To see the other types of publications on this topic, follow the link: Malicious damage to property.

Journal articles on the topic 'Malicious damage to property'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Malicious damage to property.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kim, Park, Kim, Cho, and Kang. "Insider Threat Detection Based on User Behavior Modeling and Anomaly Detection Algorithms." Applied Sciences 9, no. 19 (2019): 4018. http://dx.doi.org/10.3390/app9194018.

Full text
Abstract:
Insider threats are malicious activities by authorized users, such as theft of intellectual property or security information, fraud, and sabotage. Although the number of insider threats is much lower than external network attacks, insider threats can cause extensive damage. As insiders are very familiar with an organization’s system, it is very difficult to detect their malicious behavior. Traditional insider-threat detection methods focus on rule-based approaches built by domain experts, but they are neither flexible nor robust. In this paper, we propose insider-threat detection methods based
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Zhenhua, Wei Xie, Baosheng Wang, Jing Tao, and Enze Wang. "A Survey on Recent Advanced Research of CPS Security." Applied Sciences 11, no. 9 (2021): 3751. http://dx.doi.org/10.3390/app11093751.

Full text
Abstract:
Cyber-physical systems (CPSs) are next-generation intelligent systems that integrate computing, communication, and control. Malicious attacks on CPSs can lead to both property damage and casualties. Therefore, it is worth surveying CPS security by reviewing and analyzing the latest high-quality related works. In this paper, we provide an overview of the CPS security studies from the last five years and select 142 related works from A- or B-level conferences/journals recommended by the China Computer Federation (CCF). First, we review the main contents of the selected papers and classify them i
APA, Harvard, Vancouver, ISO, and other styles
3

KRÓL, Marcin, Wojciech KOPERSKI, Jan BŁASZCZYK, Ryszard WOŹNIAK, and Paweł M. BŁASZCZYK. "SAN: an Integrated Unmanned Air Vehicles Interdictor System Concept." Problems of Mechatronics Armament Aviation Safety Engineering 8, no. 4 (2017): 79–94. http://dx.doi.org/10.5604/01.3001.0010.7319.

Full text
Abstract:
The development of unmanned air vehicles (UAVs) has been very rapid recently. The wide accessibility of UAVs has unlocked a great potential for the malicious or accidental damage or destruction of property or other aircraft in flight. UAVs can be used for espionage, contraband, and the trafficking or transport of arms and hazardous materials. Every month sees a growing number of reports of incidents that involve remote-controlled UAVs operated for aerial video recording. These incidents justify undertaking research into minimizing the hazards which UAVs may potentially cause. A concept was dev
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Yanan. "Punitive damages in trademark infringement disputes in China: challenges and prospects." Queen Mary Journal of Intellectual Property 11, no. 3 (2021): 362–85. http://dx.doi.org/10.4337/qmjip.2021.03.05.

Full text
Abstract:
Punitive damages were introduced into the intellectual property field in China by legislation permitting their imposition for malicious and serious infringements. This paper offers a comprehensive legal framework of punitive damages regarding trademark infringement and a critical analysis of the application of punitive damages in trademark infringement disputes in Chinese judicial practice. My research reveals that punitive damages have rarely been imposed since the punitive damages provision, Article 63 of the Trademark Law, took effect in 2014, whereas statutory damages have been applied ext
APA, Harvard, Vancouver, ISO, and other styles
5

Mitropoulos, Dimitris, and Diomidis Spinellis. "Fatal injection: a survey of modern code injection attack countermeasures." PeerJ Computer Science 3 (November 27, 2017): e136. http://dx.doi.org/10.7717/peerj-cs.136.

Full text
Abstract:
With a code injection attack (CIA) an attacker can introduce malicious code into a computer program or system that fails to properly encode data that comes from an untrusted source. A CIA can have different forms depending on the execution context of the application and the location of the programming flaw that leads to the attack. Currently, CIAs are considered one of the most damaging classes of application attacks since they can severely affect an organisation’s infrastructure and cause financial and reputational damage to it. In this paper we examine and categorize the countermeasures deve
APA, Harvard, Vancouver, ISO, and other styles
6

Khalifa, Nasser AL-Dosari. "CYBERCRIME: THEORETICAL DETERMINANTS, CRIMINAL POLICIES, PREVENTION & CONTROL MECHANISMS." International Journal of Technology and Systems 5, no. 1 (2020): 34–63. http://dx.doi.org/10.47604/ijts.1133.

Full text
Abstract:
Purpose: The research aimed to explore the theoretical determinants of cybercrime in Qatar and assess how it can be prevented and minimised.
 Methodology: This was done using the mixed method research design through the survey strategy and semi-structured interviews with experts in the field of cybercrime in Qatar. Having adopted a mixed-method research methodology, the study had a target population of 200 participants for questionnaire survey, while expert interview had a target population of 11 experts. All these participants were purposively sampled in pursuit of engaging respondents w
APA, Harvard, Vancouver, ISO, and other styles
7

Pedzisai, Nemerai, Edmore Nhamo, and Simbarashe Magonde. "Football Spectator Violence During Matches at the Zimbabwe Football Association Division One Level in Gweru District." International Journal of Sport, Exercise and Health Research 3, no. 1 (2021): 19–23. http://dx.doi.org/10.31254/sportmed.3105.

Full text
Abstract:
Background: A number of football matches in Gweru district have been characterised by undesirable acts of spectator violence resulting in injury and malicious damage to property. Football spectator violence is a very negative phenomenon in football because it chases away sponsors who do not want their organisations and brands to be associated with hooliganism. Violence also discourages spectators from attending football matches as they fear for their safety. This status quo precipitated the need to identify football stakeholders’ perceptions on the causes of spectator violence during football
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Zhao Hui, Ming Ming Hu, Dong Li, and Xiao Gang Qi. "Distributed Malicious Nodes Detection in Wireless Sensor Networks." Applied Mechanics and Materials 519-520 (February 2014): 1243–46. http://dx.doi.org/10.4028/www.scientific.net/amm.519-520.1243.

Full text
Abstract:
Data theft and node attack in wireless sensor networks causes great damage to the networks and the attacker destroys network and obtains the data of the network by malicious nodes distributed in the network. Therefore, it is necessary to detect these malicious nodes and to eliminate their influence. We propose a distributed malicious nodes detection protocol which called BMND based on Bayesian voting, every node determine its suspected malicious nodes by its request message and abnormal behavior. Also, we determine the malicious nodes by Bayesian voting, so that the network can protect itself
APA, Harvard, Vancouver, ISO, and other styles
9

Haraty, Ramzi Ahmed, Sanaa Kaddoura, and Ahmed Zekri. "Transaction Dependency Based Approach for Database Damage Assessment Using a Matrix." International Journal on Semantic Web and Information Systems 13, no. 2 (2017): 74–86. http://dx.doi.org/10.4018/ijswis.2017040105.

Full text
Abstract:
One of the critical concerns in the current era is information security. Companies are sharing vast online critical data, which exposes their databases to malicious attacks. When protection techniques fail to prevent an attack, recovery is needed. Database recovery is not a straightforward procedure, since the transactions are highly interconnected. Traditional recovery techniques do not consider the interconnection between transactions because this information is not saved anywhere in the log file. Thus, they rollback all the transactions starting from the detected malicious transaction to th
APA, Harvard, Vancouver, ISO, and other styles
10

Вакулина, Галина. "Voluntary property damage insurance." Известия Иркутской государственной экономической академии 26, no. 4 (2016): 635–42. http://dx.doi.org/10.17150/2500-2759.2016.26(4).635-642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Zhao, Jianyu, Anzhi Bai, Xi Xi, Yining Huang, and Shanshan Wang. "Impacts of malicious attacks on robustness of knowledge networks: a multi-agent-based simulation." Journal of Knowledge Management 24, no. 5 (2020): 1079–106. http://dx.doi.org/10.1108/jkm-10-2019-0531.

Full text
Abstract:
Purpose Malicious attacks extremely traumatize knowledge networks due to increasing interdependence among knowledge elements. Therefore, exposing the damage of malicious attacks to knowledge networks has important theoretical and practical significance. Despite the insights being offered by the growing research stream, few studies discuss the diverse responses of knowledge networks’ robustness to different target-attacks, and the authors lack sufficient knowledge of which forms of malicious attacks constitute greater disaster when knowledge networks evolve to different stages. Given the irreve
APA, Harvard, Vancouver, ISO, and other styles
12

Bazarkina, Darya Yu, and Evgeny N. Pashentsev. "Malicious Use of Artificial Intelligence." Russia in Global Affairs 18, no. 4 (2020): 154–77. http://dx.doi.org/10.31278/1810-6374-2020-18-4-154-177.

Full text
Abstract:
The article identifies the main risks and threats related to national and international psychological security (PS) in BRICS countries (particularly China, India, and Russia) and posed by the malicious use of artificial intelligence (AI). The main methods of research are systemic, scenario, and case analyses. The authors maintain that PS threats, both national and international, created by the malicious use of AI should be considered at three levels. At the first level, a false negative image of AI is spread. The second level of PS threats is directly related to the malicious use of AI (MUAI),
APA, Harvard, Vancouver, ISO, and other styles
13

Kaddoura, Sanaa, Ramzi A. Haraty, Karam Al Kontar, and Omar Alfandi. "A Parallelized Database Damage Assessment Approach after Cyberattack for Healthcare Systems." Future Internet 13, no. 4 (2021): 90. http://dx.doi.org/10.3390/fi13040090.

Full text
Abstract:
In the current Internet of things era, all companies shifted from paper-based data to the electronic format. Although this shift increased the efficiency of data processing, it has security drawbacks. Healthcare databases are a precious target for attackers because they facilitate identity theft and cybercrime. This paper presents an approach for database damage assessment for healthcare systems. Inspired by the current behavior of COVID-19 infections, our approach views the damage assessment problem the same way. The malicious transactions will be viewed as if they are COVID-19 viruses, taken
APA, Harvard, Vancouver, ISO, and other styles
14

Li, Peng, Xiaotian Yu, He Xu, Jiewei Qian, Lu Dong, and Huqing Nie. "Research on Secure Localization Model Based on Trust Valuation in Wireless Sensor Networks." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/6102780.

Full text
Abstract:
Secure localization has become very important in wireless sensor networks. However, the conventional secure localization algorithms used in wireless sensor networks cannot deal with internal attacks and cannot identify malicious nodes. In this paper, a localization based on trust valuation, which can overcome a various attack types, such as spoofing attacks and Sybil attacks, is presented. The trust valuation is obtained via selection of the property set, which includes estimated distance, localization performance, position information of beacon nodes, and transmission time, and discussion of
APA, Harvard, Vancouver, ISO, and other styles
15

Malik, Sania Zahra, and Jahanzaib Ismat Malhi. "Envy at Workplace: Examining its Sequential Effect on Cyberbullying, Organizational Politics and Job Satisfaction in University Teachers in Pakistan." International Journal of Innovation in Teaching and Learning (IJITL) 6, no. 2 (2021): 128–45. http://dx.doi.org/10.35993/ijitl.v6i2.1123.

Full text
Abstract:
Academic jealousy and politics is a well-known concept. Similarly, envy is a common human behaviour, however, research on these concepts, particularly on envy and its types has remained limited until recently. Envy can trigger harmful behaviours, such as workplace bullying and escalate political activity, especially when the envious intends to damage the envied. This study analyses the effect of malicious envy on job satisfaction with mediation of cyber bullying and organizational politics. A survey study of 359 questionnaires filled by university teachers in Pakistan was conducted. Analysis w
APA, Harvard, Vancouver, ISO, and other styles
16

Wang, Pu, Marta C. González, Ronaldo Menezes, and Albert-László Barabási. "Understanding the spread of malicious mobile-phone programs and their damage potential." International Journal of Information Security 12, no. 5 (2013): 383–92. http://dx.doi.org/10.1007/s10207-013-0203-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Alotaibi, Bandar, and Munif Alotaibi. "A Stacked Deep Learning Approach for IoT Cyberattack Detection." Journal of Sensors 2020 (September 18, 2020): 1–10. http://dx.doi.org/10.1155/2020/8828591.

Full text
Abstract:
Internet of things (IoT) devices and applications are dramatically increasing worldwide, resulting in more cybersecurity challenges. Among these challenges are malicious activities that target IoT devices and cause serious damage, such as data leakage, phishing and spamming campaigns, distributed denial-of-service (DDoS) attacks, and security breaches. In this paper, a stacked deep learning method is proposed to detect malicious traffic data, particularly malicious attacks targeting IoT devices. The proposed stacked deep learning method is bundled with five pretrained residual networks (ResNet
APA, Harvard, Vancouver, ISO, and other styles
18

Candal-Ventureira, David, Pablo Fondo-Ferreiro, Felipe Gil-Castiñeira, and Francisco Javier González-Castaño. "Quarantining Malicious IoT Devices in Intelligent Sliced Mobile Networks." Sensors 20, no. 18 (2020): 5054. http://dx.doi.org/10.3390/s20185054.

Full text
Abstract:
The unstoppable adoption of the Internet of Things (IoT) is driven by the deployment of new services that require continuous capture of information from huge populations of sensors, or actuating over a myriad of “smart” objects. Accordingly, next generation networks are being designed to support such massive numbers of devices and connections. For example, the 3rd Generation Partnership Project (3GPP) is designing the different 5G releases specifically with IoT in mind. Nevertheless, from a security perspective this scenario is a potential nightmare: the attack surface becomes wider and many I
APA, Harvard, Vancouver, ISO, and other styles
19

Liu, Xi, Jun Liu, and Chun Yan Zhu. "P2P Incentive Mechanism Based on Static Game of Incomplete Information." Applied Mechanics and Materials 138-139 (November 2011): 1234–38. http://dx.doi.org/10.4028/www.scientific.net/amm.138-139.1234.

Full text
Abstract:
P2P network is autonomous of sharing file quickly and easily. In recent years, a large number of free-riding nodes and malicious nodes emerge in P2P network, which can’t provide services and have malicious damage to the network system, the result is significant declines of system performance and user satisfaction. In order to solve the problems, a P2P incentive mechanism based on static game of incomplete information is proposed in this paper. The new proposed mechanism has been analyzed and simulated with a series of tests. Experimental results show that the proposed P2P incentive mechanism c
APA, Harvard, Vancouver, ISO, and other styles
20

Alfs, Emily, Doina Caragea, Nathan Albin, and Pietro Poggi-Corradini. "Identifying Android Malware Using Network-Based Approaches." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9911–12. http://dx.doi.org/10.1609/aaai.v33i01.33019911.

Full text
Abstract:
The proliferation of Android apps has resulted in many malicious apps entering the market and causing significant damage. Robust techniques that determine if an app is malicious are greatly needed. We propose the use of a network-based approach to effectively separate malicious from benign apps, based on a small labeled dataset. The apps in our dataset come from the Google Play Store and have been scanned for malicious behavior using Virus Total to produce a ground truth dataset with labels malicous or benign. The apps in the resulting dataset have been represented using binary feature vectors
APA, Harvard, Vancouver, ISO, and other styles
21

Pratomo, Baskoro A., Pete Burnap, and George Theodorakopoulos. "BLATTA: Early Exploit Detection on Network Traffic with Recurrent Neural Networks." Security and Communication Networks 2020 (August 4, 2020): 1–15. http://dx.doi.org/10.1155/2020/8826038.

Full text
Abstract:
Detecting exploits is crucial since the effect of undetected ones can be devastating. Identifying their presence on the network allows us to respond and block their malicious payload before they cause damage to the system. Inspecting the payload of network traffic may offer better performance in detecting exploits as they tend to hide their presence and behave similarly to legitimate traffic. Previous works on deep packet inspection for detecting malicious traffic regularly read the full length of application layer messages. As the length varies, longer messages will take more time to analyse,
APA, Harvard, Vancouver, ISO, and other styles
22

V.Manjula, Dr, Mrs Shanmuga Priya, V. Divyaprabha, and S. Jayasurya. "Detecting Malicious Users and Remove Rumors from Social Network." International Journal of Engineering & Technology 7, no. 3.34 (2018): 283. http://dx.doi.org/10.14419/ijet.v7i3.34.19208.

Full text
Abstract:
Perceiving tattle sources in casual associations expect an essential part in obliging the damage caused by them through the timely disengage of the sources. In any case, the short lived assortment in the topology of casual associations and the advancing dynamic processes challenge our standard source recognizing confirmation strategies that are considered in static frameworks. We diminish the time-varying networks to a movement of static frameworks by introducing a period consolidating window. By then instead of looking at each individual in standard techniques, we grasp a rearrange dispersing
APA, Harvard, Vancouver, ISO, and other styles
23

Li, Song, Jian Liu, Guannan Yang, and Jinguang Han. "A Blockchain-Based Public Auditing Scheme for Cloud Storage Environment without Trusted Auditors." Wireless Communications and Mobile Computing 2020 (October 2, 2020): 1–13. http://dx.doi.org/10.1155/2020/8841711.

Full text
Abstract:
In the cloud storage applications, the cloud service provider (CSP) may delete or damage the user’s data. In order to avoid the responsibility, CSP will not actively inform the users after the data damage, which brings the loss to the user. Therefore, increasing research focuses on the public auditing technology recently. However, most of the current auditing schemes rely on the trusted third public auditor (TPA). Although the TPA brings the advantages of fairness and efficiency, it cannot get rid of the possibility of malicious auditors, because there is no fully trusted third party in the re
APA, Harvard, Vancouver, ISO, and other styles
24

Johnson, Bankole A., and Lynda T. Wells. "2. Viruses – prevention, detection, and removal." Psychiatric Bulletin 16, no. 12 (1992): 771–73. http://dx.doi.org/10.1192/pb.16.12.771.

Full text
Abstract:
Most medical researchers rely on computers to store their data, often many years of work. It is, however, surprising that many give little thought to protecting their machine from malicious damage caused by computer viruses. This article examines how to prevent, detect, and remove computer viruses.
APA, Harvard, Vancouver, ISO, and other styles
25

Morrison, Linda Bondi. "2002 BODILY INJURY AND PROPERTY DAMAGE UPDATE." Environmental Claims Journal 15, no. 2 (2003): 143–69. http://dx.doi.org/10.1080/713609444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Bromley, Daniel W. "Property rights and natural resource damage assessments." Ecological Economics 14, no. 2 (1995): 129–35. http://dx.doi.org/10.1016/0921-8009(95)00027-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Rodriguez, Miranda. "All Your IP Are Belong to Us." Texas A&M Law Review 3, no. 3 (2016): 663–89. http://dx.doi.org/10.37419/lr.v3.i3.7.

Full text
Abstract:
The cybersecurity and cybercrime industries are tied together in an arms race where both seek out new security vulnerabilities to exploit on offense or to remediate on defense. Malware (malicious software) offers one of the primary weapons pioneering new computer technologies on both sides. However, the average Internet user sees malware at best as an annoyance that is merely the price of surfing the web. It is clear that cybersecurity is a business and a successful one. The cybersecurity industry maintains copyrights and patents on our cyber defense technologies— antivirus software, firewalls
APA, Harvard, Vancouver, ISO, and other styles
28

Haraty, Ramzi A., Mirna Zbib, and Mehedi Masud. "Data damage assessment and recovery algorithm from malicious attacks in healthcare data sharing systems." Peer-to-Peer Networking and Applications 9, no. 5 (2015): 812–23. http://dx.doi.org/10.1007/s12083-015-0361-z.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Khan, Muhammad Salman, Ken Ferens, and Witold Kinsner. "Multifractal Singularity Spectrum for Cognitive Cyber Defence in Internet Time Series." International Journal of Software Science and Computational Intelligence 7, no. 3 (2015): 17–45. http://dx.doi.org/10.4018/ijssci.2015070102.

Full text
Abstract:
Growing global dependence over cyberspace has given rise to intelligent malicious threats due to increasing network complexities, inherent vulnerabilities embedded within the software and the limitations of existing cyber security systems to name a few. Malicious cyber actors exploit these vulnerabilities to carry out financial fraud, steal intellectual property and disrupt the delivery of essential online services. Unlike physical security, cyberspace is very difficult to secure due to the replacement of traditional computing platforms with sophisticated cloud computing and virtualization. Th
APA, Harvard, Vancouver, ISO, and other styles
30

Tettenborn, Andrew. "Property Damage and Economic Loss: Should Claims by Property Owners Themselves Be Limited?" Common Law World Review 34, no. 2 (2005): 128–43. http://dx.doi.org/10.1350/clwr.34.2.128.65367.

Full text
Abstract:
This article takes a fresh look at the ‘economic loss rule’ in torts concerning damage or destruction of property: that is, the rule that while the owner of the damaged property can claim for all consequential losses subject only to remoteness limitations, claims by others for losses they suffer as a result of the damage are severely limited. The problems of anomaly and arbitrariness caused by the rule are well documented. The argument put forward here, however, is that these problems arise not so much because the non-owner has too few rights, but rather because the owner has too many. My conc
APA, Harvard, Vancouver, ISO, and other styles
31

Rhoades, David A., and David J. Dowrick. "Variability of Damage Ratios for Property in Earthquakes." Earthquake Spectra 15, no. 2 (1999): 297–316. http://dx.doi.org/10.1193/1.1586042.

Full text
Abstract:
In studies of damage to classes of property in earthquakes, the damage ratio for a class as a whole, denoted D¯r, can differ appreciably from the mean damage ratio Drm of properties in the class. Two factors that influence the propensity of D¯r and Drm to differ are the skewness of the distribution of property values and any systematic relation that may exist between property value and damage ratio. The existence of such relations is demonstrated using data from two major New Zealand earthquakes, at Napier ( Mw7.8, 1931) and Edgecumbe ( Mw6.5, 1987). A common trend is that the probability of a
APA, Harvard, Vancouver, ISO, and other styles
32

Lai, Chun-Ming, Hung-Jr Shiu, and Jon Chapman. "Quantifiable Interactivity of Malicious URLs and the Social Media Ecosystem." Electronics 9, no. 12 (2020): 2020. http://dx.doi.org/10.3390/electronics9122020.

Full text
Abstract:
Online social network (OSN) users are increasingly interacting with each other via articles, comments, and responses. When access control mechanisms are weak or absent, OSNs are perceived by attackers as rich environments for influencing public opinions via fake news posts or influencing commercial transactions via practices such as phishing. This has led to a body of research looking at potential ways to predict OSN user behavior using social science concepts such as conformity and the bandwagon effect. In this paper, we address the question of how social recommendation systems affect the occ
APA, Harvard, Vancouver, ISO, and other styles
33

Gupta, Siddhant, Siddharth Sethi, Srishti Chaudhary, and Anshul Arora. "Blockchain Based Detection of Android Malware using Ranked Permissions." International Journal of Engineering and Advanced Technology 10, no. 5 (2021): 68–75. http://dx.doi.org/10.35940/ijeat.e2593.0610521.

Full text
Abstract:
Android mobile devices are a prime target for a huge number of cyber-criminals as they aim to create malware for disrupting and damaging the servers, clients, or networks. Android malware are in the form of malicious apps, that get downloaded on mobile devices via the Play Store or third-party app markets. Such malicious apps pose serious threats like system damage, information leakage, financial loss to user, etc. Thus, predicting which apps contain malicious behavior will help in preventing malware attacks on mobile devices. Identifying Android malware has become a major challenge because of
APA, Harvard, Vancouver, ISO, and other styles
34

McKay, Robert B. "Asbestos Property Damage Settlement in a Bankruptcy Setting." Law and Contemporary Problems 53, no. 4 (1990): 37. http://dx.doi.org/10.2307/1191949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Gillarduzzi, Andrea. "Investigating property damage along Dublin Port Tunnel alignment." Proceedings of the Institution of Civil Engineers - Forensic Engineering 167, no. 3 (2014): 119–30. http://dx.doi.org/10.1680/feng.13.00024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Khludeneva, Natalya. "Legal Limits of Property Liability for Environmental Damage." Journal of Russian Law 7, no. 3 (2019): 1. http://dx.doi.org/10.12737/art_2019_3_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Obeng, Kofi, and Mark Burkey. "Explaining Property Damage from Crashes at Signalized Intersections." Transportation Planning and Technology 29, no. 3 (2006): 217–31. http://dx.doi.org/10.1080/03081060600810972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Brown, Tanya M., William H. Pogorzelski, and Ian M. Giammanco. "Evaluating Hail Damage Using Property Insurance Claims Data." Weather, Climate, and Society 7, no. 3 (2015): 197–210. http://dx.doi.org/10.1175/wcas-d-15-0011.1.

Full text
Abstract:
Abstract A series of thunderstorms on 24 May 2011 produced significant hail in the Dallas–Fort Worth (DFW) metroplex, resulting in an estimated $876.8 million (U.S. dollars) in insured losses to property and automobiles, according to the Texas Department of Insurance. Insurance claims and policy-in-force data were obtained from five insurance companies for more than 67 000 residential properties located in 20 ZIP codes. The methodology for selecting the 20 ZIP codes is described. This study evaluates roofing material type with regard to resiliency to hailstone impacts and relative damage costs
APA, Harvard, Vancouver, ISO, and other styles
39

Sun, Fanglin, and Richard T. Carson. "Coastal wetlands reduce property damage during tropical cyclones." Proceedings of the National Academy of Sciences 117, no. 11 (2020): 5719–25. http://dx.doi.org/10.1073/pnas.1915169117.

Full text
Abstract:
Coastal wetlands dampen the impact of storm surge and strong winds. Studies on the economic valuation of this protective service provided by wetland ecosystems are, however, rare. Here, we analyze property damage caused by 88 tropical storms and hurricanes hitting the United States between 1996 and 2016 and show that counties with more wetland coverage experienced significantly less property damage. The expected economic value of the protective effects of wetlands varies widely across coastal US counties with an average value of about $1.8 million/km2per year and a median value of $91,000/km2.
APA, Harvard, Vancouver, ISO, and other styles
40

Lusvardi, Wayne C., and Charles B. Warren. "Daubert—compliant research design or property damage valuations." Environmental Claims Journal 13, no. 2 (2000): 33–52. http://dx.doi.org/10.1080/10406020109355161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Kaneoka, Kyoko. "Automated Driving System and Property Damage Liability Insurance." Hokengakuzasshi (JOURNAL of INSURANCE SCIENCE) 2020, no. 651 (2020): 651_25–651_50. http://dx.doi.org/10.5609/jsis.2020.651_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Mishra, Bimal Kumar, and Aditya Kumar Singh. "Two Quarantine Models on the Attack of Malicious Objects in Computer Network." Mathematical Problems in Engineering 2012 (2012): 1–13. http://dx.doi.org/10.1155/2012/407064.

Full text
Abstract:
SEIQR (Susceptible, Exposed, Infectious, Quarantined, and Recovered) models for the transmission of malicious objects with simple mass action incidence and standard incidence rate in computer network are formulated. Threshold, equilibrium, and their stability are discussed for the simple mass action incidence and standard incidence rate. Global stability and asymptotic stability of endemic equilibrium for simple mass action incidence have been shown. With the help of Poincare Bendixson Property, asymptotic stability of endemic equilibrium for standard incidence rate has been shown. Numerical m
APA, Harvard, Vancouver, ISO, and other styles
43

Shamseddine, Maha, Wassim Itani, Ali Chehab, and Ayman Kayssi. "Network Programming and Probabilistic Sketching for Securing the Data Plane." Security and Communication Networks 2018 (June 28, 2018): 1–23. http://dx.doi.org/10.1155/2018/2905730.

Full text
Abstract:
This paper presents VISKA, a cloud security service for dynamically detecting malicious switching elements in software defined networking (SDN) infrastructures. The main contributions of VISKA lie in (1) utilizing network programming and secure probabilistic sketching in SDN environments to dynamically detect and isolate parts of the data plane that experience malicious behavior, (2) applying a set of focused packet probing and sketching mechanisms on isolated network partitions/views rather than focusing the security mechanisms on the whole physical network, (3) efficiently analyzing the netw
APA, Harvard, Vancouver, ISO, and other styles
44

