Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Industrial control systems (2)
- #antcenter (1)
- Amplitude scintillation (1)
- Clutter models (1)
- Cyber defense training (1)
-
- Cyber incident response (1)
- Cyber security (1)
- Cyber threat (1)
- Cyber threat intelligence (1)
- Cyber training environments (1)
- Engineered surfaces (1)
- File provenance (1)
- Forensic timelines (1)
- Goodness of fit (1)
- High altitude nuclear explosion (1)
- Honeypot (1)
- Industrial control (1)
- Intrusion detection systems (1)
- Malware attacks (1)
- Multipactor (1)
- Network infrastructure (1)
- Network traffic generation (1)
- Non-GPS (1)
- Passive location (1)
- Porous surfaces (1)
- Positioning (1)
- Radar clutter (1)
- Secondary electron emission (1)
- Signal absorption (1)
- Signal loss (1)
Articles 1 - 9 of 9
Full-Text Articles in Engineering
Engineered Surfaces To Control Secondary Electron Yield For Multipactor Suppression, James M. Sattler
Engineered Surfaces To Control Secondary Electron Yield For Multipactor Suppression, James M. Sattler
Theses and Dissertations
A significant problem for satellites, vacuum electron devices, and particle accelerators is multipactor: an avalanche of electrons caused by recurring secondary electron emission (SEE) in a time-varying electric field. The consequences of multipactor range from temporary to permanent device failure. This research studied how surface topography can be engineered to minimize SEE and suppress multipactor. Two new semi-empirical models (one based on a 2D pore, the other based on a 3D pore) were developed to predict the secondary electron yield (SEY) of a porous surface based on pore aspect ratio and porosity. The models were validated with experimental SEY measurements …
Predicting Solar Performance In A Contingency Environment To Meet Net-Zero Facility Power, Anthony D. Williams
Predicting Solar Performance In A Contingency Environment To Meet Net-Zero Facility Power, Anthony D. Williams
Theses and Dissertations
The U.S. government is involved in contingency operations all over the world and these operations require operational support and sustainment in these locations; this includes the reliable delivery of power to base infrastructure. The traditional means of delivering this support requirement in austere environments has been the use of diesel-power generation that has an extensive logistical and economic tail. The research sought out contingency solar applications that may be implemented and operated to offset the facility demand loads in the location to achieve net-zero power. This research explores the technical feasibility of a deployable photovoltaic microgrid to deliver power to …
A Framework For Categorization Of Industrial Control System Cyber Training Environments, Evan G. Plumley
A Framework For Categorization Of Industrial Control System Cyber Training Environments, Evan G. Plumley
Theses and Dissertations
First responders and professionals in hazardous occupations undergo training and evaluations for the purpose of mitigating risk and damage. For example, helicopter pilots train with multiple categorized simulations that increase in complexity before flying a real aircraft. However in the industrial control cyber incident response domain, where incident response professionals help detect, respond and recover from cyber incidents, no official categorization of training environments exist. To address this gap, this thesis provides a categorization of industrial control training environments based on realism. Four levels of environments are proposed and mapped to Blooms Taxonomy. This categorization will help organizations determine which …
Sound Based Positioning, David L. Weathers
Sound Based Positioning, David L. Weathers
Theses and Dissertations
With a growing interest in non-GPS positioning, navigation, and timing (PNT), sound based positioning provides a precise way to locate both sound sources and microphones through audible signals of opportunity (SoOPs). Exploiting SoOPs allows for passive location estimation. But, attributing each signal to a specific source location when signals are simultaneously emitting proves problematic. Using an array of microphones, unique SoOPs are identified and located through steered response beamforming. Sound source signals are then isolated through time-frequency masking to provide clear reference stations by which to estimate the location of a separate microphone through time difference of arrival measurements. Results …
Experimental Validation Of A Heterogeneous Radar Clutter Statistical Estimation Method, Elliot R. Erstein
Experimental Validation Of A Heterogeneous Radar Clutter Statistical Estimation Method, Elliot R. Erstein
Theses and Dissertations
Radar clutter models are important for radar target detection when clutter is present. A new method for estimating single clutter type, homogeneous, radar clutter statistics through measurement of a multiple type, heterogeneous clutter was developed in 2015 by researchers at the Air Force Institute of Technology. The estimation method is greatly valued in the clutter research and modeling world for reducing clutter campaign measurement time and cost. This thesis looks at validation steps for the estimation method through the use of simulations and experimental radar clutter measurements.
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Autoprov: An Automated File Provenance Collection Tool, Ryan A. Good
Theses and Dissertations
A file's provenance is a detailing of its origins and activities. There are tools available that are useful in maintaining the provenance of a file. Unfortunately for digital forensics, these tools require prior installation on the computer of interest while provenance generating events happen. The presented tool addresses this by reconstructing a file's provenance from several temporal artifacts. It identifies relevant temporal and user correlations between these artifacts, and presents them to the user. A variety of predefined use cases and real world data are tested against to demonstrate that this software allows examiners to draw useful conclusions about the …
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Framework For Industrial Control System Honeypot Network Traffic Generation, Htein A. Lin
Theses and Dissertations
Defending critical infrastructure assets is an important but extremely difficult and expensive task. Historically, decoys have been used very effectively to distract attackers and in some cases convince an attacker to reveal their attack strategy. Several researchers have proposed the use of honeypots to protect programmable logic controllers, specifically those used to support critical infrastructure. However, most of these honeypot designs are static systems that wait for a would-be attacker. To be effective, honeypot decoys need to be as realistic as possible. This paper introduces a proof-of-concept honeypot network traffic generator that mimics genuine control systems. Experiments are conducted using …
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Applying Cyber Threat Intelligence To Industrial Control Systems, Matthew P. Sibiga
Theses and Dissertations
A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures. Threat intelligence platforms (TIPs) have also been created to help facilitate CTI effectiveness within organizations. There are many benefits that both can achieve within the information technology (IT) sector. The industrial control system (ICS) sector can also benefit from these technologies as most ICS networks are connected to IT networks. CTI and TIPs become resourceful when using indicators of compromise (IOCs) from known ICS malware attacks and an open source intrusion detection …
Satellite Communications In The V And W Band: Natural And Artificial Scintillation Effects, David A. Smith
Satellite Communications In The V And W Band: Natural And Artificial Scintillation Effects, David A. Smith
Theses and Dissertations
In a natural atmospheric environment the troposphere will be the primary source of loss with the ionosphere loss being negligible. If the ionosphere was disturbed from a high altitude nuclear explosion (HANE) more than three times the amount of electrons would be present in the ionosphere and could represent a source of significant loss. In order to determine the amount of electrons distributed from a HANE, GSCENARIO, developed by Defense Threat Reduction Agency was used. The two sources of loss that were examined was signal absorption and amplitude scintillation. Signal loss was determined using GSCENARIO and amplitude scintillation loss was …