A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2014; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on Security for Mobile Devices
2013
IEEE Communications Surveys and Tutorials
Therefore, smartphones may now represent an ideal target for malware writers. ...
We group existing approaches aimed at protecting mobile devices against these classes of attacks into different categories, based upon the detection principles, architectures, collected data and operating ...
ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions, which have greatly improved the quality of the paper. ...
doi:10.1109/surv.2012.013012.00028
fatcat:us2g2qlglrflporo6fp6vqbdn4
Brain leaks and consumer neurotechnology
2018
Nature Biotechnology
data T Not using unsecure networks when accessing sensitive data
For organizations to remain vigilant by: T Deploying email encryption where possible T Ensuring that email is scanned for malware, spam ...
For example, malware authors started to obfuscate code to bypass signature-based security software. ...
T Browser protection for avoiding obfuscated web-based attacks. ...
doi:10.1038/nbt.4240
pmid:30188521
fatcat:dwoyvyborfdifdkklju3p3qek4
A New Approach to Malware Detection
[chapter]
2009
Lecture Notes in Computer Science
like to thank a lot of people who have helped me in this thesis and in my studies in Concordia University. First of all, I would like to thank my supervisor, Dr. ...
He studied with me in my office every weekend without any complaint. During that time, I was so busy that I had no time to cook food for him. ...
Appendix A Source Code of Amb ...
doi:10.1007/978-3-642-02617-1_24
fatcat:lqjndc4wzzhtjbnrpgi3wxy2c4
Utilization Data Mining to Detect Spyware
2012
IOSR Journal of Computer Engineering
Malicious software (malware) is any software that gives partial to full control of your computer to do whatever the malware creator wants. ...
With the development of malware detection systems and Artificial Intelligence, as a new technology for them, Artificial Intelligence has been applied in anti-virus engines. ...
Acknowledgement We would to thank the anonymous referee for helpful Comments Distributed Path Computation Using DIV Algorithm www.iosrjournals.org The security of the Ad Hoc network routing protocols is ...
doi:10.9790/0661-0430104
fatcat:syohb2g2lzhznpjjvbsxqgwlca
Privacy in Sensor-Driven Human Data Collection: A Guide for Practitioners
[article]
2014
arXiv
pre-print
This development has been partially driven by individuals posting and storing data about themselves and friends using online social networks or collecting their data for self-tracking purposes (quantified-self ...
Across the sciences, researchers conduct studies collecting data with an unprecedented resolution and scale. ...
Even encrypted content can disclose information to malicious users, for example when the traffic flow is observed. ...
arXiv:1403.5299v1
fatcat:4l5pk7l66jcobdmxjb7a3hpdtu
Comparison Four Different Probability Sampling Methods based on Differential Evolution Algorithm
2012
Journal of Advances in Information Technology
In this paper, segmentation problems in medical imaging modalities especially for lung CT as well as for thyroid ultrasound (US) are discussed along with their comparative results are shown using automatic ...
The current studies almost are based on the simple random sampling method, and so this paper investigates other probability sampling methods, and proposed three novel differential evolution algorithms. ...
ACKNOWLEDGMENT The authors wish to thank management of Goel Group of Institutions, Lucknow for providing sponsorship in this endeavor. ...
doi:10.4304/jait.3.4.206-214
fatcat:lt35ulkqwfbbbikn6xtlfhcoty
Unit commitment considering multiple charging and discharging scenarios of plug-in electric vehicles
2015
2015 International Joint Conference on Neural Networks (IJCNN)
for neuroimaging studies of reward processing: A case study [#15237]
Manisha Chawla and Krishna P. ...
P177 Integration of Articulatory Knowledge and Voicing Features Based on DNN/HMM for Mandarin Speech Recognition [#15184] Tan Ying-Wei, Liu Wen-Ju, Jiang Wei and Zheng Hao P178 Evaluation of Optical Flow ...
doi:10.1109/ijcnn.2015.7280446
dblp:conf/ijcnn/YangLNF15
fatcat:6xlakikcfzfyhhm2spooe2j7ra
Organizing Viable Information Security Governance and Management
2020
Zenodo
Hardware assets, networks, servers, employees and even organizations themselves have become targets. ...
and looking at the organization and its organization of security management and governance as a whole. ...
However, based on our literature study, case study and dissection of a real-world malware outbreak example, this research ended up with a new vision towards the organization of business information security ...
doi:10.5281/zenodo.3960147
fatcat:r3kgcwgevjfmzferpperaeijja
Simulations on Early Warning Malware Identification System Based on Peer to Peer Networks
[article]
2020
The outbreak of malicious activity over the last years due to the rapid spread of the Internet and the emergence of a new generation of rapidly spreading viral software have made insufficient the use of ...
The problem, in which the thesis is based, is to design and deploy a peer-to-peer network and with the use of epidemiological models to collect significant data results in order to optimize the performance ...
Specifically, the chosen study of the spread of malware through of the simulations is a key research tool for epidemiologists [72] . ...
doi:10.26253/heal.uth.8875
fatcat:xlosvc4rwfchllaqm255cpkgvu
Distributed reinforcement learning for adaptive and robust network intrusion response
2015
Connection science
The increasing adoption of technologies and the exponential growth of networks has made the area of information technology an integral part of our lives, where network security plays a vital role. ...
One of the most serious threats in the current Internet is posed by distributed denial of service (DDoS) attacks, which target the availability of the victim system. ...
A flow is defined as "A set of IP packets passing an observation point in the network during a certain time interval. All packets belonging to a particular flow have a set of common properties." ...
doi:10.1080/09540091.2015.1031082
fatcat:vzwfb5cclzdqdhwgxzqozxe3xi
Analyzing clinical processes and detecting potential correlation between CKD and air pollution
[chapter]
2022
Knowledge Organization and Management in the Domain of Environment and Earth Observation (KOMEEO)
A recent reappraisal of the project design recognised the potential of causality for modelling and matching problems. This paper proposes a design compatible with the crowdsourced classification. ...
The architecture combines the higher-level cognition of humans and their powers of language, abstraction, of inference and analogy, with the storage and processing power of computers. ...
The FITS file format for the long-term preservation of digital objects ...e Wells, Donald C., and Eric W. Greisen. 1979 ...
doi:10.5771/9783956508752-99
fatcat:xkycrq4fvjacbb74a2qsdea3j4
Analysis, evaluation and comparison of knowledge extraction tools in the Environmental and Health domain. A holistic approach
[chapter]
2022
Knowledge Organization and Management in the Domain of Environment and Earth Observation (KOMEEO)
A recent reappraisal of the project design recognised the potential of causality for modelling and matching problems. This paper proposes a design compatible with the crowdsourced classification. ...
The architecture combines the higher-level cognition of humans and their powers of language, abstraction, of inference and analogy, with the storage and processing power of computers. ...
The FITS file format for the long-term preservation of digital objects ...e Wells, Donald C., and Eric W. Greisen. 1979 ...
doi:10.5771/9783956508752-121
fatcat:oyci76cggfathbabmg46l3kfyy
MRD Hashing
[chapter]
1998
Lecture Notes in Computer Science
The goal is to strike a balance between providing a universal service and maintaining enough revenue to cover the costs of publication. ...
We place an electronic version of this journal in the public domain one year after publication. ...
The increase of pseudorandomness in a Luby-Racko model of a Feistel cipher with the number of rounds is studied in this paper, both qualitatively and quantitatively. ...
doi:10.1007/3-540-69710-1_10
fatcat:mezaspbmk5c4nhu227gayoeejq
Crowdsourcing classification and causality to power a search-and-innovation engine
[chapter]
2022
Knowledge Organization and Management in the Domain of Environment and Earth Observation (KOMEEO)
A recent reappraisal of the project design recognised the potential of causality for modelling and matching problems. This paper proposes a design compatible with the crowdsourced classification. ...
The architecture combines the higher-level cognition of humans and their powers of language, abstraction, of inference and analogy, with the storage and processing power of computers. ...
The FITS file format for the long-term preservation of digital objects ...e Wells, Donald C., and Eric W. Greisen. 1979 ...
doi:10.5771/9783956508752-13
fatcat:a243zpohn5aq7cgdlnui46p2sy
Using complexity to protect elections
2010
Communications of the ACM
Serdar Tasiran (stasiran@ku.edu.tr), Koç university, Istanbul, turkey. ...
WYSIWYG editing through the browser. ...
"Each of these lie tests improves the chances of detecting potential malware, but none of them can prove that no malware exists," says IBM researcher Klaus Julisch. ...
doi:10.1145/1839676.1839696
fatcat:hbqpm5boabe3jcpa4jcs7czf6y
« Previous
Showing results 1 — 15 out of 42 results