62 research outputs found
Coupling highly excited nuclei to the atomic shell in dense astrophysical plasmas
In dense astrophysical plasmas, neutron capture populates highly excited
nuclear states close to the neutron threshold. The impact of additional
low-energy nuclear excitations via coupling to the atomic shell on the ability
of the so-formed compound nucleus to retain the captured neutron is
investigated. We focus on the mechanism of nuclear excitation by electron
capture in plasmas characterized by electron fluxes typical for the slow
neutron capture process of stellar nucleosynthesis. The small effect of this
further excitation on the neutron capture and gamma decay sequence relevant for
nucleosynthesis is quantified and compared to the corresponding effect of an
additional low-energy photoexcitation step.Comment: 11 pages, 10 figures; v2 minor modifications to match the published
version, results unchange
OMAE2007-29202 C-MANIPULATOR: AN AUTONOMOUS DUAL MANIPULATOR PROJECT FOR UNDERWATER INSPECTION AND MAINTENANCE
ABSTRACT We present the new project C-Manipulator (funded by the German Ministry of Economics (BMWI), Grant No. 03SX231). The goal of C
Using Global Honeypot Networks to Detect Targeted ICS Attacks
Defending industrial control systems (ICS) in the cyber domain is both helped and hindered by bespoke systems integrating heterogeneous devices for unique purposes. Because of this fragmentation, observed attacks against ICS have been targeted and skilled, making them difficult to identify prior to initiation. Furthermore, organisations may be hesitant to share business-sensitive details of an intrusion that would otherwise assist the security community.
In this work, we present the largest study of high-interaction ICS honeypots to date and demonstrate that a network of internet-connected honeypots can be used to identify and profile targeted ICS attacks. Our study relies on a network of 120 high-interaction honeypots in 22 countries that mimic programmable logic controllers and remote terminal units. We provide a detailed analysis of 80,000 interactions over 13 months, of which only nine made malicious use of an industrial protocol. Malicious interactions included denial of service and replay attacks that manipulated logic, leveraged protocol implementation gaps and exploited buffer overflows. While the yield was small, the impact was high, as these were skilled, targeted exploits previously unknown to the ICS community.
By comparison with other ICS honeypot studies, we demonstrate that high-quality deception over long periods is necessary for such a honeypot network to be effective. As part of this argument, we discuss the accidental and intentional reasons why an internet-connected honeypot might be targeted. We also provide recommendations for effective, strategic use of such networks.Gates Cambridge Trus
Exploration of Underwater Structures with Cooperative Heterogeneous Robots
This paper describes ideas in the field of cooperative underwater robotics, which can considerably enhance the exploration capabilities of underwater robots. Three heterogeneous planned or existing underwater robots are presented and possible approaches for cooperative behavior are discussed. Possible application scenarios for future deployment are presented
A Hybrid Locomotion Control Approach
This paper presents the joint control part of a new hybrid locomotion control concept which is developed in the walking robot project ARAMIES . The concept is based on a CPG-model (implemented with Bezier-splines), a reflex model inspired by artificial neurons, and a posture control model. It has been successfully tested on the 8-legged walking robot SCORPIO
- …
