39,764 research outputs found
Seismic response trends evaluation via long term monitoring and finite element model updating of an RC building including soil-structure interaction
Peer reviewedPostprin
Assessment of dynamic and long-term performance of an innovative multi-story timber building via structural monitoring and dynamic testing
Peer reviewedPostprin
Finite element model updating of a RC building considering seismic response trends
ACKNOWLEDGEMENTS The authors would like to thank their supporters. GeoNet staff, particularly Dr Jim Cousins, Dr S.R. Uma and Dr Ken Gledhill, helped with access to seismic data and building information. Faheem Buttâs PhD study was funded by Higher Education Commission (HEC) Pakistan. Piotr Omenzetterâs work within The LRF Centre for Safety and Reliability Engineering at the University of Aberdeen is supported by The Lloyd's Register Foundation (The LRF). The LRF supports the advancement of engineering-related education, and funds research and development that enhances safety of life at sea, on land and in the air.Peer reviewedPostprin
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by benign users, but from hackers as well who have been working to exploit various types of vulnerabilities, overcome security restrictions, and then transform the PDF format in one among the leading malicious code spread vectors. Analyzing the content of malicious PDF files to extract the main features that characterize the malware identity and behavior, is a fundamental task for modern threat intelligence platforms that need to learn how to automatically identify new attacks. This paper surveys existing state of the art about systems for the detection of malicious PDF files and organizes them in a taxonomy that separately considers the used approaches and the data analyzed to detect the presence of malicious code. © Springer International Publishing AG, part of Springer Nature 2018
- âŠ