نتایج جستجو برای: underground economy

تعداد نتایج: 107969  

Journal: :CoRR 2015
Xin Tan Zhi Sun Ian F. Akyildiz

Wireless underground sensor networks (WUSNs) can enable many important applications such as intelligent agriculture, pipeline fault diagnosis, mine disaster rescue, concealed border patrol, crude oil exploration, among others. The key challenge to realize WUSNs is the wireless communication in underground environments. Most existing wireless communication systems utilize the dipole antenna to t...

2015
Sangmin Kim Jeonghyun Kim Jaehoon Jung Joon Heo

The cadastral system provides land ownership information by registering and representing land boundaries on a map. The current cadastral system in Korea, however, focuses mainly on the management of 2D land-surface boundaries. It is not yet possible to provide efficient or reliable land administration, as this 2D system cannot support or manage land information on 3D properties (including archi...

2013
Matthew Loxham Matthew J. Cooper Miriam E. Gerlofs-Nijland Flemming R. Cassee Donna E. Davies Martin R. Palmer Damon A. H. Teagle

Underground railway stations are known to have elevated particulate matter (PM) loads compared to ambient air. As these particles are derived from metal-rich sources and transition metals may pose a risk to health by virtue of their ability to catalyze generation of reactive oxygen species (ROS), their potential enrichment in underground environments is a source of concern. Compared to coarse (...

Journal: :Wireless Communications and Mobile Computing 2013
Adel Ali Ahmed Norsheila Fisal

A wireless underground sensor network (WUSN) is defined as a network of wireless sensor devices in which all sensor devices are deployed completely underground (network sinks or any devices specifically for relay between sensors and a sink may be aboveground). In hybrid wireless underground sensor network (HWUSN), communication between nodes is implemented from underground-to-air or air-to-unde...

2012
Ziming Zhao Gail-Joon Ahn Hongxin Hu Deepinder Mahi

Existing research on net-centric attacks has focused on the detection of attack events on network side and the removal of rogue programs from client side. However, such approaches largely overlook the way on how attack tools and unwanted programs are developed and distributed. Recent studies in underground economy reveal that suspicious attackers heavily utilize online social networks to form s...

2015
Michele Maasberg Charles Liu

This paper was motivated by the growing data breach activities confronting organizations. Building on the literature on information sharing and network effects, we attempt to empirically examine how the number of security breaches may change as a result of two opposing network effects in the data breach battlefield, namely, the positive network effects driven by industry-wide information sharin...

Journal: :CoRR 2017
Davide Maiorca Battista Biggio

Over the last decade, malicious software (or malware, for short) has shown an increasing sophistication and proliferation, fueled by a flourishing underground economy, in response to the increasing complexity of modern defense mechanisms. PDF documents are among the major vectors used to convey malware, thanks to the flexibility of their structure and the ability of embedding different kinds of...

2015
Vlad Bulakh Minaxi Gupta

We study carding shops that sell stolen credit and debit card information online. By bypassing the anti-scrapping mechanisms they use, we find that the prices of cards depend heavily on factors such as the issuing bank, country of origin, and whether the card can be used in brick-and-mortar stores or not. Almost 70% of cards sold by these outfits are priced at or below the cost banks incur in r...

2016
Alejandro Calleja Juan E. Tapiador Juan Caballero

During the last decades, the problem of malicious and unwanted software (malware) has surged in numbers and sophistication. Malware plays a key role in most of today’s cyber attacks and has consolidated as a commodity in the underground economy. In this work, we analyze the evolution of malware since the early 1980s to date from a software engineering perspective. We analyze the source code of ...

2010

The superconductivity was discovered in 1911. In the same year, Sumitomo Electric Wire & Cable Works was established (Foundation was in 1897 as Sumitomo Copper Rolling Works), and laid the first Japan-made high-voltage underground cables. In 2011, we will celebrate the centennial anniversary of the discovery of superconductivity, and a high-temperature superconducting (HTS) power cable will be ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید