نتایج جستجو برای: underground economy
تعداد نتایج: 107969 فیلتر نتایج به سال:
Wireless underground sensor networks (WUSNs) can enable many important applications such as intelligent agriculture, pipeline fault diagnosis, mine disaster rescue, concealed border patrol, crude oil exploration, among others. The key challenge to realize WUSNs is the wireless communication in underground environments. Most existing wireless communication systems utilize the dipole antenna to t...
The cadastral system provides land ownership information by registering and representing land boundaries on a map. The current cadastral system in Korea, however, focuses mainly on the management of 2D land-surface boundaries. It is not yet possible to provide efficient or reliable land administration, as this 2D system cannot support or manage land information on 3D properties (including archi...
Underground railway stations are known to have elevated particulate matter (PM) loads compared to ambient air. As these particles are derived from metal-rich sources and transition metals may pose a risk to health by virtue of their ability to catalyze generation of reactive oxygen species (ROS), their potential enrichment in underground environments is a source of concern. Compared to coarse (...
A wireless underground sensor network (WUSN) is defined as a network of wireless sensor devices in which all sensor devices are deployed completely underground (network sinks or any devices specifically for relay between sensors and a sink may be aboveground). In hybrid wireless underground sensor network (HWUSN), communication between nodes is implemented from underground-to-air or air-to-unde...
Existing research on net-centric attacks has focused on the detection of attack events on network side and the removal of rogue programs from client side. However, such approaches largely overlook the way on how attack tools and unwanted programs are developed and distributed. Recent studies in underground economy reveal that suspicious attackers heavily utilize online social networks to form s...
This paper was motivated by the growing data breach activities confronting organizations. Building on the literature on information sharing and network effects, we attempt to empirically examine how the number of security breaches may change as a result of two opposing network effects in the data breach battlefield, namely, the positive network effects driven by industry-wide information sharin...
Over the last decade, malicious software (or malware, for short) has shown an increasing sophistication and proliferation, fueled by a flourishing underground economy, in response to the increasing complexity of modern defense mechanisms. PDF documents are among the major vectors used to convey malware, thanks to the flexibility of their structure and the ability of embedding different kinds of...
We study carding shops that sell stolen credit and debit card information online. By bypassing the anti-scrapping mechanisms they use, we find that the prices of cards depend heavily on factors such as the issuing bank, country of origin, and whether the card can be used in brick-and-mortar stores or not. Almost 70% of cards sold by these outfits are priced at or below the cost banks incur in r...
During the last decades, the problem of malicious and unwanted software (malware) has surged in numbers and sophistication. Malware plays a key role in most of today’s cyber attacks and has consolidated as a commodity in the underground economy. In this work, we analyze the evolution of malware since the early 1980s to date from a software engineering perspective. We analyze the source code of ...
The superconductivity was discovered in 1911. In the same year, Sumitomo Electric Wire & Cable Works was established (Foundation was in 1897 as Sumitomo Copper Rolling Works), and laid the first Japan-made high-voltage underground cables. In 2011, we will celebrate the centennial anniversary of the discovery of superconductivity, and a high-temperature superconducting (HTS) power cable will be ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید