111 research outputs found

    Measuring the Changing Cost of Cybercrime

    Get PDF
    In 2012 we presented the first systematic study of the costs of cybercrime. In this paper, we report what has changed in the seven years since. The period has seen major platform evolution, with the mobile phone replacing the PC and laptop as the consumer terminal of choice, with Android replacing Windows, and with many services moving to the cloud. The use of social networks has become extremely widespread. The executive summary is that about half of all property crime, by volume and by value, is now online. We hypothesised in 2012 that this might be so; it is now established by multiple victimisation studies. Many cybercrime patterns appear to be fairly stable, but there are some interesting changes. Payment fraud, for example, has more than doubled in value but has fallen slightly as a proportion of payment value; the payment system has simply become bigger, and slightly more efficient. Several new cybercrimes are significant enough to mention, including business email compromise and crimes involving cryptocurrencies. The move to the cloud means that system misconfiguration may now be responsible for as many breaches as phishing. Some companies have suffered large losses as a side-effect of denial-of-service worms released by state actors, such as NotPetya; we have to take a view on whether they count as cybercrime. The infrastructure supporting cybercrime, such as botnets, continues to evolve, and specific crimes such as premium-rate phone scams have evolved some interesting variants. The overall picture is the same as in 2012: traditional offences that are now technically ‘computer crimes’ such as tax and welfare fraud cost the typical citizen in the low hundreds of Euros/dollars a year; payment frauds and similar offences, where the modus operandi has been completely changed by computers, cost in the tens; while the new computer crimes cost in the tens of cents. Defending against the platforms used to support the latter two types of crime cost citizens in the tens of dollars. Our conclusions remain broadly the same as in 2012: it would be economically rational to spend less in anticipation of cybercrime (on antivirus, firewalls, etc.) and more on response. We are particularly bad at prosecuting criminals who operate infrastructure that other wrongdoers exploit. Given the growing realisation among policymakers that crime hasn’t been falling over the past decade, merely moving online, we might reasonably hope for better funded and coordinated law-enforcement action

    Numerical simulation of plasticity in double lap metallic bolted joints

    Get PDF
    This article aims to compare three plasticity models, namely Bai-Wierzbicki (BW), von Mises and Drucker Prager, to predict the failure modes in double-lap metallic bolted joints under shear loading. The double-lap bolted joint finite element model has been validated against literature data, which demonstrated the application of BW ductile fracture model to bolt joint failure prediction. Taguchi Design is used to investigate the effects of geometrical parameters, preload and stress triaxiality on the failure modes. Force–displacement response amongst the three models differs up to 20% when failing in shear and a different prediction of the failure mode (shear out vs. net section) under the same loading and geometry conditions is observed

    Egress-related osmiophilic bodies

    Get PDF
    © 2014 John Wiley & Sons Ltd. Summary: Gametogenesis is the earliest event after uptake of malaria parasites by the mosquito vector, with a decisive impact on colonization of the mosquito midgut. This process is triggered by a drop in temperature and contact with mosquito molecules. In a few minutes, male and female gametocytes escape from the host erythrocyte by rupturing the parasitophorous vacuole and the erythrocyte membranes. Electron-dense, oval-shaped organelles, the osmiophilic bodies (OB), have been implicated in the egress of female gametocytes. By comparative electron microscopy and electron tomography analyses combined with immunolocalization experiments, we here define the morphological features distinctive of male secretory organelles, hereafter named MOB (male osmiophilic bodies). These organelles appear as club-shaped, electron-dense vesicles, smaller than female OB. We found that a drop in temperature triggers MOB clustering, independently of exposure to other stimuli. MDV1/PEG3, a protein associated with OB in Plasmodium berghei females, localizes to both non-clustered and clustered MOB, suggesting that clustering precedes vesicle discharge. A P.berghei mutant lacking the OB-resident female-specific protein Pbg377 displays a dramatic reduction in size of the OB, accompanied by a delay in female gamete egress efficiency, while female gamete fertility is not affected. Immunolocalization experiments indicated that MDV1/PEG3 is still recruited to OB-remnant structures

    Comparative analysis of various hyperelastic models and element types for finite element analysis

    Get PDF
    This study aims to evaluate the precision of nine distinct hyperelastic models using experimental data sourced from the existing literature. These models rely on parameters obtained through curve-fitting functions. The complexity in finite element models of elastomers arises due to their nonlinear, incompressible behaviour. To achieve accurate representations, it is imperative to employ sophisticated hyperelastic models and appropriate element types and formulations. Prior published work has primarily focused on the comparison between the fitting models and the experimental data. Instead, in this study, the results obtained from finite element analysis are compared against the original data to assess the impact of element formulation, strain range, and mesh type on the ability to accurately predict the response of elastomers over a wide range of strain values. This comparison confirms that the element formulation and strain range can significantly influence result accuracy, yielding different responses in various strain ranges also because of the limitation with the curve fitting tools

    On a numerical methodology to assess the fatigue life of connecting rods

    Get PDF
    Although simulation-based fatigue analysis is a standard tool adopted in every sector including automotive industry, the design of engine components in automotive and motorsport applications mostly relies on simplified design approaches supported by time-consuming testing programs. This manuscript proposes a new methodology based on individual engine speed damage estimation and engine speed time history combined with Palmgren-Miner linear damage rule to predict the fatigue state of the connecting rod. The track data, engine multibody simulation (AVL ExciteTM) and engine combustion simulation (AVL BoostTM) are used to generate the initial variable trace that is processed to obtain the block programs. Stress amplitude estimated with finite element analysis (Abaqus) are used to estimate the damage from S-N curve and the cumulative damage is estimated with Palmgren-Miner cumulative damage model. The method proposed is demonstrated using a connecting rod case study and the duty cycle from the race on Sebring international raceway. This work shows the suitability of the approach and the benefit in terms of accuracy in the prediction of the fatigue life

    Measuring the changing cost of cybercrime

    Get PDF
    In 2012 we presented the rst systematic study of the costs of cybercrime. In this paper, we report what has changed in the seven years since. The period has seen major platform evolution, with the mobile phone replacing the PC and laptop as the consumer terminal of choice, with Android replacing Windows, and with many services moving to the cloud. The use of social networks has become extremely widespread. The executive summary is that about half of all property crime, by volume and by value, is now online. We hypothesised in 2012 that this might be so; it is now established by multiple victimisation studies. Many cybercrime patterns appear to be fairly stable, but there are some interesting changes. Payment fraud, for example, has more than doubled in value but has fallen slightly as a proportion of payment value; the payment system has simply become bigger, and slightly more ecient. Several new cybercrimes are signicant enough to mention, including business email compromise and crimes involving cryptocurrencies. The move to the cloud means that system misconguration may now be responsible for as many breaches as phishing. Some companies have suered large losses as a side-eect of denial-of-service worms released by state actors, such as NotPetya; we have to take a view on whether they count as cybercrime. The infrastructure supporting cybercrime, such as botnets, continues to evolve, and specic crimes such as premium-rate phone scams have evolved some interesting variants. The overall picture is the same as in 2012: traditional oences that are now technically `computer crimes' such as tax and welfare fraud cost the typical citizen in the low hundreds of Euros/ dollars a year; payment frauds and similar oences, where the modus operandi has been completely changed by computers, cost in the tens; while the new computer crimes cost in the tens of cents. Defending against the platforms used to support the latter two types of crime cost citizens in the tens of dollars. Our conclusions remain broadly the same as in 2012: it would be economically rational to spend less in anticipation of cybercrime (on antivirus, rewalls, etc.) and more on response. We are particularly bad at prosecuting criminals who operate infrastructure that other wrongdoers exploit. Given the growing realisation among policymakers that crime hasn't been falling over the past decade, merely moving online, we might reasonably hope for better funded and coordinated law-enforcement action
    • …
    corecore