Skip to main content

Showing 1–6 of 6 results for author: Born, K

.
  1. arXiv:2501.00001  [pdf, other

    cs.CE physics.chem-ph

    Mathematical modelling of flow and adsorption in a gas chromatograph

    Authors: A. Cabrera-Codony, A. Valverde, K. Born, O. A. I. Noreldin, T. G. Myers

    Abstract: In this paper, a mathematical model is developed to describe the evolution of the concentration of compounds through a gas chromatography column. The model couples mass balances and kinetic equations for all components. Both single and multiple-component cases are considered with constant or variable velocity. Non-dimensionalisation indicates the small effect of diffusion. The system where diffusi… ▽ More

    Submitted 7 October, 2024; originally announced January 2025.

    Comments: 35 pages, 4 figures, 3 tables, 2 appendix, 37 references. Submitted to Partial Differential Equations in Applied Mathematics

  2. Prandtl's extended mixing length model applied to the two-dimensional turbulent classical far wake

    Authors: AJ Hutchinson, N Hale, K Born, DP Mason

    Abstract: Despite its limitations, Prandtl's mixing length model is widely applied in modelling turbulent free shear flows. Prandtl's extended model addresses many of the shortfalls of the original model, but is not so widely used, in part due to additional mathematical complexities that arise in its derivation and implementation. Furthermore, in both models Prandtl neglects the kinematic viscosity on the b… ▽ More

    Submitted 21 January, 2021; originally announced January 2021.

    Comments: 21 pages, 5 figures

    MSC Class: 76F40

  3. arXiv:1004.4359  [pdf

    cs.CR

    NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis

    Authors: Kenton Born, David Gustafson

    Abstract: This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of legitimate traffic. Both quantitative analysis and visual aids are provided that allow the user to make determinations about the legitimacy of the DNS traffic.

    Submitted 25 April, 2010; originally announced April 2010.

    Comments: In Proceedings of the the 6th Annual Cyber Security and Information Intelligence Research Workshop, Oak Ridge, TN, April 21-23, 2010

    ACM Class: C.2.3

  4. arXiv:1004.4358  [pdf

    cs.CR

    Detecting DNS Tunnels Using Character Frequency Analysis

    Authors: Kenton Born, David Gustafson

    Abstract: High-bandwidth covert channels pose significant risks to sensitive and proprietary information inside company networks. Domain Name System (DNS) tunnels provide a means to covertly infiltrate and exfiltrate large amounts of information passed network boundaries. This paper explores the possibility of detecting DNS tunnels by analyzing the unigram, bigram, and trigram character frequencies of domai… ▽ More

    Submitted 25 April, 2010; originally announced April 2010.

    Comments: In Proceedings of the 9th Annual Security Conference, Las Vegas, NV, April 7-8, 2010

  5. arXiv:1004.4357  [pdf

    cs.CR

    Browser-Based Covert Data Exfiltration

    Authors: Kenton Born

    Abstract: Current best practices heavily control user permissions on network systems. This effectively mitigates many insider threats regarding the collection and exfiltration of data. Many methods of covert communication involve crafting custom packets, typically requiring both the necessary software and elevated privileges on the system. By exploiting the functionality of a browser, covert channels for da… ▽ More

    Submitted 25 April, 2010; originally announced April 2010.

    Comments: In Proceedings of the 9th Annual Security Conference, Las Vegas, NV, April 7-8, 2010

  6. Renormalisation of lattice currents and the calculation of decay constants for dynamical staggered fermions

    Authors: R. Altmeyer, K. D. Born, M. Goeckeler, R. Horsley, E. Laermann, G. Schierholz

    Abstract: A numerical calculation of the lattice staggered renormalisation constants at $β= 5.35$, $m = 0.01$ is presented. It is seen that there are considerable non-perturbative effects present. As an application the vector decay constant $f_ρ$ is estimated. (LAT92 contribution, one LATEX file with 3 postscript figures appended.)

    Submitted 23 October, 1992; originally announced October 1992.

    Comments: 5 pages, HLRZ preprint 92-70

    Journal ref: Nucl.Phys.Proc.Suppl. 30 (1993) 423-426