court, a day on which...

  4. 32 CFR 150.7 - Computation of time.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 1 2012-07-01 2012-07-01 false Computation of time. 150.7 Section 150.7 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE REGULATIONS PERTAINING TO..., Sunday, or legal holiday, or, when the act to be done is the filing of a paper in court, a day on which...

  5. Go Ahead of Malware’s Infections and Controls: Towards New Techniques for Proactive Cyber Defense

    DTIC Science & Technology

    2016-12-08

    in SDN (such as topology poisoning attacks and data-to-control plan saturation attacks) and developed new defense for SDN (such as TopoGuard and... Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures As part of our research on discovering new vulnerabilities...future network- ing paradigm. We demonstrate that this new attacks can effectively poison the network topology information, then further successfully

  6. Toward effectiveness and agility of network security situational awareness using moving target defense (MTD)

    NASA Astrophysics Data System (ADS)

    Ge, Linqiang; Yu, Wei; Shen, Dan; Chen, Genshe; Pham, Khanh; Blasch, Erik; Lu, Chao

    2014-06-01

    Most enterprise networks are built to operate in a static configuration (e.g., static software stacks, network configurations, and application deployments). Nonetheless, static systems make it easy for a cyber adversary to plan and launch successful attacks. To address static vulnerability, moving target defense (MTD) has been proposed to increase the difficulty for the adversary to launch successful attacks. In this paper, we first present a literature review of existing MTD techniques. We then propose a generic defense framework, which can provision an incentive-compatible MTD mechanism through dynamically migrating server locations. We also present a user-server mapping mechanism, which not only improves system resiliency, but also ensures network performance. We demonstrate a MTD with a multi-user network communication and our data shows that the proposed framework can effectively improve the resiliency and agility of the system while achieving good network timeliness and throughput performance.

  7. 75 FR 76426 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ..., access control lists, file system permissions, intrusion detection and prevention systems and log..., address, mailing address, country, organization, phone, fax, mobile, pager, Defense Switched Network (DSN..., address, mailing address, country, organization, phone, fax, mobile, pager, Defense Switched Network (DSN...

  8. 76 FR 56744 - Privacy Act of 1974; Notice of a Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-09-14

    ...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, Department of Defense (DoD... (SSA) and DoD Defense Manpower Data Center (DMDC) that their records are being matched by computer. The... intrusion of the individual's privacy and would result in additional delay in the eventual SSI payment and...

  9. A tale of three bio-inspired computational approaches

    NASA Astrophysics Data System (ADS)

    Schaffer, J. David

    2014-05-01

    I will provide a high level walk-through for three computational approaches derived from Nature. First, evolutionary computation implements what we may call the "mother of all adaptive processes." Some variants on the basic algorithms will be sketched and some lessons I have gleaned from three decades of working with EC will be covered. Then neural networks, computational approaches that have long been studied as possible ways to make "thinking machines", an old dream of man's, and based upon the only known existing example of intelligence. Then, a little overview of attempts to combine these two approaches that some hope will allow us to evolve machines we could never hand-craft. Finally, I will touch on artificial immune systems, Nature's highly sophisticated defense mechanism, that has emerged in two major stages, the innate and the adaptive immune systems. This technology is finding applications in the cyber security world.

  10. Ecological Interface Design for Computer Network Defense.

    PubMed

    Bennett, Kevin B; Bryant, Adam; Sushereba, Christen

    2018-05-01

    A prototype ecological interface for computer network defense (CND) was developed. Concerns about CND run high. Although there is a vast literature on CND, there is some indication that this research is not being translated into operational contexts. Part of the reason may be that CND has historically been treated as a strictly technical problem, rather than as a socio-technical problem. The cognitive systems engineering (CSE)/ecological interface design (EID) framework was used in the analysis and design of the prototype interface. A brief overview of CSE/EID is provided. EID principles of design (i.e., direct perception, direct manipulation and visual momentum) are described and illustrated through concrete examples from the ecological interface. Key features of the ecological interface include (a) a wide variety of alternative visual displays, (b) controls that allow easy, dynamic reconfiguration of these displays, (c) visual highlighting of functionally related information across displays, (d) control mechanisms to selectively filter massive data sets, and (e) the capability for easy expansion. Cyber attacks from a well-known data set are illustrated through screen shots. CND support needs to be developed with a triadic focus (i.e., humans interacting with technology to accomplish work) if it is to be effective. Iterative design and formal evaluation is also required. The discipline of human factors has a long tradition of success on both counts; it is time that HF became fully involved in CND. Direct application in supporting cyber analysts.

  11. Artificial neural networks as quantum associative memory

    NASA Astrophysics Data System (ADS)

    Hamilton, Kathleen; Schrock, Jonathan; Imam, Neena; Humble, Travis

    We present results related to the recall accuracy and capacity of Hopfield networks implemented on commercially available quantum annealers. The use of Hopfield networks and artificial neural networks as content-addressable memories offer robust storage and retrieval of classical information, however, implementation of these models using currently available quantum annealers faces several challenges: the limits of precision when setting synaptic weights, the effects of spurious spin-glass states and minor embedding of densely connected graphs into fixed-connectivity hardware. We consider neural networks which are less than fully-connected, and also consider neural networks which contain multiple sparsely connected clusters. We discuss the effect of weak edge dilution on the accuracy of memory recall, and discuss how the multiple clique structure affects the storage capacity. Our work focuses on storage of patterns which can be embedded into physical hardware containing n < 1000 qubits. This work was supported by the United States Department of Defense and used resources of the Computational Research and Development Programs as Oak Ridge National Laboratory under Contract No. DE-AC0500OR22725 with the U. S. Department of Energy.

  12. Neural network pattern recognition of thermal-signature spectra for chemical defense

    NASA Astrophysics Data System (ADS)

    Carrieri, Arthur H.; Lim, Pascal I.

    1995-05-01

    We treat infrared patterns of absorption or emission by nerve and blister agent compounds (and simulants of this chemical group) as features for the training of neural networks to detect the compounds' liquid layers on the ground or their vapor plumes during evaporation by external heating. Training of a four-layer network architecture is composed of a backward-error-propagation algorithm and a gradient-descent paradigm. We conduct testing by feed-forwarding preprocessed spectra through the network in a scaled format consistent with the structure of the training-data-set representation. The best-performance weight matrix (spectral filter) evolved from final network training and testing with software simulation trials is electronically transferred to a set of eight artificial intelligence integrated circuits (ICs') in specific modular form (splitting of weight matrices). This form makes full use of all input-output IC nodes. This neural network computer serves an important real-time detection function when it is integrated into pre-and postprocessing data-handling units of a tactical prototype thermoluminescence sensor now under development at the Edgewood Research, Development, and Engineering Center.

  13. Research on moving target defense based on SDN

    NASA Astrophysics Data System (ADS)

    Chen, Mingyong; Wu, Weimin

    2017-08-01

    An address mutation strategy was proposed. This strategy provided an unpredictable change in address, replacing the real address of the packet forwarding process and path mutation, thus hiding the real address of the host and path. a mobile object defense technology based on Spatio-temporal Mutation on this basis is proposed, Using the software Defined Network centralized control architecture advantage combines sFlow traffic monitoring technology and Moving Target Defense. A mutated time period which can be changed in real time according to the network traffic is changed, and the destination address is changed while the controller abruptly changes the address while the data packet is transferred between the switches to construct a moving target, confusing the host within the network, thereby protecting the host and network.

  14. Hybrid Network Defense Model Based on Fuzzy Evaluation

    PubMed Central

    2014-01-01

    With sustained and rapid developments in the field of information technology, the issue of network security has become increasingly prominent. The theme of this study is network data security, with the test subject being a classified and sensitive network laboratory that belongs to the academic network. The analysis is based on the deficiencies and potential risks of the network's existing defense technology, characteristics of cyber attacks, and network security technologies. Subsequently, a distributed network security architecture using the technology of an intrusion prevention system is designed and implemented. In this paper, first, the overall design approach is presented. This design is used as the basis to establish a network defense model, an improvement over the traditional single-technology model that addresses the latter's inadequacies. Next, a distributed network security architecture is implemented, comprising a hybrid firewall, intrusion detection, virtual honeynet projects, and connectivity and interactivity between these three components. Finally, the proposed security system is tested. A statistical analysis of the test results verifies the feasibility and reliability of the proposed architecture. The findings of this study will potentially provide new ideas and stimuli for future designs of network security architecture. PMID:24574870

  15. NASA high performance computing, communications, image processing, and data visualization-potential applications to medicine.

    PubMed

    Kukkonen, C A

    1995-06-01

    High-speed information processing technologies being developed and applied by the Jet Propulsion Laboratory for NASA and Department of Defense mission needs have potential dual-uses in telemedicine and other medical applications. Fiber optic ground networks connected with microwave satellite links allow NASA to communicate with its astronauts in Earth orbit or on the moon, and with its deep space probes billions of miles away. These networks monitor the health of astronauts and or robotic spacecraft. Similar communications technology will also allow patients to communicate with doctors anywhere on Earth. NASA space missions have science as a major objective. Science sensors have become so sophisticated that they can take more data than our scientists can analyze by hand. High performance computers--workstations, supercomputer and massively parallel computers are being used to transform this data into knowledge. This is done using image processing, data visualization and other techniques to present the data--one's and zero's in forms that a human analyst can readily relate to and understand. Medical sensors have also explored in the in data output--witness CT scans, MRI, and ultrasound. This data must be presented in visual form and computers will allow routine combination of many two dimensional MRI images into three dimensional reconstructions of organs that then can be fully examined by physicians. Emerging technologies such as neural networks that are being "trained" to detect craters on planets or incoming missiles amongst decoys can be used to identify microcalcification in mammograms.

  16. Analysis of Network Address Shuffling as a Moving Target Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Carroll, Thomas E.; Crouse, Michael B.; Fulp, Errin W.

    2014-06-10

    Address shuffling is a type of moving target defense that prevents an attacker from reliably contacting a system by periodically remapping network addresses. Although limited testing has demonstrated it to be effective, little research has been conducted to examine the theoretical limits of address shuffling. As a result, it is difficult to understand how effective shuffling is and under what circumstances it is a viable moving target defense. This paper introduces probabilistic models that can provide insight into the performance of address shuffling. These models quantify the probability of attacker success in terms of network size, quantity of addresses scanned,more » quantity of vulnerable systems, and the frequency of shuffling. Theoretical analysis will show that shuffling is an acceptable defense if there is a small population of vulnerable systems within a large network address space, however shuffling has a cost for legitimate users. These results will also be shown empirically using simulation and actual traffic traces.« less

  17. Holographic neural networks versus conventional neural networks: a comparative evaluation for the classification of landmine targets in ground-penetrating radar images

    NASA Astrophysics Data System (ADS)

    Mudigonda, Naga R.; Kacelenga, Ray; Edwards, Mark

    2004-09-01

    This paper evaluates the performance of a holographic neural network in comparison with a conventional feedforward backpropagation neural network for the classification of landmine targets in ground penetrating radar images. The data used in the study was acquired from four different test sites using the landmine detection system developed by General Dynamics Canada Ltd., in collaboration with the Defense Research and Development Canada, Suffield. A set of seven features extracted for each detected alarm is used as stimulus inputs for the networks. The recall responses of the networks are then evaluated against the ground truth to declare true or false detections. The area computed under the receiver operating characteristic curve is used for comparative purposes. With a large dataset comprising of data from multiple sites, both the holographic and conventional networks showed comparable trends in recall accuracies with area values of 0.88 and 0.87, respectively. By using independent validation datasets, the holographic network"s generalization performance was observed to be better (mean area = 0.86) as compared to the conventional network (mean area = 0.82). Despite the widely publicized theoretical advantages of the holographic technology, use of more than the required number of cortical memory elements resulted in an over-fitting phenomenon of the holographic network.

  18. Human Computer Interface Design Criteria. Volume 1. User Interface Requirements

    DTIC Science & Technology

    2010-03-19

    Television tuners, including tuner cards for use in computers, shall be equipped with secondary audio program playback circuitry. (c) All training...Shelf CSS Cascading Style Sheets DII Defense Information Infrastructure DISA Defense Information Systems Agency DoD Department of Defense

  19. Defense strategies for asymmetric networked systems under composite utilities

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Rao, Nageswara S.; Ma, Chris Y. T.; Hausken, Kjell

    We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the infrastructure failure probability giventhe failure of an individual system or network, and (b) first order differential conditions on system survival probabilities that characterize component-level correlations. We formulate an infrastructure survival game between an attacker and a provider, who attacks and reinforces individual components, respectively.more » They use the composite utility functions composed of a survival probability term and a cost term, and the previously studiedsum-form and product-form utility functions are their special cases. At Nash Equilibrium, we derive expressions for individual system survival probabilities and the expected total number of operational components. We apply and discuss these estimates for a simplified model of distributed cloud computing infrastructure« less

  20. A design philosophy for multi-layer neural networks with applications to robot control

    NASA Technical Reports Server (NTRS)

    Vadiee, Nader; Jamshidi, MO

    1989-01-01

    A system is proposed which receives input information from many sensors that may have diverse scaling, dimension, and data representations. The proposed system tolerates sensory information with faults. The proposed self-adaptive processing technique has great promise in integrating the techniques of artificial intelligence and neural networks in an attempt to build a more intelligent computing environment. The proposed architecture can provide a detailed decision tree based on the input information, information stored in a long-term memory, and the adapted rule-based knowledge. A mathematical model for analysis will be obtained to validate the cited hypotheses. An extensive software program will be developed to simulate a typical example of pattern recognition problem. It is shown that the proposed model displays attention, expectation, spatio-temporal, and predictory behavior which are specific to the human brain. The anticipated results of this research project are: (1) creation of a new dynamic neural network structure, and (2) applications to and comparison with conventional multi-layer neural network structures. The anticipated benefits from this research are vast. The model can be used in a neuro-computer architecture as a building block which can perform complicated, nonlinear, time-varying mapping from a multitude of input excitory classes to an output or decision environment. It can be used for coordinating different sensory inputs and past experience of a dynamic system and actuating signals. The commercial applications of this project can be the creation of a special-purpose neuro-computer hardware which can be used in spatio-temporal pattern recognitions in such areas as air defense systems, e.g., target tracking, and recognition. Potential robotics-related applications are trajectory planning, inverse dynamics computations, hierarchical control, task-oriented control, and collision avoidance.

  1. Managing Errors to Reduce Accidents in High Consequence Networked Information Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Ganter, J.H.

    1999-02-01

    Computers have always helped to amplify and propagate errors made by people. The emergence of Networked Information Systems (NISs), which allow people and systems to quickly interact worldwide, has made understanding and minimizing human error more critical. This paper applies concepts from system safety to analyze how hazards (from hackers to power disruptions) penetrate NIS defenses (e.g., firewalls and operating systems) to cause accidents. Such events usually result from both active, easily identified failures and more subtle latent conditions that have resided in the system for long periods. Both active failures and latent conditions result from human errors. We classifymore » these into several types (slips, lapses, mistakes, etc.) and provide NIS examples of how they occur. Next we examine error minimization throughout the NIS lifecycle, from design through operation to reengineering. At each stage, steps can be taken to minimize the occurrence and effects of human errors. These include defensive design philosophies, architectural patterns to guide developers, and collaborative design that incorporates operational experiences and surprises into design efforts. We conclude by looking at three aspects of NISs that will cause continuing challenges in error and accident management: immaturity of the industry, limited risk perception, and resource tradeoffs.« less

  2. DDN (Defense Data Network) New User Guide

    DTIC Science & Technology

    1987-11-01

    0 -944604-00- 5 ,X UNIX is a registered trademark of AT&T Bell Laboratories...21 S 0 0 N S MR A 0w l.a. . ,d. s:’V * ,t*. P.. 0 64 INDEX Access Code 14, 24 Host computer 5 , 6 Acoustic coupler 18 Hostname 16 AMC 50 ARPANET...groups. U DTIC0 0 I NI ’u1ld 1A LJ ; .:r .: ,c d - J•,:: •’: ,, ,:.3 . I1..... .. < , • .. _’’ "LY"_."_,...! ( • ••: •,a•.. -•.¢."....

  3. Active vision and image/video understanding with decision structures based on the network-symbolic models

    NASA Astrophysics Data System (ADS)

    Kuvich, Gary

    2003-08-01

    Vision is a part of a larger information system that converts visual information into knowledge structures. These structures drive vision process, resolve ambiguity and uncertainty via feedback projections, and provide image understanding that is an interpretation of visual information in terms of such knowledge models. The ability of human brain to emulate knowledge structures in the form of networks-symbolic models is found. And that means an important shift of paradigm in our knowledge about brain from neural networks to "cortical software". Symbols, predicates and grammars naturally emerge in such active multilevel hierarchical networks, and logic is simply a way of restructuring such models. Brain analyzes an image as a graph-type decision structure created via multilevel hierarchical compression of visual information. Mid-level vision processes like clustering, perceptual grouping, separation of figure from ground, are special kinds of graph/network transformations. They convert low-level image structure into the set of more abstract ones, which represent objects and visual scene, making them easy for analysis by higher-level knowledge structures. Higher-level vision phenomena are results of such analysis. Composition of network-symbolic models works similar to frames and agents, combines learning, classification, analogy together with higher-level model-based reasoning into a single framework. Such models do not require supercomputers. Based on such principles, and using methods of Computational intelligence, an Image Understanding system can convert images into the network-symbolic knowledge models, and effectively resolve uncertainty and ambiguity, providing unifying representation for perception and cognition. That allows creating new intelligent computer vision systems for robotic and defense industries.

  4. Protecting Networks Via Automated Defense of Cyber Systems

    DTIC Science & Technology

    2016-09-01

    autonomics, and artificial intelligence . Our conclusion is that automation is the future of cyber defense, and that advances are being made in each of...SUBJECT TERMS Internet of Things, autonomics, sensors, artificial intelligence , cyber defense, active cyber defense, automated indicator sharing...called Automated Defense of Cyber Systems, built upon three core technological components: sensors, autonomics, and artificial intelligence . Our

  5. 47 CFR 68.2 - Scope.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... EQUIPMENT TO THE TELEPHONE NETWORK General § 68.2 Scope. (a) Except as provided in paragraphs (b) and (c) of... public switched telephone network for use in conjunction with all services other than party line services. (b) National defense and security. Where the Secretary of Defense or authorized agent or the head of...

  6. 47 CFR 68.2 - Scope.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... EQUIPMENT TO THE TELEPHONE NETWORK General § 68.2 Scope. (a) Except as provided in paragraphs (b) and (c) of... public switched telephone network for use in conjunction with all services other than party line services. (b) National defense and security. Where the Secretary of Defense or authorized agent or the head of...

  7. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  8. M/A-COM linkabit eastern operations

    NASA Astrophysics Data System (ADS)

    Mills, D. L.; Avramovic, Z.

    1983-03-01

    This first Quarterly Project Report on LINKABIT's contribution to the Defense Advanced Research Projects Agency (DARPA) Internet Program covers the period from 22 December 1982 through 21 March 1983. LINKABIT's support of the Internet Program is concentrated in the areas of protocol design, implementation, testing, and evaluation. In addition, LINKABIT staff are providing integration and support services for certain computer systems to be installed at DARPA sites in Washington, D.C., and Stuttgart, West Germany. During the period covered by this report, LINKABIT organized the project activities and established staff responsibilities. Several computers and peripheral devices were made available from Government sources for use in protocol development and network testing. Considerable time was devoted to installing this equipment, integrating the software, and testing it with the Internet system.

  9. 32 CFR 310.52 - Computer matching publication and review requirements.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Computer matching publication and review... OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.52 Computer matching publication and review requirements. (a) DoD Components shall identify the...

  10. 32 CFR 310.52 - Computer matching publication and review requirements.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Computer matching publication and review... OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.52 Computer matching publication and review requirements. (a) DoD Components shall identify the...

  11. 32 CFR 310.52 - Computer matching publication and review requirements.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Computer matching publication and review... OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.52 Computer matching publication and review requirements. (a) DoD Components shall identify the...

  12. 32 CFR 310.52 - Computer matching publication and review requirements.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Computer matching publication and review... OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.52 Computer matching publication and review requirements. (a) DoD Components shall identify the...

  13. 32 CFR 310.52 - Computer matching publication and review requirements.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Computer matching publication and review... OF DEFENSE (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.52 Computer matching publication and review requirements. (a) DoD Components shall identify the...

  14. Application of the Strategic Alignment Model and Information Technology Governance Concepts to Support Network Centric Warfare

    DTIC Science & Technology

    2006-03-01

    Defense, Editor. 2001. 12. Defense, D.o., Department of Defense Architecture Framework Deskbook. 2004, Department of Defense. 13. Denzin , N. and...Y. Lincoln , Handbook of Qualitative Research. 2000, California: Sage. 14. Flick, U., An Introduction to Qualitative research: Theory, method and

  15. TRUSS: An intelligent design system for aircraft wings

    NASA Technical Reports Server (NTRS)

    Bates, Preston R.; Schrage, Daniel P.

    1989-01-01

    Competitive leadership in the international marketplace, superiority in national defense, excellence in productivity, and safety of both private and public systems are all national defense goals which are dependent on superior engineering design. In recent years, it has become more evident that early design decisions are critical, and when only based on performance often result in products which are too expensive, hard to manufacture, or unsupportable. Better use of computer-aided design tools and information-based technologies is required to produce better quality United States products. A program is outlined here to explore the use of knowledge based expert systems coupled with numerical optimization, database management techniques, and designer interface methods in a networked design environment to improve and assess design changes due to changing emphasis or requirements. The initial structural design of a tiltrotor aircraft wing is used as a representative example to demonstrate the approach being followed.

  16. 75 FR 6185 - Information Collection Requirement; Defense Federal Acquisition Regulation Supplement; Rights in...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-08

    ...; Defense Federal Acquisition Regulation Supplement; Rights in Technical Data and Computer Software (OMB... 227.72, Rights in Computer Software and Computer Software Documentation, and related provisions and... rights in technical data and computer software. DoD needs this information to implement 10 U.S.C. 2320...

  17. NSI customer service representatives and user support office: NASA Science Internet

    NASA Technical Reports Server (NTRS)

    1991-01-01

    The NASA Science Internet, (NSI) was established in 1987 to provide NASA's Offices of Space Science and Applications (OSSA) missions with transparent wide-area data connectivity to NASA's researchers, computational resources, and databases. The NSI Office at NASA/Ames Research Center has the lead responsibility for implementing a total, open networking program to serve the OSSA community. NSI is a full-service communications provider whose services include science network planning, network engineering, applications development, network operations, and network information center/user support services. NSI's mission is to provide reliable high-speed communications to the NASA science community. To this end, the NSI Office manages and operates the NASA Science Internet, a multiprotocol network currently supporting both DECnet and TCP/IP protocols. NSI utilizes state-of-the-art network technology to meet its customers' requirements. THe NASA Science Internet interconnects with other national networks including the National Science Foundation's NSFNET, the Department of Energy's ESnet, and the Department of Defense's MILNET. NSI also has international connections to Japan, Australia, New Zealand, Chile, and several European countries. NSI cooperates with other government agencies as well as academic and commercial organizations to implement networking technologies which foster interoperability, improve reliability and performance, increase security and control, and expedite migration to the OSI protocols.

  18. PROJMNG FORTRAN: An Interactive Computer Program for Use with the Defense Management Simulation Exercise.

    DTIC Science & Technology

    1984-03-01

    DITACODE TEAfxx. They are used interactively by PRCJNG during the game sessions. The PROJENG Instructions (Appendix F) discuss the DATABASE and DATACODE...DA.7R148 709 PROJMNG FORTRAN: AN INTERACTIVE COMPUTER PROGRAM FOR 1/4 USE WITH THE DEFENSE MANAGEMENT SIMULRTION EXERCISE(U) NAVRL POSTGRADUATE...California DTIC ELECTE Y4 194 THESISB PROJMNG FORTRAN: AN INTERACTIVE COMPUTER PROGRAM FOR USE WITH THE DEFENSE MANAGEMENT SIMULATION EXERCISE by LU

  19. Effector-triggered immunity: from pathogen perception to robust defense.

    PubMed

    Cui, Haitao; Tsuda, Kenichi; Parker, Jane E

    2015-01-01

    In plant innate immunity, individual cells have the capacity to sense and respond to pathogen attack. Intracellular recognition mechanisms have evolved to intercept perturbations by pathogen virulence factors (effectors) early in host infection and convert it to rapid defense. One key to resistance success is a polymorphic family of intracellular nucleotide-binding/leucine-rich-repeat (NLR) receptors that detect effector interference in different parts of the cell. Effector-activated NLRs connect, in various ways, to a conserved basal resistance network in order to transcriptionally boost defense programs. Effector-triggered immunity displays remarkable robustness against pathogen disturbance, in part by employing compensatory mechanisms within the defense network. Also, the mobility of some NLRs and coordination of resistance pathways across cell compartments provides flexibility to fine-tune immune outputs. Furthermore, a number of NLRs function close to the nuclear chromatin by balancing actions of defense-repressing and defense-activating transcription factors to program cells dynamically for effective disease resistance.

  20. An Integrated Bibliographic Information System: Concept and Application for Resource Sharing in Special Libraries.

    ERIC Educational Resources Information Center

    Cotter, Gladys A.; And Others

    The Defense Department Scientific and Technical Information (STI) network is composed of over 200 technical libraries and information centers tied together by the Defense Technical Information Center (DTIC), an organization which seeks to improve the flow of information throughout the STI network by promoting shared cataloging and integrated…

  1. Mathematical defense method of networked servers with controlled remote backups

    NASA Astrophysics Data System (ADS)

    Kim, Song-Kyoo

    2006-05-01

    The networked server defense model is focused on reliability and availability in security respects. The (remote) backup servers are hooked up by VPN (Virtual Private Network) with high-speed optical network and replace broken main severs immediately. The networked server can be represent as "machines" and then the system deals with main unreliable, spare, and auxiliary spare machine. During vacation periods, when the system performs a mandatory routine maintenance, auxiliary machines are being used for back-ups; the information on the system is naturally delayed. Analog of the N-policy to restrict the usage of auxiliary machines to some reasonable quantity. The results are demonstrated in the network architecture by using the stochastic optimization techniques.

  2. An Efficient Location Verification Scheme for Static Wireless Sensor Networks.

    PubMed

    Kim, In-Hwan; Kim, Bo-Sung; Song, JooSeok

    2017-01-24

    In wireless sensor networks (WSNs), the accuracy of location information is vital to support many interesting applications. Unfortunately, sensors have difficulty in estimating their location when malicious sensors attack the location estimation process. Even though secure localization schemes have been proposed to protect location estimation process from attacks, they are not enough to eliminate the wrong location estimations in some situations. The location verification can be the solution to the situations or be the second-line defense. The problem of most of the location verifications is the explicit involvement of many sensors in the verification process and requirements, such as special hardware, a dedicated verifier and the trusted third party, which causes more communication and computation overhead. In this paper, we propose an efficient location verification scheme for static WSN called mutually-shared region-based location verification (MSRLV), which reduces those overheads by utilizing the implicit involvement of sensors and eliminating several requirements. In order to achieve this, we use the mutually-shared region between location claimant and verifier for the location verification. The analysis shows that MSRLV reduces communication overhead by 77% and computation overhead by 92% on average, when compared with the other location verification schemes, in a single sensor verification. In addition, simulation results for the verification of the whole network show that MSRLV can detect the malicious sensors by over 90% when sensors in the network have five or more neighbors.

  3. An Efficient Location Verification Scheme for Static Wireless Sensor Networks

    PubMed Central

    Kim, In-hwan; Kim, Bo-sung; Song, JooSeok

    2017-01-01

    In wireless sensor networks (WSNs), the accuracy of location information is vital to support many interesting applications. Unfortunately, sensors have difficulty in estimating their location when malicious sensors attack the location estimation process. Even though secure localization schemes have been proposed to protect location estimation process from attacks, they are not enough to eliminate the wrong location estimations in some situations. The location verification can be the solution to the situations or be the second-line defense. The problem of most of the location verifications is the explicit involvement of many sensors in the verification process and requirements, such as special hardware, a dedicated verifier and the trusted third party, which causes more communication and computation overhead. In this paper, we propose an efficient location verification scheme for static WSN called mutually-shared region-based location verification (MSRLV), which reduces those overheads by utilizing the implicit involvement of sensors and eliminating several requirements. In order to achieve this, we use the mutually-shared region between location claimant and verifier for the location verification. The analysis shows that MSRLV reduces communication overhead by 77% and computation overhead by 92% on average, when compared with the other location verification schemes, in a single sensor verification. In addition, simulation results for the verification of the whole network show that MSRLV can detect the malicious sensors by over 90% when sensors in the network have five or more neighbors. PMID:28125007

  4. Report of the Defense Science Board Task Force on Defensive Information Operations. 2000 Summer Study. Volume II

    DTIC Science & Technology

    2001-03-01

    distinguishing between attacks and other events such as accidents, system failures, or hacking by thrill-seekers. This challenge is exacerbated by the...and is referred to as Signaling System # 7 ( SS7 ). Commercial Intelligent Network Architecture Switching Signal Point (SSP) Service - Originates...Wireless access point to fixed infrastructure Ut c Signaling Transfer Point (STP) - Packet switch in CCITT#7 Network SP SW SS7 System Data Bases Network

  5. Predicting and Detecting Emerging Cyberattack Patterns Using StreamWorks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Chin, George; Choudhury, Sutanay; Feo, John T.

    2014-06-30

    The number and sophistication of cyberattacks on industries and governments have dramatically grown in recent years. To counter this movement, new advanced tools and techniques are needed to detect cyberattacks in their early stages such that defensive actions may be taken to avert or mitigate potential damage. From a cybersecurity analysis perspective, detecting cyberattacks may be cast as a problem of identifying patterns in computer network traffic. Logically and intuitively, these patterns may take on the form of a directed graph that conveys how an attack or intrusion propagates through the computers of a network. Such cyberattack graphs could providemore » cybersecurity analysts with powerful conceptual representations that are natural to express and analyze. We have been researching and developing graph-centric approaches and algorithms for dynamic cyberattack detection. The advanced dynamic graph algorithms we are developing will be packaged into a streaming network analysis framework known as StreamWorks. With StreamWorks, a scientist or analyst may detect and identify precursor events and patterns as they emerge in complex networks. This analysis framework is intended to be used in a dynamic environment where network data is streamed in and is appended to a large-scale dynamic graph. Specific graphical query patterns are decomposed and collected into a graph query library. The individual decomposed subpatterns in the library are continuously and efficiently matched against the dynamic graph as it evolves to identify and detect early, partial subgraph patterns. The scalable emerging subgraph pattern algorithms will match on both structural and semantic network properties.« less

  6. DEFENSE ENVIRONMENTAL NETWORK AND INFORMATION EXCHANGE (DENIX)

    EPA Science Inventory

    DENIX serves as a central platform for the dissemination of environment, safety and occupational health (ESOH) news, policy, and guidance within Department of Defense (DoD) activities worldwide, in support of the national defense mission. DENIX informs ESOH professionals of salie...

  7. Analytics for Cyber Network Defense

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Plantenga, Todd.; Kolda, Tamara Gibson

    2011-06-01

    This report provides a brief survey of analytics tools considered relevant to cyber network defense (CND). Ideas and tools come from elds such as statistics, data mining, and knowledge discovery. Some analytics are considered standard mathematical or statistical techniques, while others re ect current research directions. In all cases the report attempts to explain the relevance to CND with brief examples.

  8. Towards an integrated defense system for cyber security situation awareness experiment

    NASA Astrophysics Data System (ADS)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  9. 76 FR 14669 - Privacy Act of 1974; CMS Computer Match No. 2011-02; HHS Computer Match No. 1007

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-03-17

    ... (CMS); and Department of Defense (DoD), Manpower Data Center (DMDC), Defense Enrollment and Eligibility... the results of the computer match and provide the information to TMA for use in its matching program... under TRICARE. DEERS will receive the results of the computer match and provide the information provided...

  10. 76 FR 50460 - Privacy Act of 1974; Notice of a Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-15

    ...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, Department of Defense (DoD). ACTION: Notice of a Computer Matching Program. SUMMARY: Subsection (e)(12) of the Privacy Act of 1974, as amended, (5 U.S.C. 552a) requires agencies to publish advance notice of any proposed or revised computer...

  11. 76 FR 77811 - Privacy Act of 1974; Notice of a Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-12-14

    ...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, Department of Defense (DoD). ACTION: Notice of a Computer Matching Program. SUMMARY: Subsection (e)(12) of the Privacy Act of 1974, as amended, (5 U.S.C. 552a) requires agencies to publish advance notice of any proposed or revised computer...

  12. The Use of Personal Information Technology in Military Area of Operations

    DTIC Science & Technology

    2013-04-19

    Mauhew FlrDll Approved: .19𔄁. Fly. DiI !e:(c=i , . imes f ut T T a l nt (’J11 i 1 b s rscml i at i: llOl lY l ta " TTED LL E U · in Of(l l...more capable and enable Coast Guard members to access the network. The Defense department is testing Android and iOS devices with CAC card ...Access Card authorizes use on desktop computers.48 Another item of concern as the military attempts to move into the PIT realm is who is making the

  13. Identification of infection- and defense-related genes via a dynamic host-pathogen interaction network using a Candida albicans-zebrafish infection model.

    PubMed

    Kuo, Zong-Yu; Chuang, Yung-Jen; Chao, Chun-Cheih; Liu, Fu-Chen; Lan, Chung-Yu; Chen, Bor-Sen

    2013-01-01

    Candida albicans infections and candidiasis are difficult to treat and create very serious therapeutic challenges. In this study, based on interactive time profile microarray data of C. albicans and zebrafish during infection, the infection-related protein-protein interaction (PPI) networks of the two species and the intercellular PPI network between host and pathogen were simultaneously constructed by a dynamic interaction model, modeled as an integrated network consisting of intercellular invasion and cellular defense processes during infection. The signal transduction pathways in regulating morphogenesis and hyphal growth of C. albicans were further investigated based on significant interactions found in the intercellular PPI network. Two cellular networks were also developed corresponding to the different infection stages (adhesion and invasion), and then compared with each other to identify proteins from which we can gain more insight into the pathogenic role of hyphal development in the C. albicans infection process. Important defense-related proteins in zebrafish were predicted using the same approach. The hyphal growth PPI network, zebrafish PPI network and host-pathogen intercellular PPI network were combined to form an integrated infectious PPI network that helps us understand the systematic mechanisms underlying the pathogenicity of C. albicans and the immune response of the host, and may help improve medical therapies and facilitate the development of new antifungal drugs. Copyright © 2013 S. Karger AG, Basel.

  14. Fusarium oxysporum f.sp. ciceri Race 1 Induced Redox State Alterations Are Coupled to Downstream Defense Signaling in Root Tissues of Chickpea (Cicer arietinum L.)

    PubMed Central

    Chatterjee, Moniya; Das, Sampa

    2013-01-01

    Reactive oxygen species are known to play pivotal roles in pathogen perception, recognition and downstream defense signaling. But, how these redox alarms coordinate in planta into a defensive network is still intangible. Present study illustrates the role of Fusarium oxysporum f.sp ciceri Race1 (Foc1) induced redox responsive transcripts in regulating downstream defense signaling in chickpea. Confocal microscopic studies highlighted pathogen invasion and colonization accompanied by tissue damage and deposition of callose degraded products at the xylem vessels of infected roots of chickpea plants. Such depositions led to the clogging of xylem vessels in compatible hosts while the resistant plants were devoid of such obstructions. Lipid peroxidation assays also indicated fungal induced membrane injury. Cell shrinkage and gradual nuclear adpression appeared as interesting features marking fungal ingress. Quantitative real time polymerase chain reaction exhibited differential expression patterns of redox regulators, cellular transporters and transcription factors during Foc1 progression. Network analysis showed redox regulators, cellular transporters and transcription factors to coordinate into a well orchestrated defensive network with sugars acting as internal signal modulators. Respiratory burst oxidase homologue, cationic peroxidase, vacuolar sorting receptor, polyol transporter, sucrose synthase, and zinc finger domain containing transcription factor appeared as key molecular candidates controlling important hubs of the defense network. Functional characterization of these hub controllers may prove to be promising in understanding chickpea–Foc1 interaction and developing the case study as a model for looking into the complexities of wilt diseases of other important crop legumes. PMID:24058463

  15. Federal Emergency Management Information System (FEMIS) System Administration Guide for FEMIS Version 1.4.6

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arp, J.A.; Bower, J.C.; Burnett, R.A.

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local areamore » network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.« less

  16. Federal Emergency Management Information System (FEMIS), Installation Guide for FEMIS 1.4.6

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Arp, J.A.; Burnett, R.A.; Carter, R.J.

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local areamore » network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.« less

  17. Federal Emergency Management Information System (FEMIS) Data Management Guide for FEMIS Version 1.4.6

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Angel, L.K.; Bower, J.C.; Burnett, R.A.

    1999-06-29

    The Federal Emergency Management Information System (FEMIS) is an emergency management planning and response tool that was developed by the Pacific Northwest National Laboratory (PNNL) under the direction of the U.S. Army Chemical Biological Defense Command. The FEMIS System Administration Guide provides information necessary for the system administrator to maintain the FEMIS system. The FEMIS system is designed for a single Chemical Stockpile Emergency Preparedness Program (CSEPP) site that has multiple Emergency Operations Centers (EOCs). Each EOC has personal computers (PCs) that emergency planners and operations personnel use to do their jobs. These PCs are corrected via a local areamore » network (LAN) to servers that provide EOC-wide services. Each EOC is interconnected to other EOCs via a Wide Area Network (WAN). Thus, FEMIS is an integrated software product that resides on client/server computer architecture. The main body of FEMIS software, referred to as the FEMIS Application Software, resides on the PC client(s) and is directly accessible to emergency management personnel. The remainder of the FEMIS software, referred to as the FEMIS Support Software, resides on the UNIX server. The Support Software provides the communication data distribution and notification functionality necessary to operate FEMIS in a networked, client/server environment.« less

  18. A decoy chain deployment method based on SDN and NFV against penetration attack

    PubMed Central

    Zhao, Qi; Zhang, Chuanhao

    2017-01-01

    Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack. PMID:29216257

  19. A decoy chain deployment method based on SDN and NFV against penetration attack.

    PubMed

    Zhao, Qi; Zhang, Chuanhao; Zhao, Zheng

    2017-01-01

    Penetration attacks are one of the most serious network security threats. However, existing network defense technologies do not have the ability to entirely block the penetration behavior of intruders. Therefore, the network needs additional defenses. In this paper, a decoy chain deployment (DCD) method based on SDN+NFV is proposed to address this problem. This method considers about the security status of networks, and deploys decoy chains with the resource constraints. DCD changes the attack surface of the network and makes it difficult for intruders to discern the current state of the network. Simulation experiments and analyses show that DCD can effectively resist penetration attacks by increasing the time cost and complexity of a penetration attack.

  20. 78 FR 48169 - Privacy Act of 1974; CMS Computer Match No. 2013-02; HHS Computer Match No. 1306; DoD-DMDC Match...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-07

    ...), Defense Manpower Data Center (DMDC) and the Office of the Assistant Secretary of Defense (Health Affairs.../TRICARE. DMDC will receive the results of the computer match and provide the information to TMA for use in...

  1. Network Topologies and Dynamics Leading to Endotoxin Tolerance and Priming in Innate Immune Cells

    NASA Astrophysics Data System (ADS)

    Fu, Yan; Glaros, Trevor; Zhu, Meng; Wang, Ping; Wu, Zhanghan; Tyson, John; Li, Liwu; Xing, Jianhua

    2012-01-01

    The innate immune system, acting as the first line of host defense, senses and adapts to foreign challenges through complex intracellular and intercellular signaling networks. Endotoxin tolerance and priming elicited by macrophages are classic examples of the complex adaptation of innate immune cells. Upon repetitive exposures to different doses of bacterial endotoxin (lipopolysaccharide) or other stimulants, macrophages show either suppressed or augmented inflammatory responses compared to a single exposure to the stimulant. Endotoxin tolerance and priming are critically involved in both immune homeostasis and the pathogenesis of diverse inflammatory diseases. However, the underlying molecular mechanisms are not well understood. By means of a computational search through the parameter space of a coarse-grained three-node network with a two-stage Metropolis sampling approach, we enumerated all the network topologies that can generate priming or tolerance. We discovered three major mechanisms for priming (pathway synergy, suppressor deactivation, activator induction) and one for tolerance (inhibitor persistence). These results not only explain existing experimental observations, but also reveal intriguing test scenarios for future experimental studies to clarify mechanisms of endotoxin priming and tolerance.

  2. Network Speech Systems Technology Program

    NASA Astrophysics Data System (ADS)

    Weinstein, C. J.

    1980-09-01

    This report documents work performed during FY 1980 on the DCA-sponsored Network Speech Systems Technology Program. The areas of work reported are: (1) communication systems studies in Demand-Assignment Multiple Access (DAMA), voice/data integration, and adaptive routing, in support of the evolving Defense Communications System (DCS) and Defense Switched Network (DSN); (2) a satellite/terrestrial integration design study including the functional design of voice and data interfaces to interconnect terrestrial and satellite network subsystems; and (3) voice-conferencing efforts dealing with support of the Secure Voice and Graphics Conferencing (SVGC) Test and Evaluation Program. Progress in definition and planning of experiments for the Experimental Integrated Switched Network (EISN) is detailed separately in an FY 80 Experiment Plan Supplement.

  3. Stability and Topology of Scale-Free Networks under Attack and Defense Strategies

    NASA Astrophysics Data System (ADS)

    Gallos, Lazaros K.; Cohen, Reuven; Argyrakis, Panos; Bunde, Armin; Havlin, Shlomo

    2005-05-01

    We study tolerance and topology of random scale-free networks under attack and defense strategies that depend on the degree k of the nodes. This situation occurs, for example, when the robustness of a node depends on its degree or in an intentional attack with insufficient knowledge of the network. We determine, for all strategies, the critical fraction pc of nodes that must be removed for disintegrating the network. We find that, for an intentional attack, little knowledge of the well-connected sites is sufficient to strongly reduce pc. At criticality, the topology of the network depends on the removal strategy, implying that different strategies may lead to different kinds of percolation transitions.

  4. Salivary Defense Proteins: Their Network and Role in Innate and Acquired Oral Immunity

    PubMed Central

    Fábián, Tibor Károly; Hermann, Péter; Beck, Anita; Fejérdy, Pál; Fábián, Gábor

    2012-01-01

    There are numerous defense proteins present in the saliva. Although some of these molecules are present in rather low concentrations, their effects are additive and/or synergistic, resulting in an efficient molecular defense network of the oral cavity. Moreover, local concentrations of these proteins near the mucosal surfaces (mucosal transudate), periodontal sulcus (gingival crevicular fluid) and oral wounds and ulcers (transudate) may be much greater, and in many cases reinforced by immune and/or inflammatory reactions of the oral mucosa. Some defense proteins, like salivary immunoglobulins and salivary chaperokine HSP70/HSPAs (70 kDa heat shock proteins), are involved in both innate and acquired immunity. Cationic peptides and other defense proteins like lysozyme, bactericidal/permeability increasing protein (BPI), BPI-like proteins, PLUNC (palate lung and nasal epithelial clone) proteins, salivary amylase, cystatins, prolin-rich proteins, mucins, peroxidases, statherin and others are primarily responsible for innate immunity. In this paper, this complex system and function of the salivary defense proteins will be reviewed. PMID:22605979

  5. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks.

    PubMed

    Sittig, Dean F; Singh, Hardeep

    2016-01-01

    Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user's computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users.

  6. A Socio-Technical Approach to Preventing, Mitigating, and Recovering from Ransomware Attacks

    PubMed Central

    Singh, Hardeep

    2016-01-01

    Summary Recently there have been several high-profile ransomware attacks involving hospitals around the world. Ransomware is intended to damage or disable a user’s computer unless the user makes a payment. Once the attack has been launched, users have three options: 1) try to restore their data from backup; 2) pay the ransom; or 3) lose their data. In this manuscript, we discuss a socio-technical approach to address ransomware and outline four overarching steps that organizations can undertake to secure an electronic health record (EHR) system and the underlying computing infrastructure. First, health IT professionals need to ensure adequate system protection by correctly installing and configuring computers and networks that connect them. Next, the health care organizations need to ensure more reliable system defense by implementing user-focused strategies, including simulation and training on correct and complete use of computers and network applications. Concomitantly, the organization needs to monitor computer and application use continuously in an effort to detect suspicious activities and identify and address security problems before they cause harm. Finally, organizations need to respond adequately to and recover quickly from ransomware attacks and take actions to prevent them in future. We also elaborate on recommendations from other authoritative sources, including the National Institute of Standards and Technology (NIST). Similar to approaches to address other complex socio-technical health IT challenges, the responsibility of preventing, mitigating, and recovering from these attacks is shared between health IT professionals and end-users. PMID:27437066

  7. Integration of communications with the Intelligent Gateway Processor

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hampel, V.E.

    1986-01-01

    The Intelligent Gateway Processor (IGP) software is being used to interconnect users equipped with different personal computers and ASCII terminals to mainframe machines of different make. This integration is made possible by the IGP's unique user interface and networking software. Prototype systems of the table-driven, interpreter-based IGP have been adapted to very different programmatic requirements and have demonstrated substantial increases in end-user productivity. Procedures previously requiring days can now be carried out in minutes. The IGP software has been under development by the Technology Information Systems (TIS) program at Lawrence Livermore National Laboratory (LLNL) since 1975 and is in usemore » by several federal agencies since 1983: The Air Force is prototyping applications which range from automated identification of spare parts for aircraft to office automation and the controlled storage and distribution of technical orders and engineering drawings. Other applications of the IGP are the Information Management System (IMS) for aviation statistics in the Federal Aviation Administration (FAA), the Nuclear Criticality Information System (NCIS) and a nationwide Cost Estimating System (CES) in the Department of Energy, the library automation network of the Defense Technical Information Center (DTIC), and the modernization program in the Office of the Secretary of Defense (OSD). 31 refs., 9 figs.« less

  8. Virtual target tracking (VTT) as applied to mobile satellite communication networks

    NASA Astrophysics Data System (ADS)

    Amoozegar, Farid

    1999-08-01

    Traditionally, target tracking has been used for aerospace applications, such as, tracking highly maneuvering targets in a cluttered environment for missile-to-target intercept scenarios. Although the speed and maneuvering capability of current aerospace targets demand more efficient algorithms, many complex techniques have already been proposed in the literature, which primarily cover the defense applications of tracking methods. On the other hand, the rapid growth of Global Communication Systems, Global Information Systems (GIS), and Global Positioning Systems (GPS) is creating new and more diverse challenges for multi-target tracking applications. Mobile communication and computing can very well appreciate a huge market for Cellular Communication and Tracking Devices (CCTD), which will be tracking networked devices at the cellular level. The objective of this paper is to introduce a new concept, i.e., Virtual Target Tracking (VTT) for commercial applications of multi-target tracking algorithms and techniques as applied to mobile satellite communication networks. It would be discussed how Virtual Target Tracking would bring more diversity to target tracking research.

  9. Report of the Defense Science Board Task Force on Military Applications of New-Generation Computing Technologies.

    DTIC Science & Technology

    1984-12-01

    1980’s we are seeing enhancement of breadth, power, and accessibility of computers in many dimensions: o Pov~erfu1, costly fragile mainframes for...During the 1980’s we are seeing enhancement of breadth, power and accessibility of computers in many dimensions. (1) Powerful, costly, fragile mainframes... X A~ ’ EMORANDlUM FOR THE t-RAIRMAN, DEFENSE<. ’ ’...’"" S!B.FECT: Defense Science Board T is F- Supercomputei Applicai io, Yoi are requested to

  10. 77 FR 43405 - Final Standard Review Plan, Branch Technical Position 7-19 on Guidance for Evaluation of...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-07-24

    ... Digital Computer-Based Instrumentation and Control Systems.'' This BTP is to be cited as the acceptance criteria for Diversity and Defense-in-Depth in Digital Computer-Based Instrumentation and Control Systems... Evaluation of Diversity and Defense-in-Depth in Digital Computer-Based Instrumentation and Control Systems...

  11. Communications Management at the Parks Reserve Forces Training Area, Camp Parks, California

    DTIC Science & Technology

    1994-10-31

    The overall objective of the audit was to evaluate DoD management of circuit configurations for Defense Switched Network access requirements. The specific objective for this segment of the audit was to determine whether the Army used the most cost effective configuration of base and long haul telecommunications equipment and services at Camp Parks to access the Defense Switched Network.

  12. Network-Based Comparative Analysis of Arabidopsis Immune Responses to Golovinomyces orontii and Botrytis cinerea Infections.

    PubMed

    Jiang, Zhenhong; Dong, Xiaobao; Zhang, Ziding

    2016-01-11

    A comprehensive exploration of common and specific plant responses to biotrophs and necrotrophs is necessary for a better understanding of plant immunity. Here, we compared the Arabidopsis defense responses evoked by the biotrophic fungus Golovinomyces orontii and the necrotrophic fungus Botrytis cinerea through integrative network analysis. Two time-course transcriptional datasets were integrated with an Arabidopsis protein-protein interaction (PPI) network to construct a G. orontii conditional PPI sub-network (gCPIN) and a B. cinerea conditional PPI sub-network (bCPIN). We found that hubs in gCPIN and bCPIN played important roles in disease resistance. Hubs in bCPIN evolved faster than hubs in gCPIN, indicating the different selection pressures imposed on plants by different pathogens. By analyzing the common network from gCPIN and bCPIN, we identified two network components in which the genes were heavily involved in defense and development, respectively. The co-expression relationships between interacting proteins connecting the two components were different under G. orontii and B. cinerea infection conditions. Closer inspection revealed that auxin-related genes were overrepresented in the interactions connecting these two components, suggesting a critical role of auxin signaling in regulating the different co-expression relationships. Our work may provide new insights into plant defense responses against pathogens with different lifestyles.

  13. A conserved mitochondrial surveillance pathway is required for defense against Pseudomonas aeruginosa.

    PubMed

    Tjahjono, Elissa; Kirienko, Natalia V

    2017-06-01

    All living organisms exist in a precarious state of homeostasis that requires constant maintenance. A wide variety of stresses, including hypoxia, heat, and infection by pathogens perpetually threaten to imbalance this state. Organisms use a battery of defenses to mitigate damage and restore normal function. Previously, we described a Caenorhabditis elegans-Pseudomonas aeruginosa assay (Liquid Killing) in which toxicity to the host is dependent upon the secreted bacterial siderophore pyoverdine. Although pyoverdine is also indispensable for virulence in mammals, its cytological effects are unclear. We used genetics, transcriptomics, and a variety of pathogen and chemical exposure assays to study the interactions between P. aeruginosa and C. elegans. Although P. aeruginosa can kill C. elegans through at least 5 different mechanisms, the defense responses activated by Liquid Killing are specific and selective and have little in common with innate defense mechanisms against intestinal colonization. Intriguingly, the defense response utilizes the phylogenetically-conserved ESRE (Ethanol and Stress Response Element) network, which we and others have previously shown to mitigate damage from a variety of abiotic stresses. This is the first report of this networks involvement in innate immunity, and indicates that host innate immune responses overlap with responses to abiotic stresses. The upregulation of the ESRE network in C. elegans is mediated in part by a family of bZIP proteins (including ZIP-2, ZIP-4, CEBP-1, and CEBP-2) that have overlapping and unique functions. Our data convincingly show that, following exposure to P. aeruginosa, the ESRE defense network is activated by mitochondrial damage, and that mitochondrial damage also leads to ESRE activation in mammals. This establishes a role for ESRE in a phylogenetically-conserved mitochondrial surveillance system important for stress response and innate immunity.

  14. S100A12 Is Part of the Antimicrobial Network against Mycobacterium leprae in Human Macrophages.

    PubMed

    Realegeno, Susan; Kelly-Scumpia, Kindra M; Dang, Angeline Tilly; Lu, Jing; Teles, Rosane; Liu, Philip T; Schenk, Mirjam; Lee, Ernest Y; Schmidt, Nathan W; Wong, Gerard C L; Sarno, Euzenir N; Rea, Thomas H; Ochoa, Maria T; Pellegrini, Matteo; Modlin, Robert L

    2016-06-01

    Triggering antimicrobial mechanisms in macrophages infected with intracellular pathogens, such as mycobacteria, is critical to host defense against the infection. To uncover the unique and shared antimicrobial networks induced by the innate and adaptive immune systems, gene expression profiles generated by RNA sequencing (RNAseq) from human monocyte-derived macrophages (MDMs) activated with TLR2/1 ligand (TLR2/1L) or IFN-γ were analyzed. Weighed gene correlation network analysis identified modules of genes strongly correlated with TLR2/1L or IFN-γ that were linked by the "defense response" gene ontology term. The common TLR2/1L and IFN-γ inducible human macrophage host defense network contained 16 antimicrobial response genes, including S100A12, which was one of the most highly induced genes by TLR2/1L. There is limited information on the role of S100A12 in infectious disease, leading us to test the hypothesis that S100A12 contributes to host defense against mycobacterial infection in humans. We show that S100A12 is sufficient to directly kill Mycobacterium tuberculosis and Mycobacterium leprae. We also demonstrate that S100A12 is required for TLR2/1L and IFN-γ induced antimicrobial activity against M. leprae in infected macrophages. At the site of disease in leprosy, we found that S100A12 was more strongly expressed in skin lesions from tuberculoid leprosy (T-lep), the self-limiting form of the disease, compared to lepromatous leprosy (L-lep), the progressive form of the disease. These data suggest that S100A12 is part of an innate and adaptive inducible antimicrobial network that contributes to host defense against mycobacteria in infected macrophages.

  15. Review of ultraresolution (10-100 megapixel) visualization systems built by tiling commercial display components

    NASA Astrophysics Data System (ADS)

    Hopper, Darrel G.; Haralson, David G.; Simpson, Matthew A.; Longo, Sam J.

    2002-08-01

    Ultra-resolution visualization systems are achieved by the technique of tiling many direct or project-view displays. During the past fews years, several such systems have been built from commercial electronics components (displays, computers, image generators, networks, communication links, and software). Civil applications driving this development have independently determined that they require images at 10-100 megapixel (Mpx) resolution to enable state-of-the-art research, engineering, design, stock exchanges, flight simulators, business information and enterprise control centers, education, art and entertainment. Military applications also press the art of the possible to improve the productivity of warfighters and lower the cost of providing for the national defense. The environment in some 80% of defense applications can be addressed by ruggedization of commercial components. This paper reviews the status of ultra-resolution systems based on commercial components and describes a vision for their integration into advanced yet affordable military command centers, simulator/trainers, and, eventually, crew stations in air, land, sea and space systems.

  16. A Markov game theoretic data fusion approach for cyber situational awareness

    NASA Astrophysics Data System (ADS)

    Shen, Dan; Chen, Genshe; Cruz, Jose B., Jr.; Haynes, Leonard; Kruger, Martin; Blasch, Erik

    2007-04-01

    This paper proposes an innovative data-fusion/ data-mining game theoretic situation awareness and impact assessment approach for cyber network defense. Alerts generated by Intrusion Detection Sensors (IDSs) or Intrusion Prevention Sensors (IPSs) are fed into the data refinement (Level 0) and object assessment (L1) data fusion components. High-level situation/threat assessment (L2/L3) data fusion based on Markov game model and Hierarchical Entity Aggregation (HEA) are proposed to refine the primitive prediction generated by adaptive feature/pattern recognition and capture new unknown features. A Markov (Stochastic) game method is used to estimate the belief of each possible cyber attack pattern. Game theory captures the nature of cyber conflicts: determination of the attacking-force strategies is tightly coupled to determination of the defense-force strategies and vice versa. Also, Markov game theory deals with uncertainty and incompleteness of available information. A software tool is developed to demonstrate the performance of the high level information fusion for cyber network defense situation and a simulation example shows the enhanced understating of cyber-network defense.

  17. Ethylene contributes to mir1-mediated maize defense against the phloem-sap sucking insect Rhopalosiphum maidis.

    USDA-ARS?s Scientific Manuscript database

    Signaling networks among multiple phytohormones fine-tune plant defense responses to insect herbivore attack. Previously, it was reported that the synergistic combination of ethylene (ET) and jasmonic acid (JA) was required for providing maize insect resistance1 (mir1), a key endogenous defense sign...

  18. 75 FR 64714 - Meeting of the Chief of Naval Operations Executive Panel

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-10-20

    ... recommendations of the Subcommittee on Navy's Role in Ballistic Missile Defense. The meeting will consist of discussions of Navy's role in ballistic missile defense, development of the global missile defense network and evolution of the growing ballistic missile threat. DATES: The meeting will be held on November 12, 2010...

  19. 32 CFR Appendix H to Part 505 - Definitions

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC... Department of Defense are considered a single agency. For other purposes including access, amendment, appeals... approves all computer matching agreements between the Department of Defense (DOD) and other Federal, State...

  20. 32 CFR Appendix H to Part 505 - Definitions

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC... Department of Defense are considered a single agency. For other purposes including access, amendment, appeals... approves all computer matching agreements between the Department of Defense (DOD) and other Federal, State...

  1. Multistage Security Mechanism For Hybrid, Large-Scale Wireless Sensor Networks

    DTIC Science & Technology

    2007-06-01

    sensor network . Building on research in the areas of the wireless sensor networks (WSN) and the mobile ad hoc networks (MANET), this thesis proposes an...A wide area network consisting of ballistic missile defense satellites and terrestrial nodes can be viewed as a hybrid, large-scale mobile wireless

  2. Defense Science Board Task Force on Military Satellite Communication and Tactical Networking. Executive Summary

    DTIC Science & Technology

    2017-03-01

    Communications SMC Space and Missile Systems Center SEV Space Enterprise Vision SHF Super High Frequency SINCGARS Single Channel Ground-Air Radio...Appendix D:Acronyms A2/AD Anti-Access/Area Denial ADNS Automated Digital Network System AEHF Advanced Extremely High Frequency AFSPC Air Force Space ...medium-rate modes of defense extremely high frequency (EHF) SATCOM. This reality should be considered a crisis to be dealt with immediately. In

  3. 78 FR 45515 - Submission for OMB Review; Comment Request

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-07-29

    ...] Submission for OMB Review; Comment Request ACTION: Notice. The Defense Acquisition Regulations System has... Supplement (DFARS) Subpart 227.71, Rights in Technical Data, and Subpart 227.72, Rights in Computer Software and Computer Software Documentation, and related provisions and clauses of the Defense Federal...

  4. Collegiate Cyber Defense Competition Effort

    DTIC Science & Technology

    2018-03-01

    Energy – an electrical utility company. • 2016 : ODIN Security – a small aerospace and defense contracting firm Approved for Public Release...to secure supervisory control and data acquisition (SCADA) networks. Approved for Public Release; Distribution Unlimited 7 During the 2016 NCCDC...COLLEGIATE CYBER DEFENSE COMPETITION EFFORT UNIVERSITY OF TEXAS AT SAN ANTONIO MARCH 2018 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  5. Verifying the secure setup of UNIX client/servers and detection of network intrusion

    NASA Astrophysics Data System (ADS)

    Feingold, Richard; Bruestle, Harry R.; Bartoletti, Tony; Saroyan, R. A.; Fisher, John M.

    1996-03-01

    This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today's global `Infosphere' presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to check on their security configuration. SPI's broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI's use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on the Ethernet broadcast Local Area Network segment and product transcripts of suspicious user connections. NID's retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.

  6. FY 1978 Budget, FY 1979 Authorization Request and FY 1978-1982 Defense Programs,

    DTIC Science & Technology

    1977-01-17

    technological opportunities with defense applica- tions -- such as long-range cruise missiles and guidance, improved sensors, 25 miniaturization, and computer ...Various methods exist for computing the number of theater nuclear weapons needed to perform these missions with an acceptable level of confidence...foreign military forces. Mini-micro computers are especially interesting. -- Finally, since geography remains important, we must recognize that the

  7. IL-32 is a molecular marker of a host defense network in human tuberculosis

    PubMed Central

    Montoya, Dennis; Inkeles, Megan S.; Liu, Phillip T.; Realegeno, Susan; Teles, Rosane M. B.; Vaidya, Poorva; Munoz, Marcos A.; Schenk, Mirjam; Swindell, William R.; Chun, Rene; Zavala, Kathryn; Hewison, Martin; Adams, John S.; Horvath, Steve; Pellegrini, Matteo; Bloom, Barry R.; Modlin, Robert L.

    2014-01-01

    Tuberculosis is a leading cause of infectious disease–related death worldwide; however, only 10% of people infected with Mycobacterium tuberculosis develop disease. Factors that contribute to protection could prove to be promising targets for M. tuberculosis therapies. Analysis of peripheral blood gene expression profiles of active tuberculosis patients has identified correlates of risk for disease or pathogenesis. We sought to identify potential human candidate markers of host defense by studying gene expression profiles of macrophages, cells that, upon infection by M. tuberculosis, can mount an antimicrobial response. Weighted gene coexpression network analysis revealed an association between the cytokine interleukin-32 (IL-32) and the vitamin D antimicrobial pathway in a network of interferon-γ– and IL-15–induced “defense response” genes. IL-32 induced the vitamin D–dependent antimicrobial peptides cathelicidin and DEFB4 and to generate antimicrobial activity in vitro, dependent on the presence of adequate 25-hydroxyvitamin D. In addition, the IL-15–induced defense response macrophage gene network was integrated with ranked pairwise comparisons of gene expression from five different clinical data sets of latent compared with active tuberculosis or healthy controls and a coexpression network derived from gene expression in patients with tuberculosis undergoing chemotherapy. Together, these analyses identified eight common genes, including IL-32, as molecular markers of latent tuberculosis and the IL-15–induced gene network. As maintaining M. tuberculosis in a latent state and preventing transition to active disease may represent a form of host resistance, these results identify IL-32 as one functional marker and potential correlate of protection against active tuberculosis. PMID:25143364

  8. IL-32 is a molecular marker of a host defense network in human tuberculosis.

    PubMed

    Montoya, Dennis; Inkeles, Megan S; Liu, Phillip T; Realegeno, Susan; Teles, Rosane M B; Vaidya, Poorva; Munoz, Marcos A; Schenk, Mirjam; Swindell, William R; Chun, Rene; Zavala, Kathryn; Hewison, Martin; Adams, John S; Horvath, Steve; Pellegrini, Matteo; Bloom, Barry R; Modlin, Robert L

    2014-08-20

    Tuberculosis is a leading cause of infectious disease-related death worldwide; however, only 10% of people infected with Mycobacterium tuberculosis develop disease. Factors that contribute to protection could prove to be promising targets for M. tuberculosis therapies. Analysis of peripheral blood gene expression profiles of active tuberculosis patients has identified correlates of risk for disease or pathogenesis. We sought to identify potential human candidate markers of host defense by studying gene expression profiles of macrophages, cells that, upon infection by M. tuberculosis, can mount an antimicrobial response. Weighted gene coexpression network analysis revealed an association between the cytokine interleukin-32 (IL-32) and the vitamin D antimicrobial pathway in a network of interferon-γ- and IL-15-induced "defense response" genes. IL-32 induced the vitamin D-dependent antimicrobial peptides cathelicidin and DEFB4 and to generate antimicrobial activity in vitro, dependent on the presence of adequate 25-hydroxyvitamin D. In addition, the IL-15-induced defense response macrophage gene network was integrated with ranked pairwise comparisons of gene expression from five different clinical data sets of latent compared with active tuberculosis or healthy controls and a coexpression network derived from gene expression in patients with tuberculosis undergoing chemotherapy. Together, these analyses identified eight common genes, including IL-32, as molecular markers of latent tuberculosis and the IL-15-induced gene network. As maintaining M. tuberculosis in a latent state and preventing transition to active disease may represent a form of host resistance, these results identify IL-32 as one functional marker and potential correlate of protection against active tuberculosis. Copyright © 2014, American Association for the Advancement of Science.

  9. Plant Bio-Wars: Maize Protein Networks Reveal Tissue-Specific Defense Strategies in Response to a Root Herbivore.

    PubMed

    Castano-Duque, Lina; Helms, Anjel; Ali, Jared Gregory; Luthe, Dawn S

    2018-06-21

    In this study we examined global changes in protein expression in both roots and leaves of maize plants attacked by the root herbivore, Western corn rootworm (WCR, Diabrotica virgifera virgifera). The changes in protein expression Are indicative of metabolic changes during WCR feeding that enable the plant to defend itself. This is one of the first studies to look above- and below-ground at global protein expression patterns of maize plants grown in soil and infested with a root herbivore. We used advanced proteomic and network analyses to identify metabolic pathways that contribute to global defenses deployed by the insect resistant maize genotype, Mp708, infested with WCR. Using proteomic analysis, 4878 proteins in roots and leaves were detected and of these 863 showed significant changes of abundance during WCR infestation. Protein abundance patterns were analyzed using hierarchical clustering, protein correlation and protein-protein interaction networks. All three data analysis pipelines showed that proteins such as jasmonic acid biosynthetic enzymes, serine proteases, protease inhibitors, proteins involved in biosynthesis and signaling of ethylene, and enzymes producing reactive oxygen species and isopentenyl pyrophosphate, a precursor for volatile production, were upregulated in roots during WCR infestation. In leaves, highly abundant proteins were involved in signal perception suggesting activation of systemic signaling. We conclude that these protein networks contribute to the overall herbivore defense mechanisms in Mp708. Because the plants were grown in potting mix and not sterilized sand, we found that both microbial and insect defense-related proteins were present in the roots. The presence of the high constitutive levels of reduced ascorbate in roots and benzothiazole in the root volatile profiles suggest a tight tri-trophic interaction among the plant, soil microbiomes and WCR-infested roots suggesting that defenses against insects coexist with defenses against bacteria and fungi due to the interaction between roots and soil microbiota. In this study, which is one of the most complete descriptions of plant responses to root-feeding herbivore, we established an analysis pipeline for proteomics data that includes network biology that can be used with different types of "omics" data from a variety of organisms.

  10. Plastic Transcriptomes Stabilize Immunity to Pathogen Diversity: The Jasmonic Acid and Salicylic Acid Networks within the Arabidopsis/Botrytis Pathosystem[OPEN

    PubMed Central

    Eshbaugh, Robert; Chen, Fang; Atwell, Susana

    2017-01-01

    To respond to pathogen attack, selection and associated evolution has led to the creation of plant immune system that are a highly effective and inducible defense system. Central to this system are the plant defense hormones jasmonic acid (JA) and salicylic acid (SA) and crosstalk between the two, which may play an important role in defense responses to specific pathogens or even genotypes. Here, we used the Arabidopsis thaliana-Botrytis cinerea pathosystem to test how the host’s defense system functions against genetic variation in a pathogen. We measured defense-related phenotypes and transcriptomic responses in Arabidopsis wild-type Col-0 and JA- and SA-signaling mutants, coi1-1 and npr1-1, individually challenged with 96 diverse B. cinerea isolates. Those data showed genetic variation in the pathogen influences on all components within the plant defense system at the transcriptional level. We identified four gene coexpression networks and two vectors of defense variation triggered by genetic variation in B. cinerea. This showed that the JA and SA signaling pathways functioned to constrain/canalize the range of virulence in the pathogen population, but the underlying transcriptomic response was highly plastic. These data showed that plants utilize major defense hormone pathways to buffer disease resistance, but not the metabolic or transcriptional responses to genetic variation within a pathogen. PMID:29042403

  11. Plastic Transcriptomes Stabilize Immunity to Pathogen Diversity: The Jasmonic Acid and Salicylic Acid Networks within the Arabidopsis/Botrytis Pathosystem.

    PubMed

    Zhang, Wei; Corwin, Jason A; Copeland, Daniel; Feusier, Julie; Eshbaugh, Robert; Chen, Fang; Atwell, Susana; Kliebenstein, Daniel J

    2017-11-01

    To respond to pathogen attack, selection and associated evolution has led to the creation of plant immune system that are a highly effective and inducible defense system. Central to this system are the plant defense hormones jasmonic acid (JA) and salicylic acid (SA) and crosstalk between the two, which may play an important role in defense responses to specific pathogens or even genotypes. Here, we used the Arabidopsis thaliana - Botrytis cinerea pathosystem to test how the host's defense system functions against genetic variation in a pathogen. We measured defense-related phenotypes and transcriptomic responses in Arabidopsis wild-type Col-0 and JA- and SA-signaling mutants, coi1-1 and npr1-1 , individually challenged with 96 diverse B. cinerea isolates. Those data showed genetic variation in the pathogen influences on all components within the plant defense system at the transcriptional level. We identified four gene coexpression networks and two vectors of defense variation triggered by genetic variation in B. cinerea This showed that the JA and SA signaling pathways functioned to constrain/canalize the range of virulence in the pathogen population, but the underlying transcriptomic response was highly plastic. These data showed that plants utilize major defense hormone pathways to buffer disease resistance, but not the metabolic or transcriptional responses to genetic variation within a pathogen. © 2017 American Society of Plant Biologists. All rights reserved.

  12. Active-passive bistatic surveillance for long range air defense

    NASA Astrophysics Data System (ADS)

    Wardrop, B.; Molyneux-Berry, M. R. B.

    1992-06-01

    A hypothetical mobile support receiver capable of working within existing and future air defense networks as a means to maintain essential surveillance functions is considered. It is shown how multibeam receiver architecture supported by digital signal processing can substantially improve surveillance performance against chaff and jamming threats. A dual-mode support receiver concept is proposed which is based on the state-of-the-art phased-array technology, modular processing in industry standard hardware and existing networks.

  13. Six Information Technology Services Contracts for the Defense Intelligence Community

    DTIC Science & Technology

    2000-04-24

    This category covers Defense Intelligence Community organizations whose mission is to provide for the planning, development, deployment, operation ... management , and oversight of global information networks and infrastructure supporting intelligence producers. • Information Systems. This category

  14. DualTrust: A Distributed Trust Model for Swarm-Based Autonomic Computing Systems

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Maiden, Wendy M.; Dionysiou, Ioanna; Frincke, Deborah A.

    2011-02-01

    For autonomic computing systems that utilize mobile agents and ant colony algorithms for their sensor layer, trust management is important for the acceptance of the mobile agent sensors and to protect the system from malicious behavior by insiders and entities that have penetrated network defenses. This paper examines the trust relationships, evidence, and decisions in a representative system and finds that by monitoring the trustworthiness of the autonomic managers rather than the swarming sensors, the trust management problem becomes much more scalable and still serves to protect the swarm. We then propose the DualTrust conceptual trust model. By addressing themore » autonomic manager’s bi-directional primary relationships in the ACS architecture, DualTrust is able to monitor the trustworthiness of the autonomic managers, protect the sensor swarm in a scalable manner, and provide global trust awareness for the orchestrating autonomic manager.« less

  15. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  16. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  17. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  18. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  19. 32 CFR Appendix J to Part 154 - ADP Position Categories and Criteria for Designating Positions

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ..., and implementation of a computer security program; major responsibility for the direction, planning... agency computer security programs, and also including direction and control of risk analysis and/or... OF DEFENSE SECURITY DEPARTMENT OF DEFENSE PERSONNEL SECURITY PROGRAM REGULATION Pt. 154, App. J...

  20. Phenotypic integration emerges from aposematism and scale in poison frogs

    PubMed Central

    Santos, Juan C.; Cannatella, David C.

    2011-01-01

    Complex phenotypes can be modeled as networks of component traits connected by genetic, developmental, or functional interactions. Aposematism, which has evolved multiple times in poison frogs (Dendrobatidae), links a warning signal to a chemical defense against predators. Other traits are involved in this complex phenotype. Most aposematic poison frogs are ant specialists, from which they sequester defensive alkaloids. We found that aposematic species have greater aerobic capacity, also related to diet specialization. To characterize the aposematic trait network more fully, we analyzed phylogenetic correlations among its hypothesized components: conspicuousness, chemical defense, diet specialization, body mass, active and resting metabolic rates, and aerobic scope. Conspicuous coloration was correlated with all components except resting metabolism. Structural equation modeling on the basis of trait correlations recovered “aposematism” as one of two latent variables in an integrated phenotypic network, the other being scaling with body mass and physiology (“scale”). Chemical defense and diet specialization were uniquely tied to aposematism whereas conspicuousness was related to scale. The phylogenetic distribution of the aposematic syndrome suggests two scenarios for its evolution: (i) chemical defense and conspicuousness preceded greater aerobic capacity, which supports the increased resource-gathering abilities required of ant–mite diet specialization; and (ii) assuming that prey are patchy, diet specialization and greater aerobic capacity evolved in tandem, and both traits subsequently facilitated the evolution of aposematism. PMID:21444790

  1. On detection and visualization techniques for cyber security situation awareness

    NASA Astrophysics Data System (ADS)

    Yu, Wei; Wei, Shixiao; Shen, Dan; Blowers, Misty; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe; Zhang, Hanlin; Lu, Chao

    2013-05-01

    Networking technologies are exponentially increasing to meet worldwide communication requirements. The rapid growth of network technologies and perversity of communications pose serious security issues. In this paper, we aim to developing an integrated network defense system with situation awareness capabilities to present the useful information for human analysts. In particular, we implement a prototypical system that includes both the distributed passive and active network sensors and traffic visualization features, such as 1D, 2D and 3D based network traffic displays. To effectively detect attacks, we also implement algorithms to transform real-world data of IP addresses into images and study the pattern of attacks and use both the discrete wavelet transform (DWT) based scheme and the statistical based scheme to detect attacks. Through an extensive simulation study, our data validate the effectiveness of our implemented defense system.

  2. Plant peptides in defense and signaling.

    PubMed

    Marmiroli, Nelson; Maestri, Elena

    2014-06-01

    This review focuses on plant peptides involved in defense against pathogen infection and those involved in the regulation of growth and development. Defense peptides, defensins, cyclotides and anti-microbial peptides are compared and contrasted. Signaling peptides are classified according to their major sites of activity. Finally, a network approach to creating an interactomic peptide map is described. Copyright © 2014 Elsevier Inc. All rights reserved.

  3. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    PubMed

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  4. Competing dynamic phases of active polymer networks

    NASA Astrophysics Data System (ADS)

    Freedman, Simon; Banerjee, Shiladitya; Dinner, Aaron R.

    Recent experiments on in-vitro reconstituted assemblies of F-actin, myosin-II motors, and cross-linking proteins show that tuning local network properties can changes the fundamental biomechanical behavior of the system. For example, by varying cross-linker density and actin bundle rigidity, one can switch between contractile networks useful for reshaping cells, polarity sorted networks ideal for directed molecular transport, and frustrated networks with robust structural properties. To efficiently investigate the dynamic phases of actomyosin networks, we developed a coarse grained non-equilibrium molecular dynamics simulation of model semiflexible filaments, molecular motors, and cross-linkers with phenomenologically defined interactions. The simulation's accuracy was verified by benchmarking the mechanical properties of its individual components and collective behavior against experimental results at the molecular and network scales. By adjusting the model's parameters, we can reproduce the qualitative phases observed in experiment and predict the protein characteristics where phase crossovers could occur in collective network dynamics. Our model provides a framework for understanding cells' multiple uses of actomyosin networks and their applicability in materials research. Supported by the Department of Defense (DoD) through the National Defense Science & Engineering Graduate Fellowship (NDSEG) Program.

  5. The Jalisco Seismic Telemetric Network (RESJAL)

    NASA Astrophysics Data System (ADS)

    Nunez-Cornu, F. J.; Nunez-Cornu, F. J.; Reyes-Davila, G.; Reyes-Davila, G.; Suarez-Plascencia, C.; Suarez-Plascencia, C.; Gonzalez-Ledezma, M.; Garcia-Puga, J.

    2001-12-01

    The region of Jalisco is one of the most active seismic regions in Mexico, the main tectonic units in this region are the Jalisco Block and the Rivera Plate. The greatest earthquake (M=8.2) occurred in Mexico in the Twenty-Century (1932) took place in the coast of Jalisco, this was followed by another one (Ms =7.8) fifteen days later. In 1995 an earthquake magnitude 8.0 took place in the coast of Jalisco, but its rupture area was only the southern half of the rupture area proposed for the 1932 earthquakes, these facts suggest the existence of an important seismic Gap in the north coast of Jalisco which includes the area of Bahía de Banderas. However, not only subduction earthquakes occurred in this region there are also large inland earthquakes, such as the December 27, 1568 and February 11, 1872 events. There are also three active volcanoes Sanganguey, Ceboruco and the most active volcano in Mexico, the Colima volcano. In spite of these facts and the risk associated to these processes, there were only one seismological permanent station in Chamela on the coast of Jalisco and an analog telemetric network (RESCO) located on the Colima Volcano and the south part of the Colima Rift Zone (CRZ). By these reasons, the Unidad Estatal de Protección Civil de Jalisco (Jalisco Civil Defense) began a project to install a Digital Telemetric Network in the region in several phases, this project is carrying out jointly with SisVOc UdeG.; due to the size of the area and the topography of the region it is very difficult to get direct telemetric links, by these reasons the network is designed in cells with nodes, where the nodes are the different Campus of the University of Guadalajara located in the region, all Campus are linked by a computer network. First phase started in August 2001, it includes the installation of six stations, each station with a Kinemetrics Everest 24 bit datalogger, GPS time, and a Lennartz LE3Dlite 1Hz sensor, using KNI NMS to control and data acquisition; these stations were deployed in two cells, each one with three stations. The first one in the area of Bahía de Banderas with direct telemetric links to SisVOc in Campus Puerto Vallarta where is located the central station. The second cell is located from the Colima Volcano to north of CRZ, the first three stations of this cell were installed on the volcano to complement RESCO and to improve the quantity and quality of data from volcano. The stations transmit to the Jalisco Civil Defense base in Cd. Guzman (Zapotlan) which is linked to Campus Cd. Guzman located aside of the base, then from the Campus Cd. Guzman the data are sending through UdeG computer network to Campus Puerto Vallarta where are processed and analysed and returned to Civil Defense base in Cd. Guzman. To guarantee continuity in the transmission of data, these will be sending by INTERNET-2 protocols using Quality of Service. Second phase will start as soon first phase be completely operational, this phase include six additional seismic station, three for each cell and install Antelope system for data acquisition and control. In third phase two cells more will be added in the north and the east of the region; also meteorological instruments will be installed in each seismic station and video cameras and GPS instruments in selected stations.

  6. Protecting the Homeland Report of the Defense Science Board Task Force on Defensive Information Operations. 2000 Summer Study. Volume II

    DTIC Science & Technology

    2001-03-01

    between attacks and other events such as accidents, system failures, or hacking by thrill-seekers. This challenge is exacerbated by the speed of events in...International Telegraph and Telephone (CCITT) international standards body and is referred to as Signaling System # 7 ( SS7 ). Commerc" I Intelligent...point to fixed infrastructure "" Signaling Transfer Point (STP) - Packet switch in CCITT#7 Network STP ... SS7 * System Data Bases i Network

  7. beta-Aminoalcohols as Potential Reactivators of Aged Sarin-/Soman-Inhibited Acetylcholinesterase

    DTIC Science & Technology

    2017-02-08

    This approach includes high - quality quantum mechanical/molecular mechanical calcula- tions, providing reliable reactivation steps and energetics...I. V. Khavrutskii Department of Defense Biotechnology High Performance Computing Software Applications Institute Telemedicine and Advanced...b] Dr. A. Wallqvist Department of Defense Biotechnology High Performance Computing Software Applications Institute Telemedicine and Advanced

  8. The conservation and management of migratory and resident birds and their habitats on Department of Defense lands

    Treesearch

    Joe Hautzenroder

    2005-01-01

    Managing over 25 million acres of land on hundreds of installations, the United States Department of Defense (DoD) plays a key role in Partners in Flight (PIF). Department of Defense lands represent a critical network of habitats for neotropical migratory birds, offering these birds migratory stopover areas for resting and feeding, and suitable sites for nesting and...

  9. Integrated Cyber Defenses: Towards Cyber Defense Doctrine

    DTIC Science & Technology

    2007-12-01

    National Security Affairs Department) Professor Dorothy Denning (Defense Analysis Department) To select NPS Instructors for teaching me how to...asymmetric battlefield advantage to get inside adversary decision cycles to shorten the “kill chain.” As a force multiplier, NCW continues to...the] number of [network] events is increasing.6 Therefore, the DoD and each U.S. military service faces the daunting challenge of determining how

  10. Defense AT&L Magazine: A Publication of the Defense Acquisition University. Volume 34, Number 3, DAU 184

    DTIC Science & Technology

    2005-01-01

    developed a partnership with the Defense Acquisition University to in- tegrate DISA’s systems engineering processes, software , and network...in place, with processes being implemented: deployment management; systems engineering ; software engineering ; configuration man- agement; test and...CSS systems engineering is a transition partner with Carnegie Mellon University’s Software Engineering Insti- tute and its work on the capability

  11. Effect of Biodiesel on Diesel Engine Nitrogen Oxide and Other Regulated Emissions

    DTIC Science & Technology

    2006-05-01

    DENIX Defense Environmental Network & Information Exchange DLA Defense Logistics Agency DNPH Dinitrophenylhydrazine DoD Department of... Dinitrophenylhydrazine (DNPH) cartridges and analyzed using a high-performance liquid chromatograph with ultraviolet detection, as per an AO/AQIRP method (Reference

  12. New computer and communications environments for light armored vehicles

    NASA Astrophysics Data System (ADS)

    Rapanotti, John L.; Palmarini, Marc; Dumont, Marc

    2002-08-01

    Light Armoured Vehicles (LAVs) are being developed to meet the modern requirements of rapid deployment and operations other than war. To achieve these requirements, passive armour is minimized and survivability depends more on sensors, computers and countermeasures to detect and avoid threats. The performance, reliability, and ultimately the cost of these components, will be determined by the trends in computing and communications. These trends and the potential impact on DAS (Defensive Aids Suite) development were investigated and are reported in this paper. Vehicle performance is affected by communication with other vehicles and other ISTAR (Intelligence, Surveillance, Target Acquisition and Reconnaissance) battlefield assets. This investigation includes the networking technology Jini developed by SUN Microsystems, which can be used to interface the vehicle to the ISTAR network. VxWorks by Wind River Systems, is a real time operating system designed for military systems and compatible with Jini. Other technologies affecting computer hardware development include, dynamic reconfiguration, hot swap, alternate pathing, CompactPCI, and Fiber Channel serial communication. To achieve the necessary performance at reasonable cost, and over the long service life of the vehicle, a DAS should have two essential features. A fitted for, but not fitted with approach will provide the necessary rapid deployment without a need to equip the entire fleet. With an expected vehicle service life of 50 years, 5-year technology upgrades can be used to maintain vehicle performance over the entire service life. A federation of modules instead of integrated fused sensors will provide the capability for incremental upgrades and mission configurability. A plug and play capability can be used for both hardware and expendables.

  13. Verifying the secure setup of Unix client/servers and detection of network intrusion

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Feingold, R.; Bruestle, H.R.; Bartoletti, T.

    1995-07-01

    This paper describes our technical approach to developing and delivering Unix host- and network-based security products to meet the increasing challenges in information security. Today`s global ``Infosphere`` presents us with a networked environment that knows no geographical, national, or temporal boundaries, and no ownership, laws, or identity cards. This seamless aggregation of computers, networks, databases, applications, and the like store, transmit, and process information. This information is now recognized as an asset to governments, corporations, and individuals alike. This information must be protected from misuse. The Security Profile Inspector (SPI) performs static analyses of Unix-based clients and servers to checkmore » on their security configuration. SPI`s broad range of security tests and flexible usage options support the needs of novice and expert system administrators alike. SPI`s use within the Department of Energy and Department of Defense has resulted in more secure systems, less vulnerable to hostile intentions. Host-based information protection techniques and tools must also be supported by network-based capabilities. Our experience shows that a weak link in a network of clients and servers presents itself sooner or later, and can be more readily identified by dynamic intrusion detection techniques and tools. The Network Intrusion Detector (NID) is one such tool. NID is designed to monitor and analyze activity on an Ethernet broadcast Local Area Network segment and produce transcripts of suspicious user connections. NID`s retrospective and real-time modes have proven invaluable to security officers faced with ongoing attacks to their systems and networks.« less

  14. Military Cyberspace: From Evolution to Revolution

    DTIC Science & Technology

    2012-02-08

    support the GCCs and enable USCYBERCOM to accomplish its mission? 15. SUBJECT TERMS Network Operations, Global Information Grid ( GIG ), Network...DATE: 08 February 2012 WORD COUNT: 5,405 PAGES: 30 KEY TERMS: Network Operations, Global Information Grid ( GIG ), Network Architecture...defense of the DOD global information grid ( GIG ). The DOD must pursue an enterprise approach to network management in the cyberspace domain to

  15. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  16. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  17. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  18. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  19. 32 CFR 2001.1 - Purpose and scope.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Telecommunications, automated information systems, and network security 4.1, 4.2 2001.51 Technical security 4.1 2001... National Defense Other Regulations Relating to National Defense INFORMATION SECURITY OVERSIGHT OFFICE, NATIONAL ARCHIVES AND RECORDS ADMINISTRATION CLASSIFIED NATIONAL SECURITY INFORMATION Scope of Part § 2001...

  20. An abstract model of rogue code insertion into radio frequency wireless networks. The effects of computer viruses on the Program Management Office

    NASA Astrophysics Data System (ADS)

    Feudo, Christopher V.

    1994-04-01

    This dissertation demonstrates that inadequately protected wireless LANs are more vulnerable to rogue program attack than traditional LANs. Wireless LANs not only run the same risks as traditional LANs, but they also run additional risks associated with an open transmission medium. Intruders can scan radio waves and, given enough time and resources, intercept, analyze, decipher, and reinsert data into the transmission medium. This dissertation describes the development and instantiation of an abstract model of the rogue code insertion process into a DOS-based wireless communications system using radio frequency (RF) atmospheric signal transmission. The model is general enough to be applied to widely used target environments such as UNIX, Macintosh, and DOS operating systems. The methodology and three modules, the prober, activator, and trigger modules, to generate rogue code and insert it into a wireless LAN were developed to illustrate the efficacy of the model. Also incorporated into the model are defense measures against remotely introduced rogue programs and a cost-benefit analysis that determined that such defenses for a specific environment were cost-justified.

  1. Codifying Information Assurance Controls for Department of Defense (DoD) Supervisory Control and Data Acquisition (SCADA) Systems

    DTIC Science & Technology

    2010-03-01

    CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF DEFENSE (DOD) SUPERVISORY CONTROL AND DATA...Force, Department of Defense, or the U.S. Government. AFIT/GCO/ENG/10-13 CODIFYING INFORMATION ASSURANCE CONTROLS FOR DEPARTMENT OF...DEFENSE (DOD) SUPERVISORY CONTROL AND DATA ACQUISITION (SCADA) SYSTEMS THESIS Presented to the Faculty Department of Electrical and Computer

  2. A cross-sectional study of the effects of load carriage on running characteristics and tibial mechanical stress: implications for stress fracture injuries in women

    DTIC Science & Technology

    2017-03-23

    performance computing resources made available by the US Department of Defense High Performance Computing Modernization Program at the Air Force...1Department of Defense Biotechnology High Performance Computing Software Applications Institute, Telemedicine and Advanced Technology Research Center, United...States Army Medical Research and Materiel Command, Fort Detrick, Maryland, USA Full list of author information is available at the end of the article

  3. Transcriptome comparison and gene coexpression network analysis provide a systems view of citrus response to ‘Candidatus Liberibacter asiaticus’ infection

    PubMed Central

    2013-01-01

    Background Huanglongbing (HLB) is arguably the most destructive disease for the citrus industry. HLB is caused by infection of the bacterium, Candidatus Liberibacter spp. Several citrus GeneChip studies have revealed thousands of genes that are up- or down-regulated by infection with Ca. Liberibacter asiaticus. However, whether and how these host genes act to protect against HLB remains poorly understood. Results As a first step towards a mechanistic view of citrus in response to the HLB bacterial infection, we performed a comparative transcriptome analysis and found that a total of 21 Probesets are commonly up-regulated by the HLB bacterial infection. In addition, a number of genes are likely regulated specifically at early, late or very late stages of the infection. Furthermore, using Pearson correlation coefficient-based gene coexpression analysis, we constructed a citrus HLB response network consisting of 3,507 Probesets and 56,287 interactions. Genes involved in carbohydrate and nitrogen metabolic processes, transport, defense, signaling and hormone response were overrepresented in the HLB response network and the subnetworks for these processes were constructed. Analysis of the defense and hormone response subnetworks indicates that hormone response is interconnected with defense response. In addition, mapping the commonly up-regulated HLB responsive genes into the HLB response network resulted in a core subnetwork where transport plays a key role in the citrus response to the HLB bacterial infection. Moreover, analysis of a phloem protein subnetwork indicates a role for this protein and zinc transporters or zinc-binding proteins in the citrus HLB defense response. Conclusion Through integrating transcriptome comparison and gene coexpression network analysis, we have provided for the first time a systems view of citrus in response to the Ca. Liberibacter spp. infection causing HLB. PMID:23324561

  4. Human-machine analytics for closed-loop sense-making in time-dominant cyber defense problems

    NASA Astrophysics Data System (ADS)

    Henry, Matthew H.

    2017-05-01

    Many defense problems are time-dominant: attacks progress at speeds that outpace human-centric systems designed for monitoring and response. Despite this shortcoming, these well-honed and ostensibly reliable systems pervade most domains, including cyberspace. The argument that often prevails when considering the automation of defense is that while technological systems are suitable for simple, well-defined tasks, only humans possess sufficiently nuanced understanding of problems to act appropriately under complicated circumstances. While this perspective is founded in verifiable truths, it does not account for a middle ground in which human-managed technological capabilities extend well into the territory of complex reasoning, thereby automating more nuanced sense-making and dramatically increasing the speed at which it can be applied. Snort1 and platforms like it enable humans to build, refine, and deploy sense-making tools for network defense. Shortcomings of these platforms include a reliance on rule-based logic, which confounds analyst knowledge of how bad actors behave with the means by which bad behaviors can be detected, and a lack of feedback-informed automation of sensor deployment. We propose an approach in which human-specified computational models hypothesize bad behaviors independent of indicators and then allocate sensors to estimate and forecast the state of an intrusion. State estimates and forecasts inform the proactive deployment of additional sensors and detection logic, thereby closing the sense-making loop. All the while, humans are on the loop, rather than in it, permitting nuanced management of fast-acting automated measurement, detection, and inference engines. This paper motivates and conceptualizes analytics to facilitate this human-machine partnership.

  5. Make or Buy: A Systematic Approach to Department of Defense Sourcing Decisions

    DTIC Science & Technology

    2013-07-30

    Defense-Industrial Initiatives Group at CSIS, where he worked on projects related to U.S. and European technology and industrial bases supporting defense...Prior to joining CSIS, Mr. Ben-Ari was a research associate at George Washington University’s Center for International Science and Technology ...collaborative research and development programs for Gilat Satellite Networks Ltd., an Israeli high- technology company in the field of satellite

  6. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...

  7. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...

  8. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...

  9. 32 CFR 245.6 - Abbreviations and acronyms.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ...—Domestic Event Network DHS—Department of Homeland Security DND—Department of National Defence (Canada) DoD... (NORAD) NORAD—North American Aerospace Defense Command PACAF—Pacific Air Forces SCA—Security Control Authorization SEADS—Southeast Air Defense Sector (NORAD) SUA—Special Use Airspace TSA—Transportation Security...

  10. Censorship: Tactics for Defense.

    ERIC Educational Resources Information Center

    Lowery, Skip

    1998-01-01

    Book banners are generally successful because they have a wide network of support, including national coalitions with sophisticated organizational methods--such as electing certain people to school boards. School officials should get organized and devise defensive strategies, such as inviting critics to class, asking what they would like to…

  11. Efficient Allocation of Resources for Defense of Spatially Distributed Networks Using Agent-Based Simulation.

    PubMed

    Kroshl, William M; Sarkani, Shahram; Mazzuchi, Thomas A

    2015-09-01

    This article presents ongoing research that focuses on efficient allocation of defense resources to minimize the damage inflicted on a spatially distributed physical network such as a pipeline, water system, or power distribution system from an attack by an active adversary, recognizing the fundamental difference between preparing for natural disasters such as hurricanes, earthquakes, or even accidental systems failures and the problem of allocating resources to defend against an opponent who is aware of, and anticipating, the defender's efforts to mitigate the threat. Our approach is to utilize a combination of integer programming and agent-based modeling to allocate the defensive resources. We conceptualize the problem as a Stackelberg "leader follower" game where the defender first places his assets to defend key areas of the network, and the attacker then seeks to inflict the maximum damage possible within the constraints of resources and network structure. The criticality of arcs in the network is estimated by a deterministic network interdiction formulation, which then informs an evolutionary agent-based simulation. The evolutionary agent-based simulation is used to determine the allocation of resources for attackers and defenders that results in evolutionary stable strategies, where actions by either side alone cannot increase its share of victories. We demonstrate these techniques on an example network, comparing the evolutionary agent-based results to a more traditional, probabilistic risk analysis (PRA) approach. Our results show that the agent-based approach results in a greater percentage of defender victories than does the PRA-based approach. © 2015 Society for Risk Analysis.

  12. Network Design Guidance for the Global Special Operations Forces Network

    DTIC Science & Technology

    2014-12-01

    41 a. Concepts Emerge.....................................................................42 b. Model...78 a. Culture .....................................................................................78 b... Concept for Joint Operations COIN counterinsurgency COM commercial DMA Deputy Municipal Administrator DOD Department of Defense DOS Department

  13. Threat Based Risk Assessment for Enterprise Networks

    DTIC Science & Technology

    2016-02-15

    served as the program chair of the Research in Attacks, Intrusions , and Defenses workshop; the Neural Information Processing Systems (NIPS) annual...Threat- Based Risk Assessment for Enterprise Networks Richard P. Lippmann and James F. Riordan Protecting enterprise networks requires...include aids for the hearing impaired, speech recognition, pattern classification, neural networks , and cybersecurity. He has taught three courses

  14. DDN New User Guide. Revision.

    DTIC Science & Technology

    1992-10-01

    5 2.1 Network Overview ................................................ 5 2.2 Network Access Methods...to TAC and ?4ini-TAC users, such as common error messages, TAC commands, and instructions for performing file tranders. Section 5 , Network Use...originally known as Interface Message Processors, or IMPs. 5 THE DEFENSE DATA NETWORK DRAFt NIC 60001, October 1992 message do not necessarily take the same

  15. A Framework for Engineering Stress Resilient Plants Using Genetic Feedback Control and Regulatory Network Rewiring.

    PubMed

    Foo, Mathias; Gherman, Iulia; Zhang, Peijun; Bates, Declan G; Denby, Katherine J

    2018-05-23

    Crop disease leads to significant waste worldwide, both pre- and postharvest, with subsequent economic and sustainability consequences. Disease outcome is determined both by the plants' response to the pathogen and by the ability of the pathogen to suppress defense responses and manipulate the plant to enhance colonization. The defense response of a plant is characterized by significant transcriptional reprogramming mediated by underlying gene regulatory networks, and components of these networks are often targeted by attacking pathogens. Here, using gene expression data from Botrytis cinerea-infected Arabidopsis plants, we develop a systematic approach for mitigating the effects of pathogen-induced network perturbations, using the tools of synthetic biology. We employ network inference and system identification techniques to build an accurate model of an Arabidopsis defense subnetwork that contains key genes determining susceptibility of the plant to the pathogen attack. Once validated against time-series data, we use this model to design and test perturbation mitigation strategies based on the use of genetic feedback control. We show how a synthetic feedback controller can be designed to attenuate the effect of external perturbations on the transcription factor CHE in our subnetwork. We investigate and compare two approaches for implementing such a controller biologically-direct implementation of the genetic feedback controller, and rewiring the regulatory regions of multiple genes-to achieve the network motif required to implement the controller. Our results highlight the potential of combining feedback control theory with synthetic biology for engineering plants with enhanced resilience to environmental stress.

  16. A Game-Theoretic Response Strategy for Coordinator Attack in Wireless Sensor Networks

    PubMed Central

    Liu, Jianhua; Yue, Guangxue; Shang, Huiliang; Li, Hongjie

    2014-01-01

    The coordinator is a specific node that controls the whole network and has a significant impact on the performance in cooperative multihop ZigBee wireless sensor networks (ZWSNs). However, the malicious node attacks coordinator nodes in an effort to waste the resources and disrupt the operation of the network. Attacking leads to a failure of one round of communication between the source nodes and destination nodes. Coordinator selection is a technique that can considerably defend against attack and reduce the data delivery delay, and increase network performance of cooperative communications. In this paper, we propose an adaptive coordinator selection algorithm using game and fuzzy logic aiming at both minimizing the average number of hops and maximizing network lifetime. The proposed game model consists of two interrelated formulations: a stochastic game for dynamic defense and a best response policy using evolutionary game formulation for coordinator selection. The stable equilibrium best policy to response defense is obtained from this game model. It is shown that the proposed scheme can improve reliability and save energy during the network lifetime with respect to security. PMID:25105171

  17. A game-theoretic response strategy for coordinator attack in wireless sensor networks.

    PubMed

    Liu, Jianhua; Yue, Guangxue; Shen, Shigen; Shang, Huiliang; Li, Hongjie

    2014-01-01

    The coordinator is a specific node that controls the whole network and has a significant impact on the performance in cooperative multihop ZigBee wireless sensor networks (ZWSNs). However, the malicious node attacks coordinator nodes in an effort to waste the resources and disrupt the operation of the network. Attacking leads to a failure of one round of communication between the source nodes and destination nodes. Coordinator selection is a technique that can considerably defend against attack and reduce the data delivery delay, and increase network performance of cooperative communications. In this paper, we propose an adaptive coordinator selection algorithm using game and fuzzy logic aiming at both minimizing the average number of hops and maximizing network lifetime. The proposed game model consists of two interrelated formulations: a stochastic game for dynamic defense and a best response policy using evolutionary game formulation for coordinator selection. The stable equilibrium best policy to response defense is obtained from this game model. It is shown that the proposed scheme can improve reliability and save energy during the network lifetime with respect to security.

  18. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Sheldon, Frederick T; Krings, Axel; Yoo, Seong-Moo

    2006-01-01

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglectedmore » or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .« less

  19. 32 CFR 2402.4 - Procedure for requesting records.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Procedure for requesting records. 2402.4 Section 2402.4 National Defense Other Regulations Relating to National Defense OFFICE OF SCIENCE AND TECHNOLOGY... can be downloaded or transferred intact to a floppy disk, computer disk (CD), tape, or other...

  20. 78 FR 48722 - Records Schedules; Availability and Request for Comments

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-08-09

    .... Department of Defense, Defense Logistics Agency (DAA-0361-2013- 0006, 1 item, 1 temporary item). Records... disposition of computers. 4. Department of Defense, National Security Agency (N1-457-13-2, 3 items, 3... destruction, after a specified period, of records lacking administrative, legal, research, or other value...

  1. Aegis International and Ballistic Missile Defense: A New Interoperability Network

    DTIC Science & Technology

    2011-06-01

    the 1950’s and 1960s ( NIKE Hercules, Sentinel, Safeguard, Site Defense, etc.). The objectives have been pursued by a centralized organization (the...from land. This means greater geographic flexibility, greater survivability and greater scalability in response to an evolving threat. That’s

  2. Commercializing Defense Technologies and Helping Defense Firms Succeed in Commercial Markets: A Report on the Objectives, Activities, and Accomplishments of the TAP-IN Program

    NASA Technical Reports Server (NTRS)

    1997-01-01

    Technology Access for Product Innovation (TAP-IN), the largest technology deployment project funded by TRP, was competitively selected through a national solicitation for proposals. TAP-IN was created to help companies access and apply defense technologies and help defense-dependent companies enter new commercial markets. Defense technologies included technologies developed by DoD, DOE, NASA, and their contractors. TAP-IN was structured to provide region-based technology access services that were able to draw on technology resources nationwide. TAP-IN provided expert assistance in all stages of the commercialization process from concept through prototype design to capital sourcing and marketing strategy. TAP-IN helped companies locate new technology, identify business partners, secure financing, develop ideas for new products, identify new markets, license technology, solve technical problems, and develop company-specific applications of federal technology. TAP-IN leveraged NASA's existing commercial technology network to create an integrated national network of organizations that assisted companies in every state. In addition to NASA's six regional technology transfer centers (RTTCs), TAP-IN included business and technology development organizations in every state, the Industrial Designers Society of America, and the Federal Laboratory Consortium (FLC).

  3. Integrated Air and Missile Defense (IAMD)

    DTIC Science & Technology

    2015-12-01

    equal to or greater than the effectiveness levels of fielded TBM and CM/ABT defense systems. Common Command and Control The Army IAMD SoS common C2...externally developed sensors and shooters to provide an effective IAMD capability. The IAMD program will allow transformation to a network-centric system of...systems capability, also referred to as "Plug and Fight", that integrates all Air and Missile Defense (AMD) sensors, weapons, and mission control

  4. Network-based stochastic competitive learning approach to disambiguation in collaborative networks.

    PubMed

    Christiano Silva, Thiago; Raphael Amancio, Diego

    2013-03-01

    Many patterns have been uncovered in complex systems through the application of concepts and methodologies of complex networks. Unfortunately, the validity and accuracy of the unveiled patterns are strongly dependent on the amount of unavoidable noise pervading the data, such as the presence of homonymous individuals in social networks. In the current paper, we investigate the problem of name disambiguation in collaborative networks, a task that plays a fundamental role on a myriad of scientific contexts. In special, we use an unsupervised technique which relies on a particle competition mechanism in a networked environment to detect the clusters. It has been shown that, in this kind of environment, the learning process can be improved because the network representation of data can capture topological features of the input data set. Specifically, in the proposed disambiguating model, a set of particles is randomly spawned into the nodes constituting the network. As time progresses, the particles employ a movement strategy composed of a probabilistic convex mixture of random and preferential walking policies. In the former, the walking rule exclusively depends on the topology of the network and is responsible for the exploratory behavior of the particles. In the latter, the walking rule depends both on the topology and the domination levels that the particles impose on the neighboring nodes. This type of behavior compels the particles to perform a defensive strategy, because it will force them to revisit nodes that are already dominated by them, rather than exploring rival territories. Computer simulations conducted on the networks extracted from the arXiv repository of preprint papers and also from other databases reveal the effectiveness of the model, which turned out to be more accurate than traditional clustering methods.

  5. Network-based stochastic competitive learning approach to disambiguation in collaborative networks

    NASA Astrophysics Data System (ADS)

    Christiano Silva, Thiago; Raphael Amancio, Diego

    2013-03-01

    Many patterns have been uncovered in complex systems through the application of concepts and methodologies of complex networks. Unfortunately, the validity and accuracy of the unveiled patterns are strongly dependent on the amount of unavoidable noise pervading the data, such as the presence of homonymous individuals in social networks. In the current paper, we investigate the problem of name disambiguation in collaborative networks, a task that plays a fundamental role on a myriad of scientific contexts. In special, we use an unsupervised technique which relies on a particle competition mechanism in a networked environment to detect the clusters. It has been shown that, in this kind of environment, the learning process can be improved because the network representation of data can capture topological features of the input data set. Specifically, in the proposed disambiguating model, a set of particles is randomly spawned into the nodes constituting the network. As time progresses, the particles employ a movement strategy composed of a probabilistic convex mixture of random and preferential walking policies. In the former, the walking rule exclusively depends on the topology of the network and is responsible for the exploratory behavior of the particles. In the latter, the walking rule depends both on the topology and the domination levels that the particles impose on the neighboring nodes. This type of behavior compels the particles to perform a defensive strategy, because it will force them to revisit nodes that are already dominated by them, rather than exploring rival territories. Computer simulations conducted on the networks extracted from the arXiv repository of preprint papers and also from other databases reveal the effectiveness of the model, which turned out to be more accurate than traditional clustering methods.

  6. Changing Manufacturing Technology and Jobs in Defense Industries.

    ERIC Educational Resources Information Center

    Oliver, Richard P.

    1983-01-01

    Provides information on the current status of computer-assisted manufacturing, current employment, and plans for new technology in three defense-related industries: aircraft, shipbuilding, and ordnance. (SK)

  7. Synthetic plant defense elicitors

    PubMed Central

    Bektas, Yasemin; Eulgem, Thomas

    2015-01-01

    To defend themselves against invading pathogens plants utilize a complex regulatory network that coordinates extensive transcriptional and metabolic reprogramming. Although many of the key players of this immunity-associated network are known, the details of its topology and dynamics are still poorly understood. As an alternative to forward and reverse genetic studies, chemical genetics-related approaches based on bioactive small molecules have gained substantial popularity in the analysis of biological pathways and networks. Use of such molecular probes can allow researchers to access biological space that was previously inaccessible to genetic analyses due to gene redundancy or lethality of mutations. Synthetic elicitors are small drug-like molecules that induce plant defense responses, but are distinct from known natural elicitors of plant immunity. While the discovery of some synthetic elicitors had already been reported in the 1970s, recent breakthroughs in combinatorial chemical synthesis now allow for inexpensive high-throughput screens for bioactive plant defense-inducing compounds. Along with powerful reverse genetics tools and resources available for model plants and crop systems, comprehensive collections of new synthetic elicitors will likely allow plant scientists to study the intricacies of plant defense signaling pathways and networks in an unparalleled fashion. As synthetic elicitors can protect crops from diseases, without the need to be directly toxic for pathogenic organisms, they may also serve as promising alternatives to conventional biocidal pesticides, which often are harmful for the environment, farmers and consumers. Here we are discussing various types of synthetic elicitors that have been used for studies on the plant immune system, their modes-of-action as well as their application in crop protection. PMID:25674095

  8. DMA (Defense Mapping Agency): The Digital Revolution,

    DTIC Science & Technology

    1984-06-21

    8217 , 𔃿DEFENSE APPING AGENCY: * TIlE DIGITAL REVOLUTION .. ..4 8 .O44 9 5* ; n : . . ., -. n I , . , : ’ . , , - n .’ ’.’- ;; : - COVER FIGURES Top... orthophoto bases. Development of the Continental Control Network and the procurement of an Off- Line Ortho-Photo System has expanded our ability to obtain

  9. The Shared Bibliographic Input Network (SBIN): A Summary of the Experiment.

    ERIC Educational Resources Information Center

    Cotter, Gladys A.

    As part of its mission to provide centralized services for the acquisition, storage, retrieval, and dissemination of scientific and technical information (STI) to support Department of Defense (DoD) research, development, and engineering studies programs, the Defense Technical Information Center (DTIC) sponsors the Shared Bibliographic Input…

  10. Department of Defense Information Enterprise: Strategic Plan 2010-2012

    DTIC Science & Technology

    2010-04-01

    migrate from circuit-based technology to a converged (voice, video , and data) IP network and UC services environment. Ensure the optimal...Kevin Coleman, “Cyber Attacks on Supply Chain Systems,” Defense Tech, April 15, 2009 8 Lolita C. Baldor, “Federal Web Sites Knocked Out by Cyber Attack

  11. 77 FR 29985 - Renewal of Department of Defense Federal Advisory Committees

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-05-21

    ... network providers. Panel members, who are not full-time or permanent part-time Federal officers or... Panel's Chairperson from the total membership. With the exception of travel and per diem for official Panel related travel, Panel members shall serve without compensation. The Secretary of Defense may...

  12. Integrated Strategic Planning and Analysis Network Increment 4 (ISPAN Inc 4)

    DTIC Science & Technology

    2016-03-01

    Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment Decision FY...Inc 4 will achieve FDD completion criteria when: 1) the system meets all the KPP thresholds as verified through an Initial Operational Test and

  13. Integrated Strategic Planning and Analysis Network Increment 5 (ISPAN Inc 5)

    DTIC Science & Technology

    2016-03-01

    Defense Acquisition Executive DoD - Department of Defense DoDAF - DoD Architecture Framework FD - Full Deployment FDD - Full Deployment Decision...achieve FDD in August 2018. ISPAN Inc 5 is envisioned as a follow-on to ISPAN Inc 4 in order to respond to USSTRATCOM requirements for improved

  14. Research on techniques for computer three-dimensional simulation of satellites and night sky

    NASA Astrophysics Data System (ADS)

    Yan, Guangwei; Hu, Haitao

    2007-11-01

    To study space attack-defense technology, a simulation of satellites is needed. We design and implement a 3d simulating system of satellites. The satellites are rendered under the Night sky background. The system structure is as follows: one computer is used to simulate the orbital of satellites, the other computers are used to render 3d simulation scene. To get a realistic effect, a three-channel multi-projector display system is constructed. We use MultiGen Creator to construct satellite and star models. We use MultiGen Distributed Vega to render the three-channel scene. There are one master and three slaves. The master controls the three slaves to render three channels separately. To get satellites' positions and attitudes, the master communicates with the satellite orbit simulator based on TCP/IP protocol. Then it calculates the observer's position, the satellites' position, the moon's and the sun's position and transmits the data to the slaves. To get a smooth orbit of target satellites, an orbit prediction method is used. Because the target satellite data packets and the attack satellite data packets cannot keep synchronization in the network, a target satellite dithering phenomenon will occur when the scene is rendered. To resolve this problem, an anti-dithering algorithm is designed. To render Night sky background, a file which stores stars' position and brightness data is used. According to the brightness of each star, the stars are classified into different magnitude. The star model is scaled according to the magnitude. All the stars are distributed on a celestial sphere. Experiments show, the whole system can run correctly, and the frame rate can reach 30Hz. The system can be used in a space attack-defense simulation field.

  15. The biocontrol agent Pseudomonas chlororaphis PA23 primes Brassica napus defenses through distinct gene networks.

    PubMed

    Duke, Kelly A; Becker, Michael G; Girard, Ian J; Millar, Jenna L; Dilantha Fernando, W G; Belmonte, Mark F; de Kievit, Teresa R

    2017-06-19

    The biological control agent Pseudomonas chlororaphis PA23 is capable of protecting Brassica napus (canola) from the necrotrophic fungus Sclerotinia sclerotiorum via direct antagonism. While we have elucidated bacterial genes and gene products responsible biocontrol, little is known about how the host plant responds to bacterial priming on the leaf surface, including global changes in gene activity in the presence and absence of S. sclerotiorum. Application of PA23 to the aerial surfaces of canola plants reduced the number of S. sclerotiorum lesion-forming petals by 91.1%. RNA sequencing of the host pathogen interface showed that pretreatment with PA23 reduced the number of genes upregulated in response to S. sclerotiorum by 16-fold. By itself, PA23 activated unique defense networks indicative of defense priming. Genes encoding MAMP-triggered immunity receptors detecting flagellin and peptidoglycan were downregulated in PA23 only-treated plants, consistent with post-stimulus desensitization. Downstream, we observed reactive oxygen species (ROS) production involving low levels of H 2 O 2 and overexpression of genes associated with glycerol-3-phosphate (G3P)-mediated systemic acquired resistance (SAR). Leaf chloroplasts exhibited increased thylakoid membrane structures and chlorophyll content, while lipid metabolic processes were upregulated. In addition to directly antagonizing S. sclerotiorum, PA23 primes the plant defense response through induction of unique local and systemic defense networks. This study provides novel insight into the effects of biocontrol agents applied to the plant phyllosphere. Understanding these interactions will aid in the development of biocontrol systems as an alternative to chemical pesticides for protection of important crop systems.

  16. U.S. Department of Defense Multiple-Parameter Biodosimetry Network.

    PubMed

    Blakely, William F; Romanyukha, Alexander; Hayes, Selena M; Reyes, Ricardo A; Stewart, H Michael; Hoefer, Matthew H; Williams, Anthony; Sharp, Thad; Huff, L Andrew

    2016-12-01

    The U.S. Department of Defense (USDOD) service members are at risk of exposure to ionizing radiation due to radiation accidents, terrorist attacks and national defense activities. The use of biodosimetry is a standard of care for the triage and treatment of radiation injuries. Resources and procedures need to be established to implement a multiple-parameter biodosimetry system coupled with expert medial guidance to provide an integrated radiation diagnostic system to meet USDOD requirements. Current USDOD biodosimetry capabilities were identified and recommendations to fill the identified gaps are provided. A USDOD Multi-parametric Biodosimetry Network, based on the expertise that resides at the Armed Forces Radiobiology Research Institute and the Naval Dosimetry Center, was designed. This network based on the use of multiple biodosimetry modalities would provide diagnostic and triage capabilities needed to meet USDOD requirements. These are not available with sufficient capacity elsewhere but could be needed urgently after a major radiological/nuclear event. Published by Oxford University Press 2016. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  17. IDMA: improving the defense against malicious attack for mobile ad hoc networks based on ARIP protocol

    NASA Astrophysics Data System (ADS)

    Peng, Chaorong; Chen, Chang Wen

    2008-04-01

    Malicious nodes are mounting increasingly sophisticated attacking operations on the Mobile Ad Hoc Networks (MANETs). This is mainly because the IP-based MANETs are vulnerable to attacks by various malicious nodes. However, the defense against malicious attack can be improved when a new layer of network architecture can be developed to separate true IP address from disclosing to the malicious nodes. In this paper, we propose a new algorithm to improve the defense against malicious attack (IDMA) that is based on a recently developed Assignment Router Identify Protocol (ARIP) for the clustering-based MANET management. In the ARIP protocol, we design the ARIP architecture based on the new Identity instead of the vulnerable IP addresses to provide the required security that is embedded seamlessly into the overall network architecture. We make full use of ARIP's special property to monitor gateway forward packets by Reply Request Route Packets (RREP) without additional intrusion detection layer. We name this new algorithm IDMA because of its inherent capability to improve the defense against malicious attacks. Through IDMA, a watching algorithm can be established so as to counterattack the malicious node in the routing path when it unusually drops up packets. We provide analysis examples for IDMA for the defense against a malicious node that disrupts the route discovery by impersonating the destination, or by responding with state of corrupted routing information, or by disseminating forged control traffic. The IDMA algorithm is able to counterattack the malicious node in the cases when the node lunch DoS attack by broadcast a large number of route requests, or make Target traffic congestion by delivering huge mount of data; or spoof the IP addresses and send forge packets with a fake ID to the same Target causing traffic congestion at that destination. We have implemented IDMA algorism using the GloMoSim simulator and have demonstrated its performance under a variety of operational conditions.

