نتایج جستجو برای: mine exploitations

تعداد نتایج: 24223  

2017
I. Tafur Monroy

This paper proposes and demonstrates an RFIDover-Fiber wireless track and trace system using active RFID tags and operating over distances up to 30 km of optical fiber and 35 meters of wireless readability. Keywords—component; microwave photonics, radio-over-fiber,

2014
Yuanyuan Grace Zeng David Coffey John Viega

How vulnerable are unprotected machines on the Internet? Utilizing Amazon’s Elastic Compute Cloud (EC2) service and our own VMware ESXi server, we launched and monitored 18 Windows machines (Windows 2008, XP and 7) without anti-virus or firewall protection at two distinct locations on the Internet—in the cloud and on-premise. Some machines ran a wide-open configuration with all ports open and s...

Journal: :Revue Forestière Française 1956

Journal: :Oléagineux, Corps gras, Lipides 2006

2017
Zhenquan Xu Gongshen Liu Tielei Wang Hao Xu

An uninitialized use refers to a common coding mistake where programmers directly use variables on the stack or the heap before they are initialized. Uninitialized uses, although simple, can lead to severe security consequences. In this paper, we will share our experience in gaining arbitrary kernel code execution in the latest macOS Sierra by exploiting two uninitialized use vulnerabilities fo...

2006
Yusen Dong Linlin Ge Hsing-Chung Chang

Differential SAR Interferometry (D-InSAR) is an effective tool in monitoring land subsidence because of its greater coverage area and better resolution of height change. A series of Japanese Earth Resources Satallite-1 (JERS-1) images from 1992 to 1998 has been used in monitoring the mine subsidence in the test site of this study, one of the important coal mining areas in China. D-InSAR procedu...

Journal: :American Journal of Networks and Communications 2013

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید