Filters








42 Hits in 7.3 sec

A Survey on Security for Mobile Devices

Mariantonietta La Polla, Fabio Martinelli, Daniele Sgandurra
2013 IEEE Communications Surveys and Tutorials  
Therefore, smartphones may now represent an ideal target for malware writers.  ...  We group existing approaches aimed at protecting mobile devices against these classes of attacks into different categories, based upon the detection principles, architectures, collected data and operating  ...  ACKNOWLEDGEMENT The authors would like to thank the anonymous reviewers for their valuable comments and suggestions, which have greatly improved the quality of the paper.  ... 
doi:10.1109/surv.2012.013012.00028 fatcat:us2g2qlglrflporo6fp6vqbdn4

Brain leaks and consumer neurotechnology

Marcello Ienca, Pim Haselager, Ezekiel J Emanuel
2018 Nature Biotechnology  
data T Not using unsecure networks when accessing sensitive data For organizations to remain vigilant by: T Deploying email encryption where possible T Ensuring that email is scanned for malware, spam  ...  For example, malware authors started to obfuscate code to bypass signature-based security software.  ...  T Browser protection for avoiding obfuscated web-based attacks.  ... 
doi:10.1038/nbt.4240 pmid:30188521 fatcat:dwoyvyborfdifdkklju3p3qek4

A New Approach to Malware Detection [chapter]

Hongying Tang, Bo Zhu, Kui Ren
2009 Lecture Notes in Computer Science  
like to thank a lot of people who have helped me in this thesis and in my studies in Concordia University. First of all, I would like to thank my supervisor, Dr.  ...  He studied with me in my office every weekend without any complaint. During that time, I was so busy that I had no time to cook food for him.  ...  Appendix A Source Code of Amb  ... 
doi:10.1007/978-3-642-02617-1_24 fatcat:lqjndc4wzzhtjbnrpgi3wxy2c4

Utilization Data Mining to Detect Spyware

Parisa Bahraminikoo
2012 IOSR Journal of Computer Engineering  
Malicious software (malware) is any software that gives partial to full control of your computer to do whatever the malware creator wants.  ...  With the development of malware detection systems and Artificial Intelligence, as a new technology for them, Artificial Intelligence has been applied in anti-virus engines.  ...  Acknowledgement We would to thank the anonymous referee for helpful Comments Distributed Path Computation Using DIV Algorithm www.iosrjournals.org The security of the Ad Hoc network routing protocols is  ... 
doi:10.9790/0661-0430104 fatcat:syohb2g2lzhznpjjvbsxqgwlca

Privacy in Sensor-Driven Human Data Collection: A Guide for Practitioners [article]

Arkadiusz Stopczynski, Riccardo Pietri, Alex Pentland, David Lazer, Sune Lehmann
2014 arXiv   pre-print
This development has been partially driven by individuals posting and storing data about themselves and friends using online social networks or collecting their data for self-tracking purposes (quantified-self  ...  Across the sciences, researchers conduct studies collecting data with an unprecedented resolution and scale.  ...  Even encrypted content can disclose information to malicious users, for example when the traffic flow is observed.  ... 
arXiv:1403.5299v1 fatcat:4l5pk7l66jcobdmxjb7a3hpdtu

Comparison Four Different Probability Sampling Methods based on Differential Evolution Algorithm

Qingbo Lu, Xueliang Zhang, Shuhua Wen, Guosheng Lan
2012 Journal of Advances in Information Technology  
In this paper, segmentation problems in medical imaging modalities especially for lung CT as well as for thyroid ultrasound (US) are discussed along with their comparative results are shown using automatic  ...  The current studies almost are based on the simple random sampling method, and so this paper investigates other probability sampling methods, and proposed three novel differential evolution algorithms.  ...  ACKNOWLEDGMENT The authors wish to thank management of Goel Group of Institutions, Lucknow for providing sponsorship in this endeavor.  ... 
doi:10.4304/jait.3.4.206-214 fatcat:lt35ulkqwfbbbikn6xtlfhcoty

Unit commitment considering multiple charging and discharging scenarios of plug-in electric vehicles

Zhile Yang, Kang Li, Qun Niu, Aoife Foley
2015 2015 International Joint Conference on Neural Networks (IJCNN)  
for neuroimaging studies of reward processing: A case study [#15237] Manisha Chawla and Krishna P.  ...  P177 Integration of Articulatory Knowledge and Voicing Features Based on DNN/HMM for Mandarin Speech Recognition [#15184] Tan Ying-Wei, Liu Wen-Ju, Jiang Wei and Zheng Hao P178 Evaluation of Optical Flow  ... 
doi:10.1109/ijcnn.2015.7280446 dblp:conf/ijcnn/YangLNF15 fatcat:6xlakikcfzfyhhm2spooe2j7ra

Organizing Viable Information Security Governance and Management

Kevin Bollengier, Yuri Bobbert
2020 Zenodo  
Hardware assets, networks, servers, employees and even organizations themselves have become targets.  ...  and looking at the organization and its organization of security management and governance as a whole.  ...  However, based on our literature study, case study and dissection of a real-world malware outbreak example, this research ended up with a new vision towards the organization of business information security  ... 
doi:10.5281/zenodo.3960147 fatcat:r3kgcwgevjfmzferpperaeijja

Simulations on Early Warning Malware Identification System Based on Peer to Peer Networks [article]

Charalabos Bountolos, University Of Thessaly, Vasileios Vlachos
2020
The outbreak of malicious activity over the last years due to the rapid spread of the Internet and the emergence of a new generation of rapidly spreading viral software have made insufficient the use of  ...  The problem, in which the thesis is based, is to design and deploy a peer-to-peer network and with the use of epidemiological models to collect significant data results in order to optimize the performance  ...  Specifically, the chosen study of the spread of malware through of the simulations is a key research tool for epidemiologists [72] .  ... 
doi:10.26253/heal.uth.8875 fatcat:xlosvc4rwfchllaqm255cpkgvu

Distributed reinforcement learning for adaptive and robust network intrusion response

Kleanthis Malialis, Sam Devlin, Daniel Kudenko
2015 Connection science  
The increasing adoption of technologies and the exponential growth of networks has made the area of information technology an integral part of our lives, where network security plays a vital role.  ...  One of the most serious threats in the current Internet is posed by distributed denial of service (DDoS) attacks, which target the availability of the victim system.  ...  A flow is defined as "A set of IP packets passing an observation point in the network during a certain time interval. All packets belonging to a particular flow have a set of common properties."  ... 
doi:10.1080/09540091.2015.1031082 fatcat:vzwfb5cclzdqdhwgxzqozxe3xi

Analyzing clinical processes and detecting potential correlation between CKD and air pollution [chapter]

Erika Pasceri, Anna Perri, Giovanna Aracri, