Search results for "Exploit"
showing 10 items of 284 documents
A review of challenges and benefits of integration of CHP plant into the grid: a case study in Serbia
2021
AbstractThe Republic of Serbia must make significant efforts to promote and exploit renewable energy sources and increase energy efficiency in all energy sectors to ensure energy security and economic competitiveness, reduce the negative impact on the environment from energy production and use, and contribute to global efforts to reduce greenhouse gases. Within the paper several issues of integration of recently realized CHP plant are introduced and discussed. Firstly, the legal and energy policy issues in the Republic of Serbia regarding connecting CHP to the grid are presented. The challenges and technical solutions for CHP connection to the grid, as well as power quality issues and the r…
Automatic image representation for content-based access to personal photo album
2007
The proposed work exploits methods and techniques for automatic characterization of images for content-based access to personal photo libraries. Several techniques, even if not reliable enough to address the general problem of content-based image retrieval, have been proven quite robust in a limited domain such as the one of personal photo album. In particular, starting from the observation that most personal photos depict a usually small number of people in a relatively small number of different contexts (e.g. Beach, Public Garden, Indoor, Nature, Snow, City, etc...) we propose the use of automatic techniques borrowed from the fields of computer vision and pattern recognition to index imag…
A Study of a Social Behavior inside the Online Black Markets
2010
Illegal activities in cyberspace involving software vulnerabilities have resulted in tangible damage on computer-based environments. Lately, online black market sites for trading stolen goods, credentials, malware and exploit kits have been intensively examined. The market players are identifiably a group of loosely tied individuals but posses shared interests. However, their social behavior has only been discussed in a limited manner. This paper examines the arrangement of the market insiders’ social behavior that enables such forums to continue or discontinue their operation and become a meaningful threat to security. The results reveal that particular formal and informal regulations and …
A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments
2007
A man-in-the-middle (MitM) attack is, in the scope of a LAN, a technique where an attacker is able to redirect all traffic between two hosts of that same LAN for packet sniffing or data manipulation, without the end hosts being aware of it. Usually these attacks exploit security flaws in the implementation of the ARP protocol at hosts. Up to now, detecting such attacks required setting up a machine with special-purpose software for this task. As an additional problem, few intrusion detection systems (IDS) are able to prevent MitM attacks. In this work we present a low-cost embedded IDS which, when plugged into a switch or hub, is able to detect and/or prevent MitM attacks automatically and …
Licensed and Unlicensed Spectrum Management for Energy-Efficient Cognitive M2M
2020
Edge computing has emerged as a promising solution for relieving the tension between resource-limited MTDs and computational-intensive tasks. To realize successful task offloading with limited spectrum, we focus on the cognitive machine-to-machine (CM2M) paradigm which enables a massive number of MTDs to either opportunistically use the licensed spectrum that is temporarily available, or to exploit the under-utilized unlicensed spectrum. We formulate the channel selection problem with both licensed and unlicensed spectrum as an adversarial multi-armed bandit (MAB) problem, and combine the exponential-weight algorithm for exploration and exploitation (EXP3) and Lyapunov optimization to devel…
DEMO: Unconventional WiFi-ZigBee communications without gateways
2014
Nowadays, the overcrowding of ISM bands is becoming an evident limitation for the performance and widespread usage of 802.11 and 802.15.4 technologies. In this demo, we prove that it is possible to opportunistically exploit the inter-technology interference between 802.11 and 802.15.4 to build an unconventional low-rate communication channel and signalling protocol, devised to improve the performance of each contending technology. Differently from previous solutions, inter-technology communications do not require the deployment of a gateway with two network interfaces, but can be activated (when needed) directly between two heterogeneous nodes, e.g. a WiFi node and a ZigBee node. This capab…
Why corporates syndicate their investments with a specific partner? An explorative analysis of corporate venture capital co-investments
2016
The 80% of corporates that engage in CVC activities, make these investments with other corporates, recognizing the strategic benefits provided by co-investors. Despite the relevance of this phenomenon, no studies focus on the motivations that drive a corporate to syndicate its investments and most important there are no researches that investigate antecedents that drive a corporate in choosing the partner with whom to syndicate the CVC investments. Thus, the aim of this paper is to study why corporates syndicate their CVC investment with a specific partner. Based on the CVC and the alliance literatures we propose a research framework that considers two main elements characterizing a CVC syn…
Centrality measures for networks with community structure
2016
Understanding the network structure, and finding out the influential nodes is a challenging issue in the large networks. Identifying the most influential nodes in the network can be useful in many applications like immunization of nodes in case of epidemic spreading, during intentional attacks on complex networks. A lot of research is done to devise centrality measures which could efficiently identify the most influential nodes in the network. There are two major approaches to the problem: On one hand, deterministic strategies that exploit knowledge about the overall network topology in order to find the influential nodes, while on the other end, random strategies are completely agnostic ab…
Crisis perception in financial media discourse:a concrete application using the Minskian/mainstream opposition
2014
Purpose– The purpose of this article is to highlight the need for renewed collaborative efforts between linguists and economists to develop a multidisciplinary approach to discourse studies to single out, in the case at hand, how financial media discourse might reflect either a prevailing mainstream or a Minskian conceptual apparatus in financial crisis related papers.Design/methodology/approach– The paper conducts exploratory research by focusing on semantic analysis, so as to indicate how the latter might possibly indicate a shift in the prevailing framework in contemporary financial media discourse. After a clear exposition of a theoretical dichotomy between the Minskian and mainstream a…
Business, Finance and Organized Crime: Proposing a Risk-Based Approach for Governance in a Law and Economics Perspective (the 'Vigna Code')
2008
Nowadays the organized crime exploits the development of integration and globalization in the industrial, commercial and financial activities, taking advantage of the same networks that facilitate the legitimate transactions. In expanding their businesses the criminal organizations try to use unwitting firms and banks in order to find new profit opportunities and at the same time to camouflage the dishonest activities into the legal ones. The risk of pollution for the honest corporations is increasing. The aim of the paper is to propose an Anti-mafia governance Code (the Vigna Code) developing a risk - based approach in assessing and managing the risk of pollution into the firms, in order t…