  18. Evaluating Modern Defenses Against Control Flow Hijacking

    DTIC Science & Technology

    2015-09-01

    unsound and could introduce false negatives (opening up another possible set of attacks). CFG Construction using DSA We next evaluate the precision of CFG...Evaluating Modern Defenses Against Control Flow Hijacking by Ulziibayar Otgonbaatar Submitted to the Department of Electrical Engineering and...Computer Science in partial fulfillment of the requirements for the degree of Master of Science in Computer Science and Engineering at the MASSACHUSETTS

  19. 78 FR 28626 - Oshkosh Defense, a Subsidiary of Oshkosh Corporation, Including On-Site Leased Workers From...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-05-15

    ...., Larsen and Toubro Limited, MRI Network/Manta Resources, Inc., Omni Resources, Premier Temporary Staffing...., Larsen and Toubro Limited, MRI Network/Manta Resources, Inc., Omni Resources, Premier Temporary Staffing...

  20. Health care network communications infrastructure: an engineering design for the Military Health Service System.

    PubMed

    Hoffman, P; Kline, E; George, L; Price, K; Clark, M; Walasin, R

    1995-01-01

    The Military Health Service System (MHSS) provides health care for the Department of Defense (DOD). This system operates on an annual budget of $15 Billion, supports 127 medical treatment facilities (MTFs) and 500 clinics, and provides support to 8.7 million beneficiaries worldwide. To support these facilities and their patients, the MHSS uses more than 125 different networked automated medical systems. These systems rely on a heterogeneous telecommunications infrastructure for data communications. With the support of the Defense Medical Information Management (DMIM) Program Office, our goal was to identify the network requirements for DMIM migration and target systems and design a communications infrastructure to support all systems with an integrated network. This work used tools from Business Process Reengineering (BPR) and applied it to communications infrastructure design for the first time. The methodology and results are applicable to any health care enterprise, military or civilian.

  1. Health care network communications infrastructure: an engineering design for the Military Health Service System.

    PubMed Central

    Hoffman, P.; Kline, E.; George, L.; Price, K.; Clark, M.; Walasin, R.

    1995-01-01

    The Military Health Service System (MHSS) provides health care for the Department of Defense (DOD). This system operates on an annual budget of $15 Billion, supports 127 medical treatment facilities (MTFs) and 500 clinics, and provides support to 8.7 million beneficiaries worldwide. To support these facilities and their patients, the MHSS uses more than 125 different networked automated medical systems. These systems rely on a heterogeneous telecommunications infrastructure for data communications. With the support of the Defense Medical Information Management (DMIM) Program Office, our goal was to identify the network requirements for DMIM migration and target systems and design a communications infrastructure to support all systems with an integrated network. This work used tools from Business Process Reengineering (BPR) and applied it to communications infrastructure design for the first time. The methodology and results are applicable to any health care enterprise, military or civilian. PMID:8563346

  2. Networked Special Operations: Addressing Transnational Threats, Homeland Defense, and Breached Seams in the Western Hemisphere

    DTIC Science & Technology

    2017-04-20

    the time and effort placed forward by both Dr. Greg Miller and Mr. Michael Bennett as part of the research thesis team and as advisors on this...defensive units are comprised of various individual positions. Linebackers, safeties, defensive lineman, corners, etc. Each player excels at his...position, trains to very specific guidelines based on his unique skill sets, and uses mentors that give the player the best guidance in becoming the best

  3. Military Transformation and the Defense Industry After Next: The Defense Industrial Implications of Network-Centric Warfare

    DTIC Science & Technology

    2002-09-01

    including suggestions for reducing this burden, to Washington Headquarters Services , Directorate for Information Operations and Reports, 1215 Jefferson...require the acquisition of unfamiliar weapons and support systems. Joint and service visions of the military after next raise serious questions that...and the U.S. Defense Industry The U.S. military is awash in visions of transformation. There is an array of joint and service visions of what has become

  4. An operational computer program to control Self Defense Surface Missile System operations

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Roe, C.L.

    1991-12-01

    An account is given of the system architecture and operational protocols of the NATO Seasparrow Surface Missile System (NSSMS) Operational Computer Program (OCP) which has been developed, and is being deployed multinationally, to respond against antiship missiles. Flowcharts are presented for the target detection and tracking, control, and engagement phases of the Self Defense Surface Missile System that is controlled by the OCP. USN and other NATO vessels will carry the NSSMS well into the next century; the OCP presently described will be deployed in the course of 1992 to enhance the self-defense capabilities of the NSSMS-equipped fleet. 8 refs.

  5. Partial Activation of SA- and JA-Defensive Pathways in Strawberry upon Colletotrichum acutatum Interaction.

    PubMed

    Amil-Ruiz, Francisco; Garrido-Gala, José; Gadea, José; Blanco-Portales, Rosario; Muñoz-Mérida, Antonio; Trelles, Oswaldo; de Los Santos, Berta; Arroyo, Francisco T; Aguado-Puig, Ana; Romero, Fernando; Mercado, José-Ángel; Pliego-Alfaro, Fernando; Muñoz-Blanco, Juan; Caballero, José L

    2016-01-01

    Understanding the nature of pathogen host interaction may help improve strawberry (Fragaria × ananassa) cultivars. Plant resistance to pathogenic agents usually operates through a complex network of defense mechanisms mediated by a diverse array of signaling molecules. In strawberry, resistance to a variety of pathogens has been reported to be mostly polygenic and quantitatively inherited, making it difficult to associate molecular markers with disease resistance genes. Colletotrichum acutatum spp. is a major strawberry pathogen, and completely resistant cultivars have not been reported. Moreover, strawberry defense network components and mechanisms remain largely unknown and poorly understood. Assessment of the strawberry response to C. acutatum included a global transcript analysis, and acidic hormones SA and JA measurements were analyzed after challenge with the pathogen. Induction of transcripts corresponding to the SA and JA signaling pathways and key genes controlling major steps within these defense pathways was detected. Accordingly, SA and JA accumulated in strawberry after infection. Contrastingly, induction of several important SA, JA, and oxidative stress-responsive defense genes, including FaPR1-1, FaLOX2, FaJAR1, FaPDF1, and FaGST1, was not detected, which suggests that specific branches in these defense pathways (those leading to FaPR1-2, FaPR2-1, FaPR2-2, FaAOS, FaPR5, and FaPR10) were activated. Our results reveal that specific aspects in SA and JA dependent signaling pathways are activated in strawberry upon interaction with C. acutatum. Certain described defense-associated transcripts related to these two known signaling pathways do not increase in abundance following infection. This finding suggests new insight into a specific putative molecular strategy for defense against this pathogen.

  6. Partial Activation of SA- and JA-Defensive Pathways in Strawberry upon Colletotrichum acutatum Interaction

    PubMed Central

    Amil-Ruiz, Francisco; Garrido-Gala, José; Gadea, José; Blanco-Portales, Rosario; Muñoz-Mérida, Antonio; Trelles, Oswaldo; de los Santos, Berta; Arroyo, Francisco T.; Aguado-Puig, Ana; Romero, Fernando; Mercado, José-Ángel; Pliego-Alfaro, Fernando; Muñoz-Blanco, Juan; Caballero, José L.

    2016-01-01

    Understanding the nature of pathogen host interaction may help improve strawberry (Fragaria × ananassa) cultivars. Plant resistance to pathogenic agents usually operates through a complex network of defense mechanisms mediated by a diverse array of signaling molecules. In strawberry, resistance to a variety of pathogens has been reported to be mostly polygenic and quantitatively inherited, making it difficult to associate molecular markers with disease resistance genes. Colletotrichum acutatum spp. is a major strawberry pathogen, and completely resistant cultivars have not been reported. Moreover, strawberry defense network components and mechanisms remain largely unknown and poorly understood. Assessment of the strawberry response to C. acutatum included a global transcript analysis, and acidic hormones SA and JA measurements were analyzed after challenge with the pathogen. Induction of transcripts corresponding to the SA and JA signaling pathways and key genes controlling major steps within these defense pathways was detected. Accordingly, SA and JA accumulated in strawberry after infection. Contrastingly, induction of several important SA, JA, and oxidative stress-responsive defense genes, including FaPR1-1, FaLOX2, FaJAR1, FaPDF1, and FaGST1, was not detected, which suggests that specific branches in these defense pathways (those leading to FaPR1-2, FaPR2-1, FaPR2-2, FaAOS, FaPR5, and FaPR10) were activated. Our results reveal that specific aspects in SA and JA dependent signaling pathways are activated in strawberry upon interaction with C. acutatum. Certain described defense-associated transcripts related to these two known signaling pathways do not increase in abundance following infection. This finding suggests new insight into a specific putative molecular strategy for defense against this pathogen. PMID:27471515

  7. Active Cyber Defense: Enhancing National Cyber Defense

    DTIC Science & Technology

    2011-12-01

    Prevention System ISP Internet Service Provider IT Information Technology IWM Information Warfare Monitor LOAC Law of Armed Conflict NATO...the Information Warfare Monitor ( IWM ) discovered that GhostNet had infected 1,295 computers in 103 countries. As many as thirty percent of these...By monitoring the computers in Dharamsala and at various Tibetan missions, IWM was able to determine the IP addresses of the servers hosting Gh0st

  8. Bibliographic Networks and Microcomputer Applications for Aerospace and Defense Scientific and Technical Information.

    ERIC Educational Resources Information Center

    Hartt, Richard W.

    This report discusses the characteristics, operations, and automation requirements of technical libraries providing services to organizations involved in aerospace and defense scientific and technical work, and describes the Local Automation Model project. This on-going project is designed to demonstrate the concept of a fully integrated library…

  9. Affinity communities in United Nations voting: Implications for democracy, cooperation, and conflict

    NASA Astrophysics Data System (ADS)

    Pauls, Scott D.; Cranmer, Skyler J.

    2017-10-01

    A network oriented examination of the co-voting network of the United Nations (UN) provides powerful insights into the international alignment of states, as well as normatively important processes such as democracy, defensive cooperation, and armed conflict. Here, we investigate the UN co-voting network using the tools of community detection and inductively identify "affinity communities" in which states articulate similar policy preferences through their voting patterns. Analysis of these communities reveals that there is more information contained in UN voting and co-voting patterns than has previously been thought. Affinity communities have complex relationships with some of the most normatively important international outcomes: they reflect transitions to democracy, have a feedback loop with the formation of defensive alliances, and actively help states avoid armed conflict.

  10. Dynamic defense workshop :

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Crosby, Sean Michael; Doak, Justin E.; Haas, Jason Juedes.

    2013-02-01

    On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-artmore » work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.« less

  11. 2-Player Game With Uncertainty to Protect Mission Critical Information Over Blue Networks

    DTIC Science & Technology

    2009-04-01

    Eclipse 233MHz 512MB 700MB JAVA 6 166MHz 64MB 98MB Key Focus Sensor Honeypot 1.5 GHz 512MB 500MB Distributed Data Pastry JAVA...defense, Pastry , run. JAVA 6 is an added plug-in that helps Eclipse software. There are many defenses that can be used to help alongside this project but...each defense to be used. Encryption : Steganos Privacy Suite 2008 Honeypots : Key Focus Sensor Distributed Data: Pastry 7    Table 2 Domain

  12. Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOEpatents

    Archer, Charles J; Faraj, Ahmad A; Inglett, Todd A; Ratterman, Joseph D

    2013-04-16

    Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selected link to the adjacent compute node connected to the compute node through the selected link.

  13. Role of Silicon on Plant–Pathogen Interactions

    PubMed Central

    Wang, Min; Gao, Limin; Dong, Suyue; Sun, Yuming; Shen, Qirong; Guo, Shiwei

    2017-01-01

    Although silicon (Si) is not recognized as an essential element for general higher plants, it has beneficial effects on the growth and production of a wide range of plant species. Si is known to effectively mitigate various environmental stresses and enhance plant resistance against both fungal and bacterial pathogens. In this review, the effects of Si on plant–pathogen interactions are analyzed, mainly on physical, biochemical, and molecular aspects. In most cases, the Si-induced biochemical/molecular resistance during plant–pathogen interactions were dominated as joint resistance, involving activating defense-related enzymes activates, stimulating antimicrobial compound production, regulating the complex network of signal pathways, and activating of the expression of defense-related genes. The most previous studies described an independent process, however, the whole plant resistances were rarely considered, especially the interaction of different process in higher plants. Si can act as a modulator influencing plant defense responses and interacting with key components of plant stress signaling systems leading to induced resistance. Priming of plant defense responses, alterations in phytohormone homeostasis, and networking by defense signaling components are all potential mechanisms involved in Si-triggered resistance responses. This review summarizes the roles of Si in plant–microbe interactions, evaluates the potential for improving plant resistance by modifying Si fertilizer inputs, and highlights future research concerning the role of Si in agriculture. PMID:28529517

  14. Providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Archer, Charles J.; Faraj, Daniel A.; Inglett, Todd A.

    Methods, apparatus, and products are disclosed for providing full point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: receiving a network packet in a compute node, the network packet specifying a destination compute node; selecting, in dependence upon the destination compute node, at least one of the links for the compute node along which to forward the network packet toward the destination compute node; and forwarding the network packet along the selectedmore » link to the adjacent compute node connected to the compute node through the selected link.« less

  15. System Design Plan for a DCS (Defense Communications System) Data Transmission Network.

    DTIC Science & Technology

    1981-07-01

    modems , FDO group modems , and Voice Frequency Carrier Telegraph (VFCT) networks. The DTN will be a synchronous network and its implementation must coincide...Frequency (VF) modems and Voice Frequency Carrier Telegraph (VFCT) networks. Further, data circuits can be extended over present analog FDM facilities using...VF or group data modems . In addition to the availability of terrestrial and satellite digital transmission facilities, the implementation of the DTN

  16. Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures

    DTIC Science & Technology

    2015-09-01

    soundness or completeness. An incomplete analysis will produce extra edges in the CFG that might allow an attacker to slip through. An unsound analysis...Analysis of Defenses Against Code Reuse Attacks on Modern and New Architectures by Isaac Noah Evans Submitted to the Department of Electrical...Engineering and Computer Science in partial fulfillment of the requirements for the degree of Master of Engineering in Electrical Engineering and Computer

  17. Air Defense: A Computer Game for Research in Human Performance.

    DTIC Science & Technology

    1981-07-01

    warfare (ANW) threat analysis. M’ajor elements of the threat analysis problem \\\\,erc eoibedded in an interactive air detoense game controlled by a...The game requires sustained attention to a complex and interactive "hostile" environment, provides proper experimental control of relevant variables...AD-A102 725 NAVY PERSONNEL RESEARCH AND DEVELOPMENT CENTER SAN DETC F/6 5/10 AIR DEFENSE: A COMPUTER GAME FOR RESEARCH IN HUMAN PERFORMANCE.(U) JUL

  18. 48 CFR 227.7202-1 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  19. 48 CFR 227.7202-1 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  20. 48 CFR 227.7202-1 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  1. 48 CFR 227.7202-1 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  2. 48 CFR 227.7202-1 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7202-1 Policy. (a) Commercial computer software or commercial computer software documentation shall be acquired under the licenses customarily provided to the public...

  3. Computing Cluster for Large Scale Turbulence Simulations and Applications in Computational Aeroacoustics

    NASA Astrophysics Data System (ADS)

    Lele, Sanjiva K.

    2002-08-01

    Funds were received in April 2001 under the Department of Defense DURIP program for construction of a 48 processor high performance computing cluster. This report details the hardware which was purchased and how it has been used to enable and enhance research activities directly supported by, and of interest to, the Air Force Office of Scientific Research and the Department of Defense. The report is divided into two major sections. The first section after this summary describes the computer cluster, its setup, and some cluster performance benchmark results. The second section explains ongoing research efforts which have benefited from the cluster hardware, and presents highlights of those efforts since installation of the cluster.

  4. What Next for Networks and Netwars

    DTIC Science & Technology

    2001-01-01

    Jacques Derrida , Michel Foucault, 30Standard sources on neorealism include a range of writings by Kenneth Waltz and John Mearshimer in particular. The...address banking networks, and Jacques (1990), which provides a classic defense of the importance of hierarchy in corporate structures. What Next for

  5. 32 CFR 310.53 - Computer matching agreements (CMAs).

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 2 2013-07-01 2013-07-01 false Computer matching agreements (CMAs). 310.53... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.53 Computer.... (3) Justification and expected results. Explain why computer matching as opposed to some other...

  6. 32 CFR 310.53 - Computer matching agreements (CMAs).

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 2 2014-07-01 2014-07-01 false Computer matching agreements (CMAs). 310.53... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.53 Computer.... (3) Justification and expected results. Explain why computer matching as opposed to some other...

  7. 32 CFR 310.53 - Computer matching agreements (CMAs).

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 2 2012-07-01 2012-07-01 false Computer matching agreements (CMAs). 310.53... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.53 Computer.... (3) Justification and expected results. Explain why computer matching as opposed to some other...

  8. 32 CFR 310.53 - Computer matching agreements (CMAs).

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 2 2010-07-01 2010-07-01 false Computer matching agreements (CMAs). 310.53... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.53 Computer.... (3) Justification and expected results. Explain why computer matching as opposed to some other...

  9. 32 CFR 310.53 - Computer matching agreements (CMAs).

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 2 2011-07-01 2011-07-01 false Computer matching agreements (CMAs). 310.53... (CONTINUED) PRIVACY PROGRAM DOD PRIVACY PROGRAM Computer Matching Program Procedures § 310.53 Computer.... (3) Justification and expected results. Explain why computer matching as opposed to some other...

  10. Offense-Defense Theory Analysis of Russian Cyber Capability

    DTIC Science & Technology

    2015-03-01

    Internet and communications technologies IR international relations ISP Internet service provider RBN Russian Business Network Roskomnadzor Federal...Service for Supervision of Communications , Information Technology and Mass Media SCO Shanghai Cooperation Organization SORM System for Operative...complexity of contributing factors, it may be more meaningful to calculate dyadic , rather than systemic offense-defense balance, and it is valuable to

  11. The DoD Gateway Information System: Bibliography, Directory of Resources, Prototype Experience, [and] User Interface Design.

    ERIC Educational Resources Information Center

    Cotter, Gladys A.; And Others

    The Defense Technical Information Center (DTIC), an organization charged with providing information services to the Department of Defense (DoD) scientific and technical community, actively seeks ways to promote access to and utilization of scientific and technical information (STI) databases, online services, and networks relevant to the conduct…

  12. Sanitization and Disposal of Excess Information Technology Equipment

    DTIC Science & Technology

    2009-09-21

    Report No. D-2009-104 September 21, 2009 Sanitization and Disposal of Excess Information Technology Equipment...2009 2. REPORT TYPE 3. DATES COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE Sanitization and Disposal of Excess Information Technology ...Defense (Networks and Information Integration)/DOD Chief Information Officer DRMS Defense Reutilization and Marketing Service IT Information

  13. DefenseLink Special: Operation Enduring Freedom Marks 4 Years

    Science.gov Websites

    DefenseLink.mil Aug. 04, 2015 War on Terror Transformation News Products Press Resources Images Websites Contact Afghanistan and ushering in Operation Enduring Freedom and the global war on terror. That volley, launched Oct action represented just one front in an ongoing U.S. effort against terror networks. "Today, we

  14. Enhancement of the Monet/Atonet Washington DC Network

    DTIC Science & Technology

    2003-01-01

    Technologies Sponsored by Defense Advanced Research Projects Agency DARPA Order No. J792 APPROVED FOR PUBLIC RELEASE...representing the official policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the U.S. Government...AIR FORCE RESEARCH LABORATORY INFORMATION DIRECTORATE ROME RESEARCH SITE ROME, NEW YORK This report has been reviewed by the Air Force

  15. FY 1991 RDT&E Descriptive Summaries

    DTIC Science & Technology

    1990-01-01

    OF PROJECT : The Defense Sciences program element provides the technical foundation for long-term improvements in military equiment...DESCRIPTION OF PROJECT : Develop the fundamental technology in advanced digital structures and network concepts for smaller, more powerful, less expensive...DESCRIPTION OF PROJECT : The 1985 Defense Science Board (DSB) noted that the United States was behind and failing further behind in armor and

  16. Sandia National Laboratories: Locations: Kauai Test Facility

    Science.gov Websites

    Defense Systems & Assessments About Defense Systems & Assessments Program Areas Accomplishments Foundations Bioscience Computing & Information Science Electromagnetics Engineering Science Geoscience Suppliers iSupplier Account Accounts Payable Contract Information Construction & Facilities Contract

  17. The Future Role of the Department of Defense in Protecting and Defending America’s Economy in Cyberspace

    DTIC Science & Technology

    2014-12-12

    hold. The retail giant installed a FireEye computer security system that completed a month long testing phase in May 2013. The system was designed ...agencies. Through the Untied States Cyber Command, the Department of Defense has capability that can be used to defend America. This reseach paper looks... reseach paper looks at the roles and responsibilities of the Department of Defense as it relates to Homeland Defense and the protection of credit

  18. Critical Infrastructure Protection II, The International Federation for Information Processing, Volume 290.

    NASA Astrophysics Data System (ADS)

    Papa, Mauricio; Shenoi, Sujeet

    The information infrastructure -- comprising computers, embedded devices, networks and software systems -- is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: - Themes and Issues - Infrastructure Security - Control Systems Security - Security Strategies - Infrastructure Interdependencies - Infrastructure Modeling and Simulation This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

  19. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets aremore » considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.« less

  20. Architecting Communication Network of Networks for Space System of Systems

    NASA Technical Reports Server (NTRS)

    Bhasin, Kul B.; Hayden, Jeffrey L.

    2008-01-01

    The National Aeronautics and Space Administration (NASA) and the Department of Defense (DoD) are planning Space System of Systems (SoS) to address the new challenges of space exploration, defense, communications, navigation, Earth observation, and science. In addition, these complex systems must provide interoperability, enhanced reliability, common interfaces, dynamic operations, and autonomy in system management. Both NASA and the DoD have chosen to meet the new demands with high data rate communication systems and space Internet technologies that bring Internet Protocols (IP), routers, servers, software, and interfaces to space networks to enable as much autonomous operation of those networks as possible. These technologies reduce the cost of operations and, with higher bandwidths, support the expected voice, video, and data needed to coordinate activities at each stage of an exploration mission. In this paper, we discuss, in a generic fashion, how the architectural approaches and processes are being developed and used for defining a hypothetical communication and navigation networks infrastructure to support lunar exploration. Examples are given of the products generated by the architecture development process.

  1. Random domain name and address mutation (RDAM) for thwarting reconnaissance attacks

    PubMed Central

    Chen, Xi; Zhu, Yuefei

    2017-01-01

    Network address shuffling is a novel moving target defense (MTD) that invalidates the address information collected by the attacker by dynamically changing or remapping the host’s network addresses. However, most network address shuffling methods are limited by the limited address space and rely on the host’s static domain name to map to its dynamic address; therefore these methods cannot effectively defend against random scanning attacks, and cannot defend against an attacker who knows the target’s domain name. In this paper, we propose a network defense method based on random domain name and address mutation (RDAM), which increases the scanning space of the attacker through a dynamic domain name method and reduces the probability that a host will be hit by an attacker scanning IP addresses using the domain name system (DNS) query list and the time window methods. Theoretical analysis and experimental results show that RDAM can defend against scanning attacks and worm propagation more effectively than general network address shuffling methods, while introducing an acceptable operational overhead. PMID:28489910

  2. 48 CFR 227.7200 - Scope of subpart.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...

  3. 48 CFR 227.7200 - Scope of subpart.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...

  4. 48 CFR 227.7200 - Scope of subpart.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...

  5. 48 CFR 227.7200 - Scope of subpart.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...

  6. 48 CFR 227.7200 - Scope of subpart.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7200 Scope of subpart. This subpart— (a) Prescribes policies and procedures for the acquisition of computer software and computer software documentation, and the...

  7. Transcriptome analysis reveals regulatory networks underlying differential susceptibility to Botrytis cinerea in response to nitrogen availability in Solanum lycopersicum

    PubMed Central

    Vega, Andrea; Canessa, Paulo; Hoppe, Gustavo; Retamal, Ignacio; Moyano, Tomas C.; Canales, Javier; Gutiérrez, Rodrigo A.; Rubilar, Joselyn

    2015-01-01

    Nitrogen (N) is one of the main limiting nutrients for plant growth and crop yield. It is well documented that changes in nitrate availability, the main N source found in agricultural soils, influences a myriad of developmental programs and processes including the plant defense response. Indeed, many agronomical reports indicate that the plant N nutritional status influences their ability to respond effectively when challenged by different pathogens. However, the molecular mechanisms involved in N-modulation of plant susceptibility to pathogens are poorly characterized. In this work, we show that Solanum lycopersicum defense response to the necrotrophic fungus Botrytis cinerea is affected by plant N availability, with higher susceptibility in nitrate-limiting conditions. Global gene expression responses of tomato against B. cinerea under contrasting nitrate conditions reveals that plant primary metabolism is affected by the fungal infection regardless of N regimes. This result suggests that differential susceptibility to pathogen attack under contrasting N conditions is not only explained by a metabolic alteration. We used a systems biology approach to identify the transcriptional regulatory network implicated in plant response to the fungus infection under contrasting nitrate conditions. Interestingly, hub genes in this network are known key transcription factors involved in ethylene and jasmonic acid signaling. This result positions these hormones as key integrators of nitrate and defense against B. cinerea in tomato plants. Our results provide insights into potential crosstalk mechanisms between necrotrophic defense response and N status in plants. PMID:26583019

  8. Common object request broker architecture (CORBA)-based security services for the virtual radiology environment.

    PubMed

    Martinez, R; Cole, C; Rozenblit, J; Cook, J F; Chacko, A K

    2000-05-01

    The US Army Great Plains Regional Medical Command (GPRMC) has a requirement to conform to Department of Defense (DoD) and Army security policies for the Virtual Radiology Environment (VRE) Project. Within the DoD, security policy is defined as the set of laws, rules, and practices that regulate how an organization manages, protects, and distributes sensitive information. Security policy in the DoD is described by the Trusted Computer System Evaluation Criteria (TCSEC), Army Regulation (AR) 380-19, Defense Information Infrastructure Common Operating Environment (DII COE), Military Health Services System Automated Information Systems Security Policy Manual, and National Computer Security Center-TG-005, "Trusted Network Interpretation." These documents were used to develop a security policy that defines information protection requirements that are made with respect to those laws, rules, and practices that are required to protect the information stored and processed in the VRE Project. The goal of the security policy is to provide for a C2-level of information protection while also satisfying the functional needs of the GPRMC's user community. This report summarizes the security policy for the VRE and defines the CORBA security services that satisfy the policy. In the VRE, the information to be protected is embedded into three major information components: (1) Patient information consists of Digital Imaging and Communications in Medicine (DICOM)-formatted fields. The patient information resides in the digital imaging network picture archiving and communication system (DIN-PACS) networks in the database archive systems and includes (a) patient demographics; (b) patient images from x-ray, computed tomography (CT), magnetic resonance imaging (MRI), and ultrasound (US); and (c) prior patient images and related patient history. (2) Meta-Manager information to be protected consists of several data objects. This information is distributed to the Meta-Manager nodes and includes (a) radiologist schedules; (b) modality worklists; (c) routed case information; (d) DIN-PACS and Composite Health Care system (CHCS) messages, and Meta-Manager administrative and security information; and (e) patient case information. (3) Access control and communications security is required in the VRE to control who uses the VRE and Meta-Manager facilities and to secure the messages between VRE components. The CORBA Security Service Specification version 1.5 is designed to allow up to TCSEC's B2-level security for distributed objects. The CORBA Security Service Specification defines the functionality of several security features: identification and authentication, authorization and access control, security auditing, communication security, nonrepudiation, and security administration. This report describes the enhanced security features for the VRE and their implementation using commercial CORBA Security Service software products.

  9. The study and implementation of the wireless network data security model

    NASA Astrophysics Data System (ADS)

    Lin, Haifeng

    2013-03-01

    In recent years, the rapid development of Internet technology and the advent of information age, people are increasing the strong demand for the information products and the market for information technology. Particularly, the network security requirements have become more sophisticated. This paper analyzes the wireless network in the data security vulnerabilities. And a list of wireless networks in the framework is the serious defects with the related problems. It has proposed the virtual private network technology and wireless network security defense structure; and it also given the wireless networks and related network intrusion detection model for the detection strategies.

  10. 76 FR 25310 - Notice of Intent To Grant a Partially Exclusive Patent License to videoNEXT Network Solutions, Inc.

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-05-04

    ... DEPARTMENT OF DEFENSE Department of the Army Notice of Intent To Grant a Partially Exclusive Patent License to videoNEXT Network Solutions, Inc. AGENCY: Department of the Army, DoD. ACTION: Notice... notice of its intent to grant to videoNEXT Network Solutions, Inc., a corporation having its principle...

  11. Real-Time Network Management

    DTIC Science & Technology

    1998-07-01

    Report No. WH97JR00-A002 Sponsored by REAL-TIME NETWORK MANAGEMENT FINAL TECHNICAL REPORT K CD July 1998 CO CO O W O Defense Advanced...Approved for public release; distribution unlimited. t^GquALmmsPEami Report No. WH97JR00-A002 REAL-TIME NETWORK MANAGEMENT Synectics Corporation...2.1.2.1 WAN-class Networks 12 2.1.2.2 IEEE 802.3-class Networks 13 2.2 Task 2 - Object Modeling for Architecture 14 2.2.1 Managed Objects 14 2.2.2

  12. Non-harmful insertion of data mimicking computer network attacks

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  13. 75 FR 76428 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-12-08

    ..., country, organization, phone, fax, mobile, pager, Defense Switched Network (DSN) phone, other fax, other... to populate and maintain personal data elements in DoD Component networks and systems, such as.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion...

  14. Auctions in Defense Acquisition: Theory and Experimental Evidence

    DTIC Science & Technology

    2002-01-01

    Department of Defense (DoD) has recently begun purchasing with online auctions — receiving offers from suppli- ers for things ranging from computers to...equipment for U.S. Navy vessels. The Navy was the first to try online auctions for procuring airplane and ship parts. The Army’s first venture into...system. The Air Force first tested the online auction waters in Au- gust 2000 to acquire computer equipment and saved about $88,000, or 27 percent of

  15. A Study of the IEEE 802.16 MAC Layer and its Utility in Augmenting the ADNS Architecture to Provide Adaptable Intra-Strike Group High-Speed Packet Switched Data, Imagery, and Voice Communications

    DTIC Science & Technology

    2005-09-01

    This research explores the need for a high throughput, high speed network for use in a network centric wartime environment and how commercial...Automated Digital Network System (ADNS). This research explores the need for a high-throughput, high-speed network for use in a network centric ...1 C. DEPARTMENT OF DEFENSE (DOD) DESIRED END STATE ..............2 1. DOD Transformation to Network Centric Warfare (NCW) Operations

  16. Identification of transcriptional regulatory nodes in soybean defense networks using transient co-transactivation assays

    PubMed Central

    Wang, Yongli; Wang, Hui; Ma, Yujie; Du, Haiping; Yang, Qing; Yu, Deyue

    2015-01-01

    Plant responses to major environmental stressors, such as insect feeding, not only occur via the functions of defense genes but also involve a series of regulatory factors. Our previous transcriptome studies proposed that, in addition to two defense-related genes, GmVSPβ and GmN:IFR, a high proportion of transcription factors (TFs) participate in the incompatible soybean-common cutworm interaction networks. However, the regulatory mechanisms and effects of these TFs on those induced defense-related genes remain unknown. In the present work, we isolated and identified 12 genes encoding MYB, WRKY, NAC, bZIP, and DREB TFs from a common cutworm-induced cDNA library of a resistant soybean line. Sequence analysis of the promoters of three co-expressed genes, including GmVSPα, GmVSPβ, and GmN:IFR, revealed the enrichment of various TF-binding sites for defense and stress responses. To further identify the regulatory nodes composed of these TFs and defense gene promoters, we performed extensive transient co-transactivation assays to directly test the transcriptional activity of the 12 TFs binding at different levels to the three co-expressed gene promoters. The results showed that all 12 TFs were able to transactivate the GmVSPβ and GmN:IFR promoters. GmbZIP110 and GmMYB75 functioned as distinct regulators of GmVSPα/β and GmN:IFR expression, respectively, while GmWRKY39 acted as a common central regulator of GmVSPα/β and GmN:IFR expression. These corresponding TFs play crucial roles in coordinated plant defense regulation, which provides valuable information for understanding the molecular mechanisms involved in insect-induced transcriptional regulation in soybean. More importantly, the identified TFs and suitable promoters can be used to engineer insect-resistant plants in molecular breeding studies. PMID:26579162

  17. 48 CFR 227.7203-1 - Policy.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...

  18. 48 CFR 227.7203-1 - Policy.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...

  19. 48 CFR 227.7203-1 - Policy.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...

  20. 48 CFR 227.7203-1 - Policy.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...

  1. 48 CFR 227.7203-1 - Policy.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7203-1 Policy. (a) DoD policy is to acquire only the computer software and computer software documentation, and the rights in such software or documentation, necessary...

  2. 77 FR 38610 - Privacy Act of 1974; Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2012-06-28

    ... DEPARTMENT OF EDUCATION Privacy Act of 1974; Computer Matching Program AGENCY: Department of Education. ACTION: Notice--Computer matching agreement between the Department of Education and the Department of Defense. SUMMARY: This document provides notice of the continuation of the computer matching...

  3. Scalable Static and Dynamic Community Detection Using Grappolo

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Halappanavar, Mahantesh; Lu, Hao; Kalyanaraman, Anantharaman

    Graph clustering, popularly known as community detection, is a fundamental kernel for several applications of relevance to the Defense Advanced Research Projects Agency’s (DARPA) Hierarchical Identify Verify Exploit (HIVE) Pro- gram. Clusters or communities represent natural divisions within a network that are densely connected within a cluster and sparsely connected to the rest of the network. The need to compute clustering on large scale data necessitates the development of efficient algorithms that can exploit modern architectures that are fundamentally parallel in nature. How- ever, due to their irregular and inherently sequential nature, many of the current algorithms for community detectionmore » are challenging to parallelize. In response to the HIVE Graph Challenge, we present several parallelization heuristics for fast community detection using the Louvain method as the serial template. We implement all the heuristics in a software library called Grappolo. Using the inputs from the HIVE Challenge, we demonstrate superior performance and high quality solutions based on four parallelization heuristics. We use Grappolo on static graphs as the first step towards community detection on streaming graphs.« less

  4. Trade-Offs Between Plant Growth and Defense Against Insect Herbivory: An Emerging Mechanistic Synthesis.

    PubMed

    Züst, Tobias; Agrawal, Anurag A

    2017-04-28

    Costs of defense are central to our understanding of interactions between organisms and their environment, and defensive phenotypes of plants have long been considered to be constrained by trade-offs that reflect the allocation of limiting resources. Recent advances in uncovering signal transduction networks have revealed that defense trade-offs are often the result of regulatory "decisions" by the plant, enabling it to fine-tune its phenotype in response to diverse environmental challenges. We place these results in the context of classic studies in ecology and evolutionary biology, and propose a unifying framework for growth-defense trade-offs as a means to study the plant's allocation of limiting resources. Pervasive physiological costs constrain the upper limit to growth and defense traits, but the diversity of selective pressures on plants often favors negative correlations at intermediate trait levels. Despite the ubiquity of underlying costs of defense, the current challenge is using physiological and molecular approaches to predict the conditions where they manifest as detectable trade-offs.

  5. 32 CFR 806b.50 - Computer matching.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 6 2013-07-01 2013-07-01 false Computer matching. 806b.50 Section 806b.50... PROGRAM Disclosing Records to Third Parties § 806b.50 Computer matching. Computer matching programs... on forms used in applying for benefits. Coordinate computer matching statements on forms with Air...

  6. 32 CFR 806b.50 - Computer matching.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 6 2014-07-01 2014-07-01 false Computer matching. 806b.50 Section 806b.50... PROGRAM Disclosing Records to Third Parties § 806b.50 Computer matching. Computer matching programs... on forms used in applying for benefits. Coordinate computer matching statements on forms with Air...

  7. 32 CFR 806b.50 - Computer matching.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 6 2012-07-01 2012-07-01 false Computer matching. 806b.50 Section 806b.50... PROGRAM Disclosing Records to Third Parties § 806b.50 Computer matching. Computer matching programs... on forms used in applying for benefits. Coordinate computer matching statements on forms with Air...

  8. 32 CFR 806b.50 - Computer matching.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 6 2010-07-01 2010-07-01 false Computer matching. 806b.50 Section 806b.50... PROGRAM Disclosing Records to Third Parties § 806b.50 Computer matching. Computer matching programs... on forms used in applying for benefits. Coordinate computer matching statements on forms with Air...

  9. 32 CFR 806b.50 - Computer matching.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 6 2011-07-01 2011-07-01 false Computer matching. 806b.50 Section 806b.50... PROGRAM Disclosing Records to Third Parties § 806b.50 Computer matching. Computer matching programs... on forms used in applying for benefits. Coordinate computer matching statements on forms with Air...

  10. Organization of the secure distributed computing based on multi-agent system

    NASA Astrophysics Data System (ADS)

    Khovanskov, Sergey; Rumyantsev, Konstantin; Khovanskova, Vera

    2018-04-01

    Nowadays developing methods for distributed computing is received much attention. One of the methods of distributed computing is using of multi-agent systems. The organization of distributed computing based on the conventional network computers can experience security threats performed by computational processes. Authors have developed the unified agent algorithm of control system of computing network nodes operation. Network PCs is used as computing nodes. The proposed multi-agent control system for the implementation of distributed computing allows in a short time to organize using of the processing power of computers any existing network to solve large-task by creating a distributed computing. Agents based on a computer network can: configure a distributed computing system; to distribute the computational load among computers operated agents; perform optimization distributed computing system according to the computing power of computers on the network. The number of computers connected to the network can be increased by connecting computers to the new computer system, which leads to an increase in overall processing power. Adding multi-agent system in the central agent increases the security of distributed computing. This organization of the distributed computing system reduces the problem solving time and increase fault tolerance (vitality) of computing processes in a changing computing environment (dynamic change of the number of computers on the network). Developed a multi-agent system detects cases of falsification of the results of a distributed system, which may lead to wrong decisions. In addition, the system checks and corrects wrong results.

  11. Department of Defense Annual Report on Sexual Assault in the Military. Fiscal Year 2010

    DTIC Science & Technology

    2011-03-01

    crisis centers, hospitals, and law enforcement.  USN SARCs reported working with 12 schools, universities, and other civilian community groups on...alliances with other Navy and DoD SAPR stakeholders as well as community coalitions and networks (e.g. local Rape Crisis Centers, etc). SARCs report...MILITARY COMMUNITY .............................. 6 DEPARTMENT OF DEFENSE SEXUAL ASSAULT PREVENTION STRATEGY

  12. CYBER DETERRENCE

    DTIC Science & Technology

    2016-02-11

    directed.36 Protected systems operating on secure networks will weigh into the adversaries calculus of risk and cost of their actions versus this... calculus deterring them from attack. Our extended defense with forts and lookouts searching outside the perimeter providing current intelligence of any...Last accessed 30 January 2016). 51 Phil Stewart , U.S. Defense Chief says pre-emptive action possible over cyber threat, Oct 11, 2012, http

  13. Ectopic expression of Arabidopsis genes encoding salicylic acid- and jasmonic acid-related proteins confers partial resistance to soybean cyst nematode (Heterodera glycines) in transgenic soybean roots

    USDA-ARS?s Scientific Manuscript database

    Background. Extensive studies using the model system Arabidopsis thaliana to elucidate plant defense signaling and pathway networks indicate that salicylic acid (SA) is the key hormone triggering the plant defense response against biotrophic and hemi-biotrophic pathogens, while jasmonic acid (JA) an...

  14. Financial Analysis of Hastily-Formed Networks

    DTIC Science & Technology

    2006-09-01

    well as support the goals of the new National Strategy, by developing new plans and procedures to improve the coordination, communications and...Strategy, by developing new plans and procedures to improve the coordination, communications and operations between DoD and other entities when...Strike Group xviii DoD Department of Defense DRDO Defense Research Development Organization EMT Emergency Medical Technician ESG Expeditionary

  15. No-hardware-signature cybersecurity-crypto-module: a resilient cyber defense agent

    NASA Astrophysics Data System (ADS)

    Zaghloul, A. R. M.; Zaghloul, Y. A.

    2014-06-01

    We present an optical cybersecurity-crypto-module as a resilient cyber defense agent. It has no hardware signature since it is bitstream reconfigurable, where single hardware architecture functions as any selected device of all possible ones of the same number of inputs. For a two-input digital device, a 4-digit bitstream of 0s and 1s determines which device, of a total of 16 devices, the hardware performs as. Accordingly, the hardware itself is not physically reconfigured, but its performance is. Such a defense agent allows the attack to take place, rendering it harmless. On the other hand, if the system is already infected with malware sending out information, the defense agent allows the information to go out, rendering it meaningless. The hardware architecture is immune to side attacks since such an attack would reveal information on the attack itself and not on the hardware. This cyber defense agent can be used to secure a point-to-point, point-to-multipoint, a whole network, and/or a single entity in the cyberspace. Therefore, ensuring trust between cyber resources. It can provide secure communication in an insecure network. We provide the hardware design and explain how it works. Scalability of the design is briefly discussed. (Protected by United States Patents No.: US 8,004,734; US 8,325,404; and other National Patents worldwide.)

  16. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  17. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  18. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  19. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  20. 48 CFR 212.7003 - Technical data and computer software.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... computer software. 212.7003 Section 212.7003 Federal Acquisition Regulations System DEFENSE ACQUISITION... data and computer software. For purposes of establishing delivery requirements and license rights for technical data under 227.7102 and for computer software under 227.7202, there shall be a rebuttable...

  1. Line-plane broadcasting in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-06-08

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  2. Line-plane broadcasting in a data communications network of a parallel computer

    DOEpatents

    Archer, Charles J.; Berg, Jeremy E.; Blocksome, Michael A.; Smith, Brian E.

    2010-11-23

    Methods, apparatus, and products are disclosed for line-plane broadcasting in a data communications network of a parallel computer, the parallel computer comprising a plurality of compute nodes connected together through the network, the network optimized for point to point data communications and characterized by at least a first dimension, a second dimension, and a third dimension, that include: initiating, by a broadcasting compute node, a broadcast operation, including sending a message to all of the compute nodes along an axis of the first dimension for the network; sending, by each compute node along the axis of the first dimension, the message to all of the compute nodes along an axis of the second dimension for the network; and sending, by each compute node along the axis of the second dimension, the message to all of the compute nodes along an axis of the third dimension for the network.

  3. The Science and Technology of the US National Missile Defense System

    NASA Astrophysics Data System (ADS)

    Postol, Theodore A.

    2010-03-01

    The National Missile Defense System utilizes UHF and X-band radars for search, track and discrimination, and interceptors that use long-wave infrared sensors to identify and home on attacking warheads. The radars and infrared sensors in the missile defense system perform at near the theoretical limits predicted by physics. However, in spite of the fantastic technical advances in sensor technology, signal processing, and computational support functions, the National Missile Defense System cannot be expected to ever work in realistic combat environments. This talk will describe why these impressive technologies can never deliver on the promise of a credible defense against long-range ballistic missiles.

  4. Mathematical Approaches to WMD Defense and Vulnerability Assessments of Dynamic Networks

    DTIC Science & Technology

    2016-07-01

    the last decade, and now tends to focus on a system -wide integration of fortification resources, strategically deployed to...create a robust system of networks. Given the presence of various networks, this goal seeks to determine which edges should be constructed to...controlling all aspects of his actions, with full knowledge of the system , and with the ability to jointly utilize all of

  5. Techniques for the Detection of Faulty Packet Header Modifications

    DTIC Science & Technology

    2014-03-12

    layer approaches to check if packets are being altered by middleboxes and were primarily developed as network neutrality analysis tools. Switzerland works...local and metropolitan area networks –specific requirements part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications...policy or position of the Department of Defense or the U.S. Government. Understanding, measuring, and debugging IP networks , particularly across

  6. Improving Department of Defense Global Distribution Performance Through Network Analysis

    DTIC Science & Technology

    2016-06-01

    network performance increase. 14. SUBJECT TERMS supply chain metrics, distribution networks, requisition shipping time, strategic distribution database...peace and war” (p. 4). USTRANSCOM Metrics and Analysis Branch defines, develops, tracks, and maintains outcomes- based supply chain metrics to...2014a, p. 8). The Joint Staff defines a TDD standard as the maximum number of days the supply chain can take to deliver requisitioned materiel

  7. Electronic Data Interchange (EDI): Using Electronic Commerce to Enhance Defense Logistics

    DTIC Science & Technology

    1991-01-01

    computer technology that promises to enhance the nation’s productivity by moving both private and public sector business from a paper-based world to one...based solely on elec- tronic transactions. Simply stated, EDI is the electronic exchange of formatted business transactions between one organization’s...computer and another’s. In May 1988, the Deputy Secretary of Defense issued a policy direc- tive that EDI was to become the "way of doing business " for

  8. VLSI Implementation of Neuromorphic Learning Networks

    DTIC Science & Technology

    1993-03-31

    AND DATES COVEREDFINAL/O1 AUG 90 TO 31 MAR 93 4. TITLE AND SUBTII1L S. FUNDING NUMBERS VLSI IMPLEMENTATION OF NEUROMORPHIC LEARNING NETWORKS (U) 6...Standard Form 298 (Rev 2-89) rtrfbc byv nN$I A Z’Si - 8 9- A* qip. COVER SHEET VLSI Implementation of Neuromorphic Learning Networks Contract Number... Neuromorphic Learning Networks Sponsored by Defense Advanced Research Projects Agency DARPA Order No. 7013 Monitored by AFOSR Under Contract No. F49620-90-C

  9. 78 FR 65975 - Notice of Availability (NOA) for Strategic Network Optimization (SNO) Environmental Assessment...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-04

    ... Impact (FONSI) AGENCY: Defense Logistics Agency, DoD. ACTION: Notice of Availability (NOA) for Strategic Network Optimization (SNO) Environmental Assessment (EA) Finding of No Significant Impact (FONSI). SUMMARY... impacts on the human environment are associated with this decision. FOR FURTHER INFORMATION CONTACT: Ann...

  10. 78 FR 68030 - Draft Guidance on Intellectual Property Rights for the National Network for Manufacturing...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2013-11-13

    ... Additive Manufacturing showed great promise for the defense, energy, space and commercial sectors of the Nation. In August, 2012, the selection of the National Additive Manufacturing Innovation Institute (NAMII...-01] Draft Guidance on Intellectual Property Rights for the National Network for Manufacturing...

  11. Network Centric Warfare: A Realistic Defense Alternative for Smaller Nations?

    DTIC Science & Technology

    2004-06-01

    organic information sources. The degree to which force entities are networked will determine the quality of information that is available to various...control processes will determine the extent that information is shared, as well as the nature and quality of the interactions that occur between and...

  12. New Frontiers in Networking with Emphasis on Defense Applications

    DTIC Science & Technology

    2016-06-01

    through its own experiences. d. The presence of “ elephants ” in the network is triggered partly by big data and partly by high resolution videos...transporting elephants and found even for this very limited mode of operation, good architectures with orders of magnitude rate and cost improvements are

  13. Holistic Network Defense: Fusing Host and Network Features for Attack Classification

    DTIC Science & Technology

    2011-03-01

    Measures for Anomaly Detection," IEEE Symposium on Security and Privacy, Oakland, CA, (May 2001). 33. Mahoney , Matthew V, and Phillip K. Chan...University of London, August 2005. 44. Newman , Daniel, Kristina M. Manalo, and Ed Tittel. "Intrusion Detection Overview," InformIT, (June 2004). 20 Feb

  14. 76 FR 38089 - Defense Federal Acquisition Regulation Supplement; Safeguarding Unclassified DoD Information...

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-06-29

    ... encryption of data for storage and transmission, network protection and intrusion detection, and cyber... review of its unclassified network for evidence of intrusion to include, but is not limited to... DoD information within industry, nor does it address cyber intrusion reporting for that information...

  15. 75 FR 69645 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-11-15

    ..., pager, Defense Switched Network (DSN) phone, other fax, other mobile, other pager, city, zip code, post... system may used to populate and maintain persona data elements in DoD component networks and systems.../Transport Layer Security (SSL/ TLS) connections, access control lists, file system permissions, intrusion...

  16. Aviation Research and the Internet

    NASA Technical Reports Server (NTRS)

    Scott, Antoinette M.

    1995-01-01

    The Internet is a network of networks. It was originally funded by the Defense Advanced Research Projects Agency or DOD/DARPA and evolved in part from the connection of supercomputer sites across the United States. The National Science Foundation (NSF) made the most of their supercomputers by connecting the sites to each other. This made the supercomputers more efficient and now allows scientists, engineers and researchers to access the supercomputers from their own labs and offices. The high speed networks that connect the NSF supercomputers form the backbone of the Internet. The World Wide Web (WWW) is a menu system. It gathers Internet resources from all over the world into a series of screens that appear on your computer. The WWW is also a distributed. The distributed system stores data information on many computers (servers). These servers can go out and get data when you ask for it. Hypermedia is the base of the WWW. One can 'click' on a section and visit other hypermedia (pages). Our approach to demonstrating the importance of aviation research through the Internet began with learning how to put pages on the Internet (on-line) ourselves. We were assigned two aviation companies; Vision Micro Systems Inc. and Innovative Aerodynamic Technologies (IAT). We developed home pages for these SBIR companies. The equipment used to create the pages were the UNIX and Macintosh machines. HTML Supertext software was used to write the pages and the Sharp JX600S scanner to scan the images. As a result, with the use of the UNIX, Macintosh, Sun, PC, and AXIL machines, we were able to present our home pages to over 800,000 visitors.

  17. 32 CFR 701.125 - Computer matching program.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 5 2012-07-01 2012-07-01 false Computer matching program. 701.125 Section 701... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.125 Computer matching program. The DPO has responsibility for coordinating the approval of DOD's participation in Computer Matching...

  18. 32 CFR 701.125 - Computer matching program.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 5 2014-07-01 2014-07-01 false Computer matching program. 701.125 Section 701... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.125 Computer matching program. The DPO has responsibility for coordinating the approval of DOD's participation in Computer Matching...

  19. 32 CFR 701.125 - Computer matching program.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 5 2013-07-01 2013-07-01 false Computer matching program. 701.125 Section 701... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.125 Computer matching program. The DPO has responsibility for coordinating the approval of DOD's participation in Computer Matching...

  20. 32 CFR 701.125 - Computer matching program.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... 32 National Defense 5 2010-07-01 2010-07-01 false Computer matching program. 701.125 Section 701... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.125 Computer matching program. The DPO has responsibility for coordinating the approval of DOD's participation in Computer Matching...

  1. 32 CFR 701.125 - Computer matching program.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 5 2011-07-01 2011-07-01 false Computer matching program. 701.125 Section 701... OF THE NAVY DOCUMENTS AFFECTING THE PUBLIC DON Privacy Program § 701.125 Computer matching program. The DPO has responsibility for coordinating the approval of DOD's participation in Computer Matching...

  2. Neural substrates of defensive reactivity in two subtypes of specific phobia

    PubMed Central

    Hilbert, Kevin; Stolyar, Veronika; Maslowski, Nina I.; Beesdo-Baum, Katja; Wittchen, Hans-Ulrich

    2014-01-01

    Depending on threat proximity, different defensive behaviours are mediated by a descending neural network involving forebrain (distal threat) vs midbrain areas (proximal threat). Compared to healthy subjects, it can be assumed that phobics are characterized by shortened defensive distances on a behavioural and neural level. This study aimed at characterizing defensive reactivity in two subtypes of specific phobia [snake (SP) and dental phobics (DP)]. Using functional magnetic resonance imaging (fMRI), n = 39 subjects (13 healthy controls, HC; 13 SP; 13 DP) underwent an event-related fMRI task employing an anticipation (5–10 s) and immediate perception phase (phobic pictures and matched neutral stimuli; 1250 ms) to modulate defensive distance. Although no differential brain activity in any comparisons was observed in DP, areas associated with defensive behaviours (e.g. amygdala, hippocampus, midbrain) were activated in SP. Decreasing defensive distance in SP was characterized by a shift to midbrain activity. Present findings substantiate differences between phobia types in their physiological and neural organization that can be expanded to early stages of defensive behaviours. Findings may contribute to a better understanding of the dynamic organization of defensive reactivity in different types of phobic fear. PMID:24174207

  3. Government Cloud Computing Policies: Potential Opportunities for Advancing Military Biomedical Research.

    PubMed

    Lebeda, Frank J; Zalatoris, Jeffrey J; Scheerer, Julia B

    2018-02-07

    This position paper summarizes the development and the present status of Department of Defense (DoD) and other government policies and guidances regarding cloud computing services. Due to the heterogeneous and growing biomedical big datasets, cloud computing services offer an opportunity to mitigate the associated storage and analysis requirements. Having on-demand network access to a shared pool of flexible computing resources creates a consolidated system that should reduce potential duplications of effort in military biomedical research. Interactive, online literature searches were performed with Google, at the Defense Technical Information Center, and at two National Institutes of Health research portfolio information sites. References cited within some of the collected documents also served as literature resources. We gathered, selected, and reviewed DoD and other government cloud computing policies and guidances published from 2009 to 2017. These policies were intended to consolidate computer resources within the government and reduce costs by decreasing the number of federal data centers and by migrating electronic data to cloud systems. Initial White House Office of Management and Budget information technology guidelines were developed for cloud usage, followed by policies and other documents from the DoD, the Defense Health Agency, and the Armed Services. Security standards from the National Institute of Standards and Technology, the Government Services Administration, the DoD, and the Army were also developed. Government Services Administration and DoD Inspectors General monitored cloud usage by the DoD. A 2016 Government Accountability Office report characterized cloud computing as being economical, flexible and fast. A congressionally mandated independent study reported that the DoD was active in offering a wide selection of commercial cloud services in addition to its milCloud system. Our findings from the Department of Health and Human Services indicated that the security infrastructure in cloud services may be more compliant with the Health Insurance Portability and Accountability Act of 1996 regulations than traditional methods. To gauge the DoD's adoption of cloud technologies proposed metrics included cost factors, ease of use, automation, availability, accessibility, security, and policy compliance. Since 2009, plans and policies were developed for the use of cloud technology to help consolidate and reduce the number of data centers which were expected to reduce costs, improve environmental factors, enhance information technology security, and maintain mission support for service members. Cloud technologies were also expected to improve employee efficiency and productivity. Federal cloud computing policies within the last decade also offered increased opportunities to advance military healthcare. It was assumed that these opportunities would benefit consumers of healthcare and health science data by allowing more access to centralized cloud computer facilities to store, analyze, search and share relevant data, to enhance standardization, and to reduce potential duplications of effort. We recommend that cloud computing be considered by DoD biomedical researchers for increasing connectivity, presumably by facilitating communications and data sharing, among the various intra- and extramural laboratories. We also recommend that policies and other guidances be updated to include developing additional metrics that will help stakeholders evaluate the above mentioned assumptions and expectations. Published by Oxford University Press on behalf of the Association of Military Surgeons of the United States 2018. This work is written by (a) US Government employee(s) and is in the public domain in the US.

  4. Deciphering the hormonal signalling network behind the systemic resistance induced by Trichoderma harzianum in tomato

    PubMed Central

    Martínez-Medina, Ainhoa; Fernández, Iván; Sánchez-Guzmán, María J.; Jung, Sabine C.; Pascual, Jose A.; Pozo, María J.

    2013-01-01

    Root colonization by selected Trichoderma isolates can activate in the plant a systemic defense response that is effective against a broad-spectrum of plant pathogens. Diverse plant hormones play pivotal roles in the regulation of the defense signaling network that leads to the induction of systemic resistance triggered by beneficial organisms [induced systemic resistance (ISR)]. Among them, jasmonic acid (JA) and ethylene (ET) signaling pathways are generally essential for ISR. However, Trichoderma ISR (TISR) is believed to involve a wider variety of signaling routes, interconnected in a complex network of cross-communicating hormone pathways. Using tomato as a model, an integrative analysis of the main mechanisms involved in the systemic resistance induced by Trichoderma harzianum against the necrotrophic leaf pathogen Botrytis cinerea was performed. Root colonization by T. harzianum rendered the leaves more resistant to B. cinerea independently of major effects on plant nutrition. The analysis of disease development in shoots of tomato mutant lines impaired in the synthesis of the key defense-related hormones JA, ET, salicylic acid (SA), and abscisic acid (ABA), and the peptide prosystemin (PS) evidenced the requirement of intact JA, SA, and ABA signaling pathways for a functional TISR. Expression analysis of several hormone-related marker genes point to the role of priming for enhanced JA-dependent defense responses upon pathogen infection. Together, our results indicate that although TISR induced in tomato against necrotrophs is mainly based on boosted JA-dependent responses, the pathways regulated by the plant hormones SA- and ABA are also required for successful TISR development. PMID:23805146

  5. The Fall of the General Staff Model: Towards a Third Generation U.S. Army Staff Theory

    DTIC Science & Technology

    2013-05-23

    Officer AVN : Aviation M&M: Movement and Manuever CBRN: Chemical, Biological, Radiological, Nuclear MP: Military Police 128Department of the Army...Missile Defense KM: Knowledge Management AVN : Aviation CMD GRP: Command Group M&M: Movement And Maneuver CA: Civil Affairs NETOPS: Network...ADA: Air Defense Artillery LNO: Liaison Officer AVN : Aviation M&M: Movement and Manuever CBRN: Chemical, Biological

  6. Cyber-Defense Return on Investment for NAVFAC Energy Technologies

    DTIC Science & Technology

    2017-12-01

    Stakeholder input is important to properly develop a tool that reflects the legitimate concerns of those who routinely design , operate, and use control ...cybersecurity results with no control system network connectivity at all. Both are extreme scenarios, unless electrical engineers can design a...support of a Department of Defense (DOD) effort to improve cyber- security in relation to DOD installation control systems. Space and Naval Warfare

  7. Multifunctional Information Distribution System (MIDS)

    DTIC Science & Technology

    2013-12-01

    Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to...Estimate DoD - Department of Defense DSN - Defense Switched Network Econ - Economic Eng - Engineering Est - Estimating FMS - Foreign Military Sales FY...fighter aircraft, bombers, helicopters, ships, and ground sites . The MIDS Program consists of the MIDS Low Volume Terminal (MIDS-LVT) and the MIDS

  8. 2007 Joint Chemical Biological, Radiological and Nuclear (CBRN) Conference and Exhibition - Combating Weapons of Mass Destruction

    DTIC Science & Technology

    2007-06-27

    Selected CB Defense Systems SHAPESENSE Joint Warning and Reporting Network JSLIST CB Protected Shelter Joint Vaccine Acquisition Program Joint Effects...military can operate in any environment, unconstrained by chemical or biological weapons. 21 SHIELD SUSTAIN Selected CB Defense Systems SHAPESENSE Joint...28070625_JCBRN_Conference_Reeves UNCLASSIFIED Decontamination Vision Strippable Barriers Self-Decontaminating Fabrics/Coatings Reduce Logistics Burden

  9. Defense Acquisitions: Assessments of Selected Weapon Programs

    DTIC Science & Technology

    2017-03-01

    PAC-3 MSE) 81 Warfighter Information Network-Tactical (WIN-T) Increment 2 83 Improved Turbine Engine Program (ITEP) 85 Long Range Precision Fires...incorporated certain 2010 acquisition reform initiatives. DOD and Congress have previously addressed some of the challenges and problems in the defense...additional quantities. While that does represent a cost increase, it does not necessarily indicate acquisition problems or a loss of buying power

  10. International Crisis Information Network

    DTIC Science & Technology

    2006-12-01

    AU African Union CA Civil Affairs (Specifically United States Army) CDHAM Center for Disaster and Humanitarian Assistance Medicine CEMAC Economic...Department of Defense DODD Department of Defense Directive ECOWAS Economic Community of West African States EU European Union FR First Responder HA...passion, such as rugby fans on Rugby365.com, or music lovers on MP3.com. These people exchange ideas and thoughts about the given passion.”83 The

  11. The Maryland Large-Scale Integrated Neurocognitive Architecture

    DTIC Science & Technology

    2008-03-01

    Visual input enters the network through the lateral geniculate nucleus (LGN) and is passed forward through visual brain regions (V1, V2, and V4...University of Maryland Sponsored by Defense Advanced Research Projects Agency DARPA Order No. V029 APPROVED FOR PUBLIC RELEASE...interpreted as necessarily representing the official policies, either expressed or implied, of the Defense Advanced Research Projects Agency or the U.S

  12. Joint Program Executive Office for Chemical and Biological Defense Strategic Plan FY13-18

    DTIC Science & Technology

    2012-06-01

    strategy calls for a global Biosurveillance network for timely disease surveillance of biological pathogens whether intentionally made or naturally... Biosurveillance . The President and Secretary of Defense provided renewed emphasis on rapidly and efficiently developing and manufacturing effective medical...and Force Protection Solutions to the Whole of Government and the Nation  Provide MCM for pre- and post- radiation exposure application , including

  13. Feature-based alert correlation in security systems using self organizing maps

    NASA Astrophysics Data System (ADS)

    Kumar, Munesh; Siddique, Shoaib; Noor, Humera

    2009-04-01

    The security of the networks has been an important concern for any organization. This is especially important for the defense sector as to get unauthorized access to the sensitive information of an organization has been the prime desire for cyber criminals. Many network security techniques like Firewall, VPN Concentrator etc. are deployed at the perimeter of network to deal with attack(s) that occur(s) from exterior of network. But any vulnerability that causes to penetrate the network's perimeter of defense, can exploit the entire network. To deal with such vulnerabilities a system has been evolved with the purpose of generating an alert for any malicious activity triggered against the network and its resources, termed as Intrusion Detection System (IDS). The traditional IDS have still some deficiencies like generating large number of alerts, containing both true and false one etc. By automatically classifying (correlating) various alerts, the high-level analysis of the security status of network can be identified and the job of network security administrator becomes much easier. In this paper we propose to utilize Self Organizing Maps (SOM); an Artificial Neural Network for correlating large amount of logged intrusion alerts based on generic features such as Source/Destination IP Addresses, Port No, Signature ID etc. The different ways in which alerts can be correlated by Artificial Intelligence techniques are also discussed. . We've shown that the strategy described in the paper improves the efficiency of IDS by better correlating the alerts, leading to reduced false positives and increased competence of network administrator.

  14. Can virtual reality be used to conduct mass prophylaxis clinic training? A pilot program.

    PubMed

    Yellowlees, Peter; Cook, James N; Marks, Shayna L; Wolfe, Daniel; Mangin, Elanor

    2008-03-01

    To create and evaluate a pilot bioterrorism defense training environment using virtual reality technology. The present pilot project used Second Life, an internet-based virtual world system, to construct a virtual reality environment to mimic an actual setting that might be used as a Strategic National Stockpile (SNS) distribution site for northern California in the event of a bioterrorist attack. Scripted characters were integrated into the system as mock patients to analyze various clinic workflow scenarios. Users tested the virtual environment over two sessions. Thirteen users who toured the environment were asked to complete an evaluation survey. Respondents reported that the virtual reality system was relevant to their practice and had potential as a method of bioterrorism defense training. Computer simulations of bioterrorism defense training scenarios are feasible with existing personal computer technology. The use of internet-connected virtual environments holds promise for bioterrorism defense training. Recommendations are made for public health agencies regarding the implementation and benefits of using virtual reality for mass prophylaxis clinic training.

  15. Towards a Multiscale Approach to Cybersecurity Modeling

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Hogan, Emilie A.; Hui, Peter SY; Choudhury, Sutanay

    2013-11-12

    We propose a multiscale approach to modeling cyber networks, with the goal of capturing a view of the network and overall situational awareness with respect to a few key properties--- connectivity, distance, and centrality--- for a system under an active attack. We focus on theoretical and algorithmic foundations of multiscale graphs, coming from an algorithmic perspective, with the goal of modeling cyber system defense as a specific use case scenario. We first define a notion of \\emph{multiscale} graphs, in contrast with their well-studied single-scale counterparts. We develop multiscale analogs of paths and distance metrics. As a simple, motivating example ofmore » a common metric, we present a multiscale analog of the all-pairs shortest-path problem, along with a multiscale analog of a well-known algorithm which solves it. From a cyber defense perspective, this metric might be used to model the distance from an attacker's position in the network to a sensitive machine. In addition, we investigate probabilistic models of connectivity. These models exploit the hierarchy to quantify the likelihood that sensitive targets might be reachable from compromised nodes. We believe that our novel multiscale approach to modeling cyber-physical systems will advance several aspects of cyber defense, specifically allowing for a more efficient and agile approach to defending these systems.« less

  16. Network speech systems technology program

    NASA Astrophysics Data System (ADS)

    Weinstein, C. J.

    1981-09-01

    This report documents work performed during FY 1981 on the DCA-sponsored Network Speech Systems Technology Program. The two areas of work reported are: (1) communication system studies in support of the evolving Defense Switched Network (DSN) and (2) design and implementation of satellite/terrestrial interfaces for the Experimental Integrated Switched Network (EISN). The system studies focus on the development and evaluation of economical and endurable network routing procedures. Satellite/terrestrial interface development includes circuit-switched and packet-switched connections to the experimental wideband satellite network. Efforts in planning and coordination of EISN experiments are reported in detail in a separate EISN Experiment Plan.

  17. Display integration for ground combat vehicles

    NASA Astrophysics Data System (ADS)

    Busse, David J.

    1998-09-01

    The United States Army's requirement to employ high resolution target acquisition sensors and information warfare to increase its dominance over enemy forces has led to the need to integrate advanced display devices into ground combat vehicle crew stations. The Army's force structure require the integration of advanced displays on both existing and emerging ground combat vehicle systems. The fielding of second generation target acquisition sensors, color digital terrain maps and high volume digital command and control information networks on these platforms define display performance requirements. The greatest challenge facing the system integrator is the development and integration of advanced displays that meet operational, vehicle and human computer interface performance requirements for the ground combat vehicle fleet. The subject of this paper is to address those challenges: operational and vehicle performance, non-soldier centric crew station configurations, display performance limitations related to human computer interfaces and vehicle physical environments, display technology limitations and the Department of Defense (DOD) acquisition reform initiatives. How the ground combat vehicle Program Manager and system integrator are addressing these challenges are discussed through the integration of displays on fielded, current and future close combat vehicle applications.

  18. Your Career in Computer Programming.

    ERIC Educational Resources Information Center

    Seligsohn, I. J.

    This book offers the career-minded young reader insight into computers and computer-programming, by describing the nature of the work, the actual workings of the machines, the language of computers, their history, and their far-reading and increasing applications in business, industry, science, education, defense, and government. At the same time,…

  19. 32 CFR 505.13 - Computer Matching Agreement Program.

    Code of Federal Regulations, 2013 CFR

    2013-07-01

    ... 32 National Defense 3 2013-07-01 2013-07-01 false Computer Matching Agreement Program. 505.13... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.13 Computer Matching Agreement Program. (a) General provisions. (1) Pursuant to the Privacy Act and this part, DA records may be subject to computer...

  20. 32 CFR 505.13 - Computer Matching Agreement Program.

    Code of Federal Regulations, 2012 CFR

    2012-07-01

    ... 32 National Defense 3 2012-07-01 2009-07-01 true Computer Matching Agreement Program. 505.13... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.13 Computer Matching Agreement Program. (a) General provisions. (1) Pursuant to the Privacy Act and this part, DA records may be subject to computer...

  1. 32 CFR 505.13 - Computer Matching Agreement Program.

    Code of Federal Regulations, 2014 CFR

    2014-07-01

    ... 32 National Defense 3 2014-07-01 2014-07-01 false Computer Matching Agreement Program. 505.13... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.13 Computer Matching Agreement Program. (a) General provisions. (1) Pursuant to the Privacy Act and this part, DA records may be subject to computer...

  2. 32 CFR 505.13 - Computer Matching Agreement Program.

    Code of Federal Regulations, 2011 CFR

    2011-07-01

    ... 32 National Defense 3 2011-07-01 2009-07-01 true Computer Matching Agreement Program. 505.13... AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.13 Computer Matching Agreement Program. (a) General provisions. (1) Pursuant to the Privacy Act and this part, DA records may be subject to computer...

  3. Fault tolerant hypercube computer system architecture

    NASA Technical Reports Server (NTRS)

    Madan, Herb S. (Inventor); Chow, Edward (Inventor)

    1989-01-01

    A fault-tolerant multiprocessor computer system of the hypercube type comprising a hierarchy of computers of like kind which can be functionally substituted for one another as necessary is disclosed. Communication between the working nodes is via one communications network while communications between the working nodes and watch dog nodes and load balancing nodes higher in the structure is via another communications network separate from the first. A typical branch of the hierarchy reporting to a master node or host computer comprises, a plurality of first computing nodes; a first network of message conducting paths for interconnecting the first computing nodes as a hypercube. The first network provides a path for message transfer between the first computing nodes; a first watch dog node; and a second network of message connecting paths for connecting the first computing nodes to the first watch dog node independent from the first network, the second network provides an independent path for test message and reconfiguration affecting transfers between the first computing nodes and the first switch watch dog node. There is additionally, a plurality of second computing nodes; a third network of message conducting paths for interconnecting the second computing nodes as a hypercube. The third network provides a path for message transfer between the second computing nodes; a fourth network of message conducting paths for connecting the second computing nodes to the first watch dog node independent from the third network. The fourth network provides an independent path for test message and reconfiguration affecting transfers between the second computing nodes and the first watch dog node; and a first multiplexer disposed between the first watch dog node and the second and fourth networks for allowing the first watch dog node to selectively communicate with individual ones of the computing nodes through the second and fourth networks; as well as, a second watch dog node operably connected to the first multiplexer whereby the second watch dog node can selectively communicate with individual ones of the computing nodes through the second and fourth networks. The branch is completed by a first load balancing node; and a second multiplexer connected between the first load balancing node and the first and second watch dog nodes, allowing the first load balancing node to selectively communicate with the first and second watch dog nodes.

  4. 76 FR 49753 - Privacy Act of 1974; System of Records

    Federal Register 2010, 2011, 2012, 2013, 2014

    2011-08-11

    ... Defense. DHA 14 System name: Computer/Electronics Accommodations Program for People with Disabilities... with ``Computer/Electronic Accommodations Program.'' System location: Delete entry and replace with ``Computer/Electronic Accommodations Program, Skyline 5, Suite 302, 5111 Leesburg Pike, Falls Church, VA...

  5. 48 CFR 227.7201 - Definitions.

    Code of Federal Regulations, 2013 CFR

    2013-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...

  6. 48 CFR 227.7201 - Definitions.

    Code of Federal Regulations, 2012 CFR

    2012-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...

  7. 48 CFR 227.7201 - Definitions.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...

  8. 48 CFR 227.7201 - Definitions.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...

  9. 48 CFR 227.7201 - Definitions.

    Code of Federal Regulations, 2011 CFR

    2011-10-01

    ... OF DEFENSE GENERAL CONTRACTING REQUIREMENTS PATENTS, DATA, AND COPYRIGHTS Rights in Computer Software and Computer Software Documentation 227.7201 Definitions. (a) As used in this subpart, unless... subpart are defined in the clause at 252.227-7014, Rights in Noncommercial Computer Software and...

  10. Provider Network Development under the Department of Defense Coordinated Care Program: A Methodology for Primary Care Network Development and Its Implementation in the San Antonio Service Area

    DTIC Science & Technology

    1993-04-01

    for using out-of- network benefits . * A gatekeeper physician controls access to the network and is paid on a capitated or discounted fee- for-service...Model ...................... 84 Figure 10. Organization Under Managed Care/HMO Concept ............... 94 APPENDIX 1. Benefit Under CCP 2. Group Model...increases, yet our health indicators have not improved (e.g., infant mortality, adult mortality, morbidity, or life expectancy). The aging population, the

  11. Mission Networks: An Evolution in Information Sharing

    DTIC Science & Technology

    2012-03-20

    Publication 6-0 Joint Communications System states that the Global Information Grid ( GIG ) composed of the Defense Information Systems Network (DISN...of the GIG while the other branches of the United States Government (USG) such as the Department of State (DoS) utilize the ’.gov’ sub-network of...the GIG . The result is that unless the DOD has a ’need to know’ it will never have access to the DOS information that resides on the ’.gov’ sub-network

  12. Experimental Evaluation of the IP Address Space Randomisation (IASR) Technique and Its Disruption to Selected Network Services

    DTIC Science & Technology

    2014-11-01

    Canada (Department of National Defence), 2014 c© Sa Majesté la Reine en droit du Canada (Ministère de la Défense nationale), 2014 Abstract In recent...2006), Network security mechanisms utilising network address translation, International journal of critical infrastructures, 2(1), 10–49. [5] Dunlop...Lu, S. (2008), Full service hopping for proactive cyber-defense, In ICNSC 2008: IEEE International Conference on Networking, Sensing and Control, pp

  13. DDN (Defense Data Network) Protocol Handbook. Volume 1. DoD Military Standard Protocols

    DTIC Science & Technology

    1985-12-01

    official Military Standard communication protocols in use on the DDN are included, as are several ARPANET (Advanced Research Projects Agency Network... research protocols which are currently in use, and some protocols currently undergoing review. Tutorial information and auxiliary documents are also...compatible with DoD needs, by researchers wishing to improve the protocols, and by impleroentors of local area networks (LANs) wishing their

  14. Crossing the Technology Adoption Chasm in the Presence of Network Externalities: Implications for DoD

    DTIC Science & Technology

    2007-06-01

    Innovations. New York: The Free Press. Rohlfs, J. (2001). Bandwagon Effects in High-Technology Industries. Massachusetts Institute of Technology...adoption. It focuses on cost and benefit uncertainty as well as network effects applied to end- users and their organizations. Specifically, it...as network effects applied to end- users and their organizations. Specifically, it explores Department of Defense (DoD) acquisition programs

  15. Characterizing and Detecting Unrevealed Elements of Network Systems

    DTIC Science & Technology

    2009-03-01

    refers to the direct interaction of persons in so far as this affects the future behavior or attitude of participants (such that this differs from... CHARACTERIZING AND DETECTING UNREVEALED ELEMENTS OF NETWORK SYSTEMS DISSERTATION James A. Leinart, Lieutenant Colonel, USAF AFIT/DS/ENS/08-01W...Air Force, Department of Defense or the United States Government. AFIT/DS/ENS/08-01W CHARACTERIZING AND DETECTING UNREVEALED ELEMENTS OF NETWORK

  16. DISN Forecast to Industry

    DTIC Science & Technology

    2008-08-08

    Ms. Cindy E. Moran Director for Network Services 8 August 2008 DISN Forecast to Industry Report Documentation Page Form ApprovedOMB No. 0704-0188...TITLE AND SUBTITLE DISN (Defense Information system Network ) Forecast to Industry 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER...Prescribed by ANSI Std Z39-18 2 2 Integrated DISN Services by 2016: A Solid Goal Network Aware Applications Common Storage & Retrieval Shared Long

  17. Defense Advanced Research Projects Agency: Key Factors Drive Transition of Technologies, but Better Training and Data Dissemination Can Increase Success

    DTIC Science & Technology

    2015-11-01

    more detail. Table 1: Overview of DARPA Programs Selected for GAO Case Study Analyses Program name Program description Advanced Wireless Networks ...Selected DARPA Programs Program name According to DARPA portfolio-level database According to GAO analysis Advanced Wireless Networks for the Soldier...with potential transition partners Achievement of clearly defined technical goals Successful transition Advanced Wireless Networks for Soldier

  18. A CyberCIEGE Traffic Analysis Extension for Teaching Network Security

    DTIC Science & Technology

    2011-12-01

    Information Technology LAN Local Area Network MAADNET Military Academy Attack/Defense Network MAC Media Access Control MMORPG Massively...ready to launch its latest massively multiplayer online role-playing game ( MMORPG ) “SyberSIEGE”! The product is currently in the final stages of...achieve his goal, this approach will still allow Tina to meet her goals and avoid disruptions to existing operations, which is also what would have

  19. A systems biology approach to study systemic inflammation.

    PubMed

    Chen, Bor-Sen; Wu, Chia-Chou

    2014-01-01

    Systemic inflammation needs a precise control on the sequence and magnitude of occurring events. The high throughput data on the host-pathogen interactions gives us an opportunity to have a glimpse on the systemic inflammation. In this article, a dynamic Candida albicans-zebrafish interactive infectious network is built as an example to demonstrate how systems biology approach can be used to study systematic inflammation. In particular, based on microarray data of C. albicans and zebrafish during infection, the hyphal growth, zebrafish, and host-pathogen intercellular PPI networks were combined to form an integrated infectious PPI network that helps us understand the systematic mechanisms underlying the pathogenicity of C. albicans and the immune response of the host. The signaling pathways for morphogenesis and hyphal growth of C. albicans were 2 significant interactions found in the intercellular PPI network. Two cellular networks were also developed corresponding to the different infection stages (adhesion and invasion), and then compared with each other to identify proteins to gain more insight into the pathogenic role of hyphal development in the C. albicans infection process. Important defense-related proteins in zebrafish were predicted using the same approach. This integrated network consisting of intercellular invasion and cellular defense processes during infection can improve medical therapies and facilitate development of new antifungal drugs.

  20. Strategy alternatives for homeland air and cruise missile defense.

    PubMed

    Murphy, Eric M; Payne, Michael D; Vanderwoude, Glenn W

    2010-10-01

    Air and cruise missile defense of the U.S. homeland is characterized by a requirement to protect a large number of critical assets nonuniformly dispersed over a vast area with relatively few defensive systems. In this article, we explore strategy alternatives to make the best use of existing defense resources and suggest this approach as a means of reducing risk while mitigating the cost of developing and acquiring new systems. We frame the issue as an attacker-defender problem with simultaneous moves. First, we outline and examine the relatively simple problem of defending comparatively few locations with two surveillance systems. Second, we present our analysis and findings for a more realistic scenario that includes a representative list of U.S. critical assets. Third, we investigate sensitivity to defensive strategic choices in the more realistic scenario. As part of this investigation, we describe two complementary computational methods that, under certain circumstances, allow one to reduce large computational problems to a more manageable size. Finally, we demonstrate that strategic choices can be an important supplement to material solutions and can, in some cases, be a more cost-effective alternative. © 2010 Society for Risk Analysis.

  1. The research of computer network security and protection strategy

    NASA Astrophysics Data System (ADS)

    He, Jian

    2017-05-01

    With the widespread popularity of computer network applications, its security is also received a high degree of attention. Factors affecting the safety of network is complex, for to do a good job of network security is a systematic work, has the high challenge. For safety and reliability problems of computer network system, this paper combined with practical work experience, from the threat of network security, security technology, network some Suggestions and measures for the system design principle, in order to make the masses of users in computer networks to enhance safety awareness and master certain network security technology.

  2. Computer hardware fault administration

    DOEpatents

    Archer, Charles J.; Megerian, Mark G.; Ratterman, Joseph D.; Smith, Brian E.

    2010-09-14

    Computer hardware fault administration carried out in a parallel computer, where the parallel computer includes a plurality of compute nodes. The compute nodes are coupled for data communications by at least two independent data communications networks, where each data communications network includes data communications links connected to the compute nodes. Typical embodiments carry out hardware fault administration by identifying a location of a defective link in the first data communications network of the parallel computer and routing communications data around the defective link through the second data communications network of the parallel computer.

  3. Software For Monitoring A Computer Network

    NASA Technical Reports Server (NTRS)

    Lee, Young H.

    1992-01-01

    SNMAT is rule-based expert-system computer program designed to assist personnel in monitoring status of computer network and identifying defective computers, workstations, and other components of network. Also assists in training network operators. Network for SNMAT located at Space Flight Operations Center (SFOC) at NASA's Jet Propulsion Laboratory. Intended to serve as data-reduction system providing windows, menus, and graphs, enabling users to focus on relevant information. SNMAT expected to be adaptable to other computer networks; for example in management of repair, maintenance, and security, or in administration of planning systems, billing systems, or archives.

  4. Hacking Social Networks: Examining the Viability of Using Computer Network Attack Against Social Networks

    DTIC Science & Technology

    2007-03-01

    NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS Approved for public release; distribution is unlimited. HACKING SOCIAL NETWORKS : EXAMINING THE...VIABILITY OF USING COMPUTER NETWORK ATTACK AGAINST SOCIAL NETWORKS by Russell G. Schuhart II March 2007 Thesis Advisor: David Tucker Second Reader...Master’s Thesis 4. TITLE AND SUBTITLE: Hacking Social Networks : Examining the Viability of Using Computer Network Attack Against Social Networks 6. AUTHOR

  5. Constructing Precisely Computing Networks with Biophysical Spiking Neurons.

    PubMed

    Schwemmer, Michael A; Fairhall, Adrienne L; Denéve, Sophie; Shea-Brown, Eric T

    2015-07-15

    While spike timing has been shown to carry detailed stimulus information at the sensory periphery, its possible role in network computation is less clear. Most models of computation by neural networks are based on population firing rates. In equivalent spiking implementations, firing is assumed to be random such that averaging across populations of neurons recovers the rate-based approach. Recently, however, Denéve and colleagues have suggested that the spiking behavior of neurons may be fundamental to how neuronal networks compute, with precise spike timing determined by each neuron's contribution to producing the desired output (Boerlin and Denéve, 2011; Boerlin et al., 2013). By postulating that each neuron fires to reduce the error in the network's output, it was demonstrated that linear computations can be performed by networks of integrate-and-fire neurons that communicate through instantaneous synapses. This left open, however, the possibility that realistic networks, with conductance-based neurons with subthreshold nonlinearity and the slower timescales of biophysical synapses, may not fit into this framework. Here, we show how the spike-based approach can be extended to biophysically plausible networks. We then show that our network reproduces a number of key features of cortical networks including irregular and Poisson-like spike times and a tight balance between excitation and inhibition. Lastly, we discuss how the behavior of our model scales with network size or with the number of neurons "recorded" from a larger computing network. These results significantly increase the biological plausibility of the spike-based approach to network computation. We derive a network of neurons with standard spike-generating currents and synapses with realistic timescales that computes based upon the principle that the precise timing of each spike is important for the computation. We then show that our network reproduces a number of key features of cortical networks including irregular, Poisson-like spike times, and a tight balance between excitation and inhibition. These results significantly increase the biological plausibility of the spike-based approach to network computation, and uncover how several components of biological networks may work together to efficiently carry out computation. Copyright © 2015 the authors 0270-6474/15/3510112-23$15.00/0.

  6. A Research Program in Computer Technology. 1982 Annual Technical Report

    DTIC Science & Technology

    1983-03-01

    for the Defense Advanced Research Projects Agency. The research applies computer science and technology to areas of high DoD/ military impact. The ISI...implement the plan; New Computing Environment - investigation and adaptation of developing computer technologies to serve the research and military ...Computing Environment - ,.*_i;.;"’.)n and adaptation of developing computer technologies to serve the research and military tser communities; and Computer

  7. Data Farming and Defense Applications

    NASA Technical Reports Server (NTRS)

    Horne, Gary; Meyer, Ted

    2011-01-01

    .Data farm,ing uses simulation modeling, high performance computing, experimental design and analysis to examine questions of interest with large possibility spaces. This methodology allows for the examination of whole landscapes of potential outcomes and provides the capability of executing enough experiments so that outliers might be captured and examined for insights. It can be used to conduct sensitivity studies, to support validation and verification of models, to iteratively optimize outputs using heuristic search and discovery, and as an aid to decision-makers in understanding complex relationships of factors. In this paper we describe efforts at the Naval Postgraduate School in developing these new and emerging tools. We also discuss data farming in the context of application to questions inherent in military decision-making. The particular application we illustrate here is social network modeling to support the countering of improvised explosive devices.

  8. 32 CFR 505.1 - General information.

    Code of Federal Regulations, 2010 CFR

    2010-07-01

    ... Defense Department of Defense (Continued) DEPARTMENT OF THE ARMY AID OF CIVIL AUTHORITIES AND PUBLIC RELATIONS ARMY PRIVACY ACT PROGRAM § 505.1 General information. (a) Purpose. This part sets forth policies... Relating to Individual Persons, November 30, 1943. (9) Public Law 100-503, the Computer Matching and...

  9. Fractional Hopfield Neural Networks: Fractional Dynamic Associative Recurrent Neural Networks.

    PubMed

    Pu, Yi-Fei; Yi, Zhang; Zhou, Ji-Liu

    2017-10-01

    This paper mainly discusses a novel conceptual framework: fractional Hopfield neural networks (FHNN). As is commonly known, fractional calculus has been incorporated into artificial neural networks, mainly because of its long-term memory and nonlocality. Some researchers have made interesting attempts at fractional neural networks and gained competitive advantages over integer-order neural networks. Therefore, it is naturally makes one ponder how to generalize the first-order Hopfield neural networks to the fractional-order ones, and how to implement FHNN by means of fractional calculus. We propose to introduce a novel mathematical method: fractional calculus to implement FHNN. First, we implement fractor in the form of an analog circuit. Second, we implement FHNN by utilizing fractor and the fractional steepest descent approach, construct its Lyapunov function, and further analyze its attractors. Third, we perform experiments to analyze the stability and convergence of FHNN, and further discuss its applications to the defense against chip cloning attacks for anticounterfeiting. The main contribution of our work is to propose FHNN in the form of an analog circuit by utilizing a fractor and the fractional steepest descent approach, construct its Lyapunov function, prove its Lyapunov stability, analyze its attractors, and apply FHNN to the defense against chip cloning attacks for anticounterfeiting. A significant advantage of FHNN is that its attractors essentially relate to the neuron's fractional order. FHNN possesses the fractional-order-stability and fractional-order-sensitivity characteristics.