LI Chao, 李超, and 聂敏 NIE Min. "Damage Model of Quantum Signaling of Multi-user Based on Malicious Attack and Repair Strategy." ACTA PHOTONICA SINICA 41, no. 10 (2012): 1256–60. http://dx.doi.org/10.3788/gzxb20124110.1256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Iaiani, Matteo, Alessandro Tugnoli, Paolo Macini, and Valerio Cozzani. "Outage and asset damage triggered by malicious manipulation of the control system in process plants." Reliability Engineering & System Safety 213 (September 2021): 107685. http://dx.doi.org/10.1016/j.ress.2021.107685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Long, Susan. "Repairing the damage: wishful, defensive, or restorative?" Twentieth Anniversary Special Issue 21, no. 1 (2021): 28–39. http://dx.doi.org/10.33212/osd.v21n1.2021.28.

Full text
Abstract:
Damage, physically and to the psyche is inevitable. This is whether it is caused unconsciously, through consciously malicious intent, thoughtlessness, as collateral or just through a hostile environment or the warring of internal forces. At the group or social level, the last few years have seen much damage in terms of economic recession, climate change, racial inequalities, and domestic violence. The desire to repair follows such damage. The psychoanalytic focus on reparation sees the process as an attempt by a person to repair perceived damage to another or, more precisely, to an internal im
APA, Harvard, Vancouver, ISO, and other styles
47

Dong, Chen, Yi Xu, Ximeng Liu, Fan Zhang, Guorong He, and Yuzhong Chen. "Hardware Trojans in Chips: A Survey for Detection and Prevention." Sensors 20, no. 18 (2020): 5165. http://dx.doi.org/10.3390/s20185165.

Full text
Abstract:
Diverse and wide-range applications of integrated circuits (ICs) and the development of Cyber Physical System (CPS), more and more third-party manufacturers are involved in the manufacturing of ICs. Unfortunately, like software, hardware can also be subjected to malicious attacks. Untrusted outsourced manufacturing tools and intellectual property (IP) cores may bring enormous risks from highly integrated. Attributed to this manufacturing model, the malicious circuits (known as Hardware Trojans, HTs) can be implanted during the most designing and manufacturing stages of the ICs, causing a chang
APA, Harvard, Vancouver, ISO, and other styles
48

Raman, M. R. Gauthama, K. Kannan, S. K. Pal, and V. S. Shankar Sriram. "Rough Set-hypergraph-based Feature Selection Approach for Intrusion Detection Systems." Defence Science Journal 66, no. 6 (2016): 612. http://dx.doi.org/10.14429/dsj.66.10802.

Full text
Abstract:
Immense growth in network-based services had resulted in the upsurge of internet users, security threats and cyber-attacks. Intrusion detection systems (IDSs) have become an essential component of any network architecture, in order to secure an IT infrastructure from the malicious activities of the intruders. An efficient IDS should be able to detect, identify and track the malicious attempts made by the intruders. With many IDSs available in the literature, the most common challenge due to voluminous network traffic patterns is the curse of dimensionality. This scenario emphasizes the importa
APA, Harvard, Vancouver, ISO, and other styles
49

Link, Michael, Stefan Stöhr, and Matthias Weiland. "Identification of Structural Property Degradations by Computational Model Updating." Key Engineering Materials 347 (September 2007): 19–34. http://dx.doi.org/10.4028/www.scientific.net/kem.347.19.

Full text
Abstract:
Computational model updating techniques are used to adjust selected parameters of finite element models in order to make the models compatible with experimental data. This is done by minimizing the differences of analytical and experimental data, for example, natural frequencies and mode shapes by numerical optimization procedures. For a long time updating techniques have also been investigated with regard to their ability to localize and quantify structural damage. The success of such an approach is mainly governed by the quality of the damage model and its ability to describe the structural
APA, Harvard, Vancouver, ISO, and other styles
50

KATOGI, Hideaki, Kazunori UEMATSU, Yoshinobu SHIMAMURA, Keiichiro TOHGO, Tomoyuki FUJII, and Kenichi TAKEMURA. "Fatigue Property and Fatigue Damage Accumulation of Jute Monofilament." Journal of the Japan Society for Composite Materials 41, no. 1 (2015): 25–32. http://dx.doi.org/10.6089/jscm.41.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!