Explore chapters and articles related to this topic
SMEs, micro-SMEs and BIM
Published in James Harty, Tahar Kouider, Graham Paterson, Getting to Grips with BIM, 2015
James Harty, Tahar Kouider, Graham Paterson
In computing, a directory is a component of a cataloguing hierarchy which contains references to digital files. In the interests of fast and efficient manipulation of data, computer operating systems demand structured and organised protocols for the generation and management of folder and file structures. The use of desktop folder icons as metaphors for computer operating system directories has been ubiquitous for many years, and the conventions cut across industry and professional discipline boundaries. In the 1970s, within the broad spectrum of UK architectural education, basic programming skills were taught, and some contemporary BIM theoreticians and digital process-masters may have benefited from that experience of structured and methodological working in dealing with digital data.
A survey of phishing attack techniques, defence mechanisms and open research challenges
Published in Enterprise Information Systems, 2022
The attacker creates the phishing URLs by making the change in the original URLs (e.g., changing the top-level domain). Prakash et al. developed Phishnet to predict the blacklisted URLs (Prakash et al. 2010). Phishnet evaluated on the dataset of 24,000 URLs and achieved 3% FPR & 5% FNR. Phishnet contains two modules, first is URL prediction and second is URL matching module. Following heuristics are used in the URL prediction module. Top-level domains (TLD) of the suspicious URL are replaced with 3,209 different TLDs resulting in child URLs that are required to be inspected.Phishnet maintains the cluster of host equivalence classes containing the same IP address and creates new URL by the combination of hostname and path.The URLs having the same directory structure are clustered, and new URLs are formed by exchanging filenames within the same cluster.The path equivalence class is generated, and query string can be exchanged to create new URLs.The New URLs are generated by substituting the organisation names in the malicious URLs. The technique uses 64 most targeted brand used by attackers.
An architecture for synchronising cloud file storage and organisation repositories
Published in International Journal of Parallel, Emergent and Distributed Systems, 2019
Gil Andriani, Eduardo Godoy, Guilherme Koslovski, Rafael Obelheiro, Mauricio Pillon
Cloud-based file storage comprises two main actors: data storage repositories and synchronisation clients. The internal architecture of repositories is usually composed of modules for monitoring and indexing data, implemented as a distributed file system, focusing on delivering availability, authenticity, and confidentiality to users. Complementarily, cloud providers offer services to control versioning, quota sharing and collaborative editing. For their part, file synchronisation clients are responsible for maintaining a directory structure and files synchronised with the cloud repository. File transfer events are realised by synchronisers and observers, that act on the metadata associated with the files. There are two observers, locally- and remotely-placed, responsible for identifying changes in files generated by sharing users. When needed, a synchronising module performs the transfer of files (partial or total) between local and remote repositories. Some common features are found in popular clients such as incremental synchronisation, encryption and data compression.
Is there a link between motor vehicle collisions and being a cigarette smoker in Canada? Analysis of survey data from Ontario from 2002 to 2014
Published in Traffic Injury Prevention, 2018
Evelyn Vingilis, Linda L. Pederson, Jane Seeley, Anca R. Ialomiteanu, Christine M. Wickens, Roberta Ferrence, Robert E. Mann
Data are derived from the CAMH Monitor survey, a continuously fielded (since 1996) cross-sectional telephone survey of the general adult population (ages 18 years or older) of Ontario, conducted by CAMH and administered by the Institute for Social Research at York University (http://www.camh.ca/en/hospital/Pages/home.aspx). The main purpose of the survey is to provide epidemiological surveillance of indicators related to alcohol, tobacco, and other drug use, as well as physical and mental health. The survey uses list-assisted random-digit-dialing methods via Computer-Assisted Telephone Interviews. The sampling frame includes commercially available lists of telephone numbers as well as telephone numbers between or on either side of listed numbers. In essence, each randomly selected number from a telephone directory serves as a seed for additional random selections that are not restricted to published landline numbers. For example, if the selected number xxx-xxx-8513 is published in a directory, then all numbers from xxx-xxx-8510 through xxx-xxx-8519 are included in the sampling frame even if they are cell phone numbers or unlisted numbers. A computer is then used to generate a random sample of telephone numbers from this frame from which each monthly or quarterly sample is drawn. Because unlisted numbers, cell phone numbers, and newly activated numbers are potentially interspersed among published numbers in the sampling frame, this strategy provides a superior sample than one restricted to published landline numbers alone.