  10. DCT-based cyber defense techniques

    NASA Astrophysics Data System (ADS)

    Amsalem, Yaron; Puzanov, Anton; Bedinerman, Anton; Kutcher, Maxim; Hadar, Ofer

    2015-09-01

    With the increasing popularity of video streaming services and multimedia sharing via social networks, there is a need to protect the multimedia from malicious use. An attacker may use steganography and watermarking techniques to embed malicious content, in order to attack the end user. Most of the attack algorithms are robust to basic image processing techniques such as filtering, compression, noise addition, etc. Hence, in this article two novel, real-time, defense techniques are proposed: Smart threshold and anomaly correction. Both techniques operate at the DCT domain, and are applicable for JPEG images and H.264 I-Frames. The defense performance was evaluated against a highly robust attack, and the perceptual quality degradation was measured by the well-known PSNR and SSIM quality assessment metrics. A set of defense techniques is suggested for improving the defense efficiency. For the most aggressive attack configuration, the combination of all the defense techniques results in 80% protection against cyber-attacks with PSNR of 25.74 db.

  11. Future of Department of Defense Cloud Computing Amid Cultural Confusion

    DTIC Science & Technology

    2013-03-01

    enterprise cloud - computing environment and transition to a public cloud service provider. Services have started the development of individual cloud - computing environments...endorsing cloud computing . It addresses related issues in matters of service culture changes and how strategic leaders will dictate the future of cloud ...through data center consolidation and individual Service provided cloud computing .

  12. Computer Networks as a New Data Base.

    ERIC Educational Resources Information Center

    Beals, Diane E.

    1992-01-01

    Discusses the use of communication on computer networks as a data source for psychological, social, and linguistic research. Differences between computer-mediated communication and face-to-face communication are described, the Beginning Teacher Computer Network is discussed, and examples of network conversations are appended. (28 references) (LRW)

  13. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2012 CFR

    2012-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  14. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2014 CFR

    2014-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  15. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2013 CFR

    2013-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  16. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2011 CFR

    2011-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  17. 10 CFR 727.2 - What are the definitions of the terms used in this part?

    Code of Federal Regulations, 2010 CFR

    2010-01-01

    ... information. Computer means desktop computers, portable computers, computer networks (including the DOE network and local area networks at or controlled by DOE organizations), network devices, automated.... DOE means the Department of Energy, including the National Nuclear Security Administration. DOE...

  18. Project Leadership Lived Experiences with Web-Based Social Networking: A Phenomenological Study

    ERIC Educational Resources Information Center

    Scroggins, Charles W.

    2010-01-01

    This study explores the lived experiences of project leaders adopting and using Web-2.0 social networking collaboration applications for their project leadership activities. The experiences of 20 project leaders in a Fortune 500 aerospace and defense enterprise in the northeastern United States of America were explored using a qualitative…

  19. Simulation Network for Test and Evaluation of Defense Systems. Phase I. Survey of DoD Testbed Requirements,

    DTIC Science & Technology

    1983-05-15

    Interconnection (ISO 051) is the model used as a guide for this introduction to network protocols [30] T. Utsumi, " GLOSAS Project (GLObal Systems...Analysis and Simulation)," Proceedings of the 1980 Winter Simulation * Conference, Orlando, Fl., December, 1980, pp. 165-217. GLOSAS Project proposes the

  20. APOLLO Network | Office of Cancer Clinical Proteomics Research

    Cancer.gov

    The Applied Proteogenomics OrganizationaL Learning and Outcomes (APOLLO) network is a collaboration between NCI, the Department of Defense (DoD), and the Department of Veterans Affairs (VA) to incorporate proteogenomics into patient care as a way of looking beyond the genome, to the activity and expression of the proteins that the genome encodes.

  1. 48 CFR 227.7207 - Contractor data repositories.

    Code of Federal Regulations, 2010 CFR

    2010-10-01

    ... repositories. 227.7207 Section 227.7207 Federal Acquisition Regulations System DEFENSE ACQUISITION REGULATIONS... Computer Software and Computer Software Documentation 227.7207 Contractor data repositories. Follow 227.7108 when it is in the Government's interests to have a data repository include computer software or to...

  2. Get the Whole Story before You Plug into a Computer Network.

    ERIC Educational Resources Information Center

    Vernot, David

    1989-01-01

    Explains the myths and marvels of computer networks; cites how several schools are utilizing networking; and summarizes where the major computer companies stand today when it comes to networking. (MLF)

  3. Network Coding for Function Computation

    ERIC Educational Resources Information Center

    Appuswamy, Rathinakumar

    2011-01-01

    In this dissertation, the following "network computing problem" is considered. Source nodes in a directed acyclic network generate independent messages and a single receiver node computes a target function f of the messages. The objective is to maximize the average number of times f can be computed per network usage, i.e., the "computing…

  4. Examining Clandestine Social Networks for the Presence of Non-Random Structure

    DTIC Science & Technology

    2007-03-01

    illustrating the potential use for the defense community and others. v AFIT/GOR/ENS/07-24 Dedication...potential use it has for the United States Air Force and wider Department of Defense community . 2-1 2. Literature Review 2.1. Introduction In the...Leinhardt successfully found a way to test dyadic ties for probability of existence. Unfortunately, the p1 model was limited to only being able to

  5. Wireless Sensor Buoys for Perimeter Security of Military Vessels and Seabases

    DTIC Science & Technology

    2015-12-01

    however, additional sensors utilizing modern technology and a self -forming, as well as self - healing , network could further diminish attacks against...Space SSDF Ship’s Self -Defense Force UAV Unmanned Aerial Vehicle UGS Unattended Ground Sensor USB Universal Serial Bus USMC United States Marine...conditions may delay their reaction resulting in the attacking surface craft entering into a critically close position. The Ship’s Self -Defense

  6. Asian Transnational Security Challenge: Emerging Trends, Regional Visions

    DTIC Science & Technology

    2010-10-01

    the official policy or position of the Defense Threat Reduction Agency, the Department of Defense, or the United States Government . This report...the terrorist threat as seen through Southeast Asian eyes. IDA drew on its extensive network of academic and government contacts across Asia to...Asia would advance both government and non- government efforts to develop a better understanding of the roots of the terrorist threat and its links

  7. LaRC local area networks to support distributed computing

    NASA Technical Reports Server (NTRS)

    Riddle, E. P.

    1984-01-01

    The Langley Research Center's (LaRC) Local Area Network (LAN) effort is discussed. LaRC initiated the development of a LAN to support a growing distributed computing environment at the Center. The purpose of the network is to provide an improved capability (over inteactive and RJE terminal access) for sharing multivendor computer resources. Specifically, the network will provide a data highway for the transfer of files between mainframe computers, minicomputers, work stations, and personal computers. An important influence on the overall network design was the vital need of LaRC researchers to efficiently utilize the large CDC mainframe computers in the central scientific computing facility. Although there was a steady migration from a centralized to a distributed computing environment at LaRC in recent years, the work load on the central resources increased. Major emphasis in the network design was on communication with the central resources within the distributed environment. The network to be implemented will allow researchers to utilize the central resources, distributed minicomputers, work stations, and personal computers to obtain the proper level of computing power to efficiently perform their jobs.

  8. Computation of Material Demand in the Risk Assessment and Mitigation Framework for Strategic Materials (RAMF-SM) Process

    DTIC Science & Technology

    2015-08-01

    Congress concerning requirements for the National Defense Stockpile (NDS) of strategic and critical non- fuel materials. 1 RAMF-SM, which was...critical non- fuel materials. The NDS was established in the World War II era and has been managed by the Department of Defense (DOD) since 1988. By...Department of the Interior. An alternative algorithm is used for materials with intensive defense demands. v Contents 1 .  Introduction

  9. DSB Task Force on Cyber Supply Chain

    DTIC Science & Technology

    2017-02-06

    27 3.4 Cybersecurity for Commercial and Open Source Components...Communications and Intelligence ASD(L&MR): Assistant Secretary of Defense for Logistics and Materiel Readiness ASD(R&E): Assistant Secretary of Defense...system BSIMM: Building Security in Maturity Model C4ISR: command, control, communications, computers, intelligence , surveillance and

  10. Extreme Scale Computing Studies

    DTIC Science & Technology

    2010-12-01

    PUBLICATION IN ACCORDANCE WITH ASSIGNED DISTRIBUTION STATEMENT. *//Signature// //Signature// KERRY HILL, Program Manager BRADLEY J ...Research Institute William Carlson Institute for Defense Analyses William Dally Stanford University Monty Denneau IBM T. J . Watson Research...for Defense Analyses William Dally, Stanford University Monty Denneau, IBM T. J . Watson Research Laboratories Paul Franzon, North Carolina State

  11. An Introductory Course on Service-Oriented Computing for High Schools

    ERIC Educational Resources Information Center

    Tsai, W. T.; Chen, Yinong; Cheng, Calvin; Sun, Xin; Bitter, Gary; White, Mary

    2008-01-01

    Service-Oriented Computing (SOC) is a new computing paradigm that has been adopted by major computer companies as well as government agencies such as the Department of Defense for mission-critical applications. SOC is being used for developing Web and electronic business applications, as well as robotics, gaming, and scientific applications. Yet,…

  12. 75 FR 8311 - Privacy Act of 1974; Notice of a Computer Matching Program

    Federal Register 2010, 2011, 2012, 2013, 2014

    2010-02-24

    ...; Notice of a Computer Matching Program AGENCY: Defense Manpower Data Center, DoD. ACTION: Notice of a... hereby giving notice to the record subjects of a computer matching program between the Department of... conduct a computer matching program between the agencies. The purpose of this agreement is to verify an...

  13. Cyber-Ed.

    ERIC Educational Resources Information Center

    Ruben, Barbara

    1994-01-01

    Reviews a number of interactive environmental computer education networks and software packages. Computer networks include National Geographic Kids Network, Global Lab, and Global Rivers Environmental Education Network. Computer software involve environmental decision making, simulation games, tropical rainforests, the ocean, the greenhouse…

  14. Terminal-oriented computer-communication networks.

    NASA Technical Reports Server (NTRS)

    Schwartz, M.; Boorstyn, R. R.; Pickholtz, R. L.

    1972-01-01

    Four examples of currently operating computer-communication networks are described in this tutorial paper. They include the TYMNET network, the GE Information Services network, the NASDAQ over-the-counter stock-quotation system, and the Computer Sciences Infonet. These networks all use programmable concentrators for combining a multiplicity of terminals. Included in the discussion for each network is a description of the overall network structure, the handling and transmission of messages, communication requirements, routing and reliability consideration where applicable, operating data and design specifications where available, and unique design features in the area of computer communications.

  15. Network Science Center Research Teams Visit to Addis Ababa, Ethiopia

    DTIC Science & Technology

    2012-08-01

    Network Science Center, West Point www.netscience.usma.edu 845.938.0804 Corporation as a gift from the Government of China, and consists of a 2,500... German Government in achieving its objectives in the field of international cooperation for sustainable development. Construction of Road...authors and do not reflect the official policy or position of the Department of Defense or the U.S. Government . 14. ABSTRACT A Network Science Center

  16. Army Networks: Opportunities Exist to Better Utilize Results from Network Integration Evaluations

    DTIC Science & Technology

    2013-08-01

    monitor operations; a touch screen-based mission command planning tool; and an antenna mast . The Army will field only one of these systems in capability...Office JTRS Joint Tactical Radio System NIE Network Integration Evaluation OSD Office of the Secretary of Defense SUE System under Evaluation...command systems . A robust transport layer capable of delivering voice, data, imagery, and video to the tactical edge (i.e., the forward battle lines

  17. Study of Adversarial and Defensive Components in an Experimental Machinery Control Systems Laboratory Environment

    DTIC Science & Technology

    2014-09-01

    prevention system (IPS), capable of performing real-time traffic analysis and packet logging on IP networks [25]. Snort’s features include protocol... analysis and content searching/matching. Snort can detect a variety of attacks and network probes, such as buffer overflows, port scans and OS...www.digitalbond.com/tools/the- rack/jtr-s7-password-cracking/ Kismet Mike Kershaw Cross- platform Open source wireless network detector and wireless sniffer

  18. A Fresh Look at Internet Protocol Version 6 (IPv6) for Department of Defense (DoD) Networks

    DTIC Science & Technology

    2010-08-01

    since system administration practices (such as the use of security appliances) depend heavily on tools for network management, diagnosis and protection...are mobile ad hoc networks (MANETs) and yet there is limited practical experience with MANETs and their performance. Further, the interaction between...Systems FCS Future Combat System IETF Internet Engineering Task Force ISAT Information Science and Technology BAST Board on Army Science and

  19. U.S. Army Research Laboratory (ARL) multimodal signatures database

    NASA Astrophysics Data System (ADS)

    Bennett, Kelly

    2008-04-01

    The U.S. Army Research Laboratory (ARL) Multimodal Signatures Database (MMSDB) is a centralized collection of sensor data of various modalities that are co-located and co-registered. The signatures include ground and air vehicles, personnel, mortar, artillery, small arms gunfire from potential sniper weapons, explosives, and many other high value targets. This data is made available to Department of Defense (DoD) and DoD contractors, Intel agencies, other government agencies (OGA), and academia for use in developing target detection, tracking, and classification algorithms and systems to protect our Soldiers. A platform independent Web interface disseminates the signatures to researchers and engineers within the scientific community. Hierarchical Data Format 5 (HDF5) signature models provide an excellent solution for the sharing of complex multimodal signature data for algorithmic development and database requirements. Many open source tools for viewing and plotting HDF5 signatures are available over the Web. Seamless integration of HDF5 signatures is possible in both proprietary computational environments, such as MATLAB, and Free and Open Source Software (FOSS) computational environments, such as Octave and Python, for performing signal processing, analysis, and algorithm development. Future developments include extending the Web interface into a portal system for accessing ARL algorithms and signatures, High Performance Computing (HPC) resources, and integrating existing database and signature architectures into sensor networking environments.

  20. Computational prediction of virus-human protein-protein interactions using embedding kernelized heterogeneous data.

    PubMed

    Nourani, Esmaeil; Khunjush, Farshad; Durmuş, Saliha

    2016-05-24

    Pathogenic microorganisms exploit host cellular mechanisms and evade host defense mechanisms through molecular pathogen-host interactions (PHIs). Therefore, comprehensive analysis of these PHI networks should be an initial step for developing effective therapeutics against infectious diseases. Computational prediction of PHI data is gaining increasing demand because of scarcity of experimental data. Prediction of protein-protein interactions (PPIs) within PHI systems can be formulated as a classification problem, which requires the knowledge of non-interacting protein pairs. This is a restricting requirement since we lack datasets that report non-interacting protein pairs. In this study, we formulated the "computational prediction of PHI data" problem using kernel embedding of heterogeneous data. This eliminates the abovementioned requirement and enables us to predict new interactions without randomly labeling protein pairs as non-interacting. Domain-domain associations are used to filter the predicted results leading to 175 novel PHIs between 170 human proteins and 105 viral proteins. To compare our results with the state-of-the-art studies that use a binary classification formulation, we modified our settings to consider the same formulation. Detailed evaluations are conducted and our results provide more than 10 percent improvements for accuracy and AUC (area under the receiving operating curve) results in comparison with state-of-the-art methods.

  1. Using satellite communications for a mobile computer network

    NASA Technical Reports Server (NTRS)

    Wyman, Douglas J.

    1993-01-01

    The topics discussed include the following: patrol car automation, mobile computer network, network requirements, network design overview, MCN mobile network software, MCN hub operation, mobile satellite software, hub satellite software, the benefits of patrol car automation, the benefits of satellite mobile computing, and national law enforcement satellite.

  2. Do You Lock Your Network Doors? Some Network Management Precautions.

    ERIC Educational Resources Information Center

    Neray, Phil

    1997-01-01

    Discusses security problems and solutions for networked organizations with Internet connections. Topics include access to private networks from electronic mail information; computer viruses; computer software; corporate espionage; firewalls, that is computers that stand between a local network and the Internet; passwords; and physical security.…

  3. Data Processing: Fifteen Suggestions for Computer Training in Your Business Education Classes.

    ERIC Educational Resources Information Center

    Barr, Lowell L.

    1980-01-01

    Presents 15 suggestions for training business education students in the use of computers. Suggestions involve computer language, method of presentation, laboratory time, programing assignments, instructions and handouts, problem solving, deadlines, reviews, programming concepts, programming logic, documentation, and defensive programming. (CT)

  4. Neural substrates of defensive reactivity in two subtypes of specific phobia.

    PubMed

    Lueken, Ulrike; Hilbert, Kevin; Stolyar, Veronika; Maslowski, Nina I; Beesdo-Baum, Katja; Wittchen, Hans-Ulrich

    2014-11-01

    Depending on threat proximity, different defensive behaviours are mediated by a descending neural network involving forebrain (distal threat) vs midbrain areas (proximal threat). Compared to healthy subjects, it can be assumed that phobics are characterized by shortened defensive distances on a behavioural and neural level. This study aimed at characterizing defensive reactivity in two subtypes of specific phobia [snake (SP) and dental phobics (DP)]. Using functional magnetic resonance imaging (fMRI), n = 39 subjects (13 healthy controls, HC; 13 SP; 13 DP) underwent an event-related fMRI task employing an anticipation (5-10 s) and immediate perception phase (phobic pictures and matched neutral stimuli; 1250 ms) to modulate defensive distance. Although no differential brain activity in any comparisons was observed in DP, areas associated with defensive behaviours (e.g. amygdala, hippocampus, midbrain) were activated in SP. Decreasing defensive distance in SP was characterized by a shift to midbrain activity. Present findings substantiate differences between phobia types in their physiological and neural organization that can be expanded to early stages of defensive behaviours. Findings may contribute to a better understanding of the dynamic organization of defensive reactivity in different types of phobic fear. © The Author (2013). Published by Oxford University Press. For Permissions, please email: journals.permissions@oup.com.

  5. Cognitive Model Exploration and Optimization: A New Challenge for Computational Science

    DTIC Science & Technology

    2010-03-01

    the generation and analysis of computational cognitive models to explain various aspects of cognition. Typically the behavior of these models...computational scale of a workstation, so we have turned to high performance computing (HPC) clusters and volunteer computing for large-scale...computational resources. The majority of applications on the Department of Defense HPC clusters focus on solving partial differential equations (Post

  6. Network Computer Technology. Phase I: Viability and Promise within NASA's Desktop Computing Environment

    NASA Technical Reports Server (NTRS)

    Paluzzi, Peter; Miller, Rosalind; Kurihara, West; Eskey, Megan

    1998-01-01

    Over the past several months, major industry vendors have made a business case for the network computer as a win-win solution toward lowering total cost of ownership. This report provides results from Phase I of the Ames Research Center network computer evaluation project. It identifies factors to be considered for determining cost of ownership; further, it examines where, when, and how network computer technology might fit in NASA's desktop computing architecture.

  7. Directly executable formal models of middleware for MANET and Cloud Networking and Computing

    NASA Astrophysics Data System (ADS)

    Pashchenko, D. V.; Sadeq Jaafar, Mustafa; Zinkin, S. A.; Trokoz, D. A.; Pashchenko, T. U.; Sinev, M. P.

    2016-04-01

    The article considers some “directly executable” formal models that are suitable for the specification of computing and networking in the cloud environment and other networks which are similar to wireless networks MANET. These models can be easily programmed and implemented on computer networks.

  8. Cloud Fingerprinting: Using Clock Skews To Determine Co Location Of Virtual Machines

    DTIC Science & Technology

    2016-09-01

    DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Cloud computing has quickly revolutionized computing practices of organizations, to include the Department of... Cloud computing has quickly revolutionized computing practices of organizations, to in- clude the Department of Defense. However, security concerns...vi Table of Contents 1 Introduction 1 1.1 Proliferation of Cloud Computing . . . . . . . . . . . . . . . . . . 1 1.2 Problem Statement

  9. 20 CFR 704.103 - Removal of certain minimums when computing or paying compensation.

    Code of Federal Regulations, 2010 CFR

    2010-04-01

    ... 20 Employees' Benefits 3 2010-04-01 2010-04-01 false Removal of certain minimums when computing or... PROVISIONS FOR LHWCA EXTENSIONS Defense Base Act § 704.103 Removal of certain minimums when computing or... benefits are to be computed under section 9 of the LHWCA, 33 U.S.C. 909, shall not apply in computing...

  10. A Risk Based Approach to Limit the Effects of Covert Channels for Internet Sensor Data Aggregators for Sensor Privacy

    NASA Astrophysics Data System (ADS)

    Viecco, Camilo H.; Camp, L. Jean

    Effective defense against Internet threats requires data on global real time network status. Internet sensor networks provide such real time network data. However, an organization that participates in a sensor network risks providing a covert channel to attackers if that organization’s sensor can be identified. While there is benefit for every party when any individual participates in such sensor deployments, there are perverse incentives against individual participation. As a result, Internet sensor networks currently provide limited data. Ensuring anonymity of individual sensors can decrease the risk of participating in a sensor network without limiting data provision.

  11. Advantages of Parallel Processing and the Effects of Communications Time

    NASA Technical Reports Server (NTRS)

    Eddy, Wesley M.; Allman, Mark

    2000-01-01

    Many computing tasks involve heavy mathematical calculations, or analyzing large amounts of data. These operations can take a long time to complete using only one computer. Networks such as the Internet provide many computers with the ability to communicate with each other. Parallel or distributed computing takes advantage of these networked computers by arranging them to work together on a problem, thereby reducing the time needed to obtain the solution. The drawback to using a network of computers to solve a problem is the time wasted in communicating between the various hosts. The application of distributed computing techniques to a space environment or to use over a satellite network would therefore be limited by the amount of time needed to send data across the network, which would typically take much longer than on a terrestrial network. This experiment shows how much faster a large job can be performed by adding more computers to the task, what role communications time plays in the total execution time, and the impact a long-delay network has on a distributed computing system.

  12. 48 CFR 239.7300 - Scope of subpart.

    Code of Federal Regulations, 2014 CFR

    2014-10-01

    ... OF DEFENSE SPECIAL CATEGORIES OF CONTRACTING ACQUISITION OF INFORMATION TECHNOLOGY Requirements for... Instruction 5200.44, Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN...

  13. Near real-time traffic routing

    NASA Technical Reports Server (NTRS)

    Yang, Chaowei (Inventor); Xie, Jibo (Inventor); Zhou, Bin (Inventor); Cao, Ying (Inventor)

    2012-01-01

    A near real-time physical transportation network routing system comprising: a traffic simulation computing grid and a dynamic traffic routing service computing grid. The traffic simulator produces traffic network travel time predictions for a physical transportation network using a traffic simulation model and common input data. The physical transportation network is divided into a multiple sections. Each section has a primary zone and a buffer zone. The traffic simulation computing grid includes multiple of traffic simulation computing nodes. The common input data includes static network characteristics, an origin-destination data table, dynamic traffic information data and historical traffic data. The dynamic traffic routing service computing grid includes multiple dynamic traffic routing computing nodes and generates traffic route(s) using the traffic network travel time predictions.

  14. Discussion on the Technology and Method of Computer Network Security Management

    NASA Astrophysics Data System (ADS)

    Zhou, Jianlei

    2017-09-01

    With the rapid development of information technology, the application of computer network technology has penetrated all aspects of society, changed people's way of life work to a certain extent, brought great convenience to people. But computer network technology is not a panacea, it can promote the function of social development, but also can cause damage to the community and the country. Due to computer network’ openness, easiness of sharing and other characteristics, it had a very negative impact on the computer network security, especially the loopholes in the technical aspects can cause damage on the network information. Based on this, this paper will do a brief analysis on the computer network security management problems and security measures.

  15. Report of the Defense Science Board Task Force on University Responsiveness to National Security Requirements.

    DTIC Science & Technology

    1982-01-01

    R.ugustine Chairman iv OFFICE OF THE SECRETARY OF DEFENSE WASHINGTON, D.C. 20301 27 January 1982 DEFENSE SCIENCIE BOARD Mr. Norman R. Augustine Chai rman...Institute of Technology Dr. Norman Hackerman President Rice University Dr. Richard L. Haley Assistant Deputy Science and Technology USA Material ...Biological and Medical Sciences 51.8 67.8 22% Materials 53.2 65.1 13% Chemistry 47.8 60.1 17% Math and Computer Sciences 44.2 53.6 12% Oceanography 43.2

  16. THREAT ANTICIPATION AND DECEPTIVE REASONING USING BAYESIAN BELIEF NETWORKS

    DOE Office of Scientific and Technical Information (OSTI.GOV)

    Allgood, Glenn O; Olama, Mohammed M; Lake, Joe E

    Recent events highlight the need for tools to anticipate threats posed by terrorists. Assessing these threats requires combining information from disparate data sources such as analytic models, simulations, historical data, sensor networks, and user judgments. These disparate data can be combined in a coherent, analytically defensible, and understandable manner using a Bayesian belief network (BBN). In this paper, we develop a BBN threat anticipatory model based on a deceptive reasoning algorithm using a network engineering process that treats the probability distributions of the BBN nodes within the broader context of the system development process.

  17. NASA/DOD Aerospace Knowledge Diffusion Research Project. Paper 47: The value of computer networks in aerospace

    NASA Technical Reports Server (NTRS)

    Bishop, Ann Peterson; Pinelli, Thomas E.

    1995-01-01

    This paper presents data on the value of computer networks that were obtained from a national survey of 2000 aerospace engineers that was conducted in 1993. Survey respondents reported the extent to which they used computer networks in their work and communication and offered their assessments of the value of various network types and applications. They also provided information about the positive impacts of networks on their work, which presents another perspective on value. Finally, aerospace engineers' recommendations on network implementation present suggestions for increasing the value of computer networks within aerospace organizations.

  18. Recommendations for Model Driven Paradigms for Integrated Approaches to Cyber Defense

    DTIC Science & Technology

    2017-03-06

    analogy (e.g., Susceptible, Infected, Recovered [SIR]) • Abstract wargaming: game -theoretic model of cyber conflict without modeling the underlying...malware. 3.7 Abstract Wargaming Here, a game -theoretic process is modeled with moves and effects inspired by cyber conflict but without modeling the...underlying processes of cyber attack and defense. Examples in literature include the following: • Cho J-H, Gao J. Cyber war game in temporal networks

  19. Providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer

    DOEpatents

    Archer, Charles J.; Faraj, Ahmad A.; Inglett, Todd A.; Ratterman, Joseph D.

    2012-10-23

    Methods, apparatus, and products are disclosed for providing nearest neighbor point-to-point communications among compute nodes of an operational group in a global combining network of a parallel computer, each compute node connected to each adjacent compute node in the global combining network through a link, that include: identifying each link in the global combining network for each compute node of the operational group; designating one of a plurality of point-to-point class routing identifiers for each link such that no compute node in the operational group is connected to two adjacent compute nodes in the operational group with links designated for the same class routing identifiers; and configuring each compute node of the operational group for point-to-point communications with each adjacent compute node in the global combining network through the link between that compute node and that adjacent compute node using that link's designated class routing identifier.

  20. Home educating in an extended family culture and aging society may fare best during a pandemic.

    PubMed

    Dawson, Wayne; Yamamoto, Kenji

    2009-09-28

    Large cities can contain populations that move rapidly from one section to another in an efficient transportation network. An emerging air-borne or contact based pathogen could use these transportation routes to rapidly spread an infection throughout an entire population in a short time. Further, in many developed countries, the aging population is increasing. The family structure in these societies may also affect the course of a disease. To help understand the impact of an epidemic on family structure in a networked population, an individual based computer model that randomly generates networked cities with a specified range of population and disease characteristics and individual schedules, infectivity, transmission and hygiene factors was developed. Several salient issues emerged. First, a city of highly active individuals may in fact diminish the number of fatalities because the average duration of the interactions between agents is reduced. Second, home schooling can significantly improve survival because the institutional clustering of weak individuals is minimized. Third, the worst scenario for an aging population is the nuclear family where the aged population is confined to large housing facilities. Naturally, hygiene is the first barrier to infection. The results suggest that societies where extended families and small groups manage most of their own affairs may also be the most suitable for defense against a pandemic. This may prove applicable in city planning and policy making.

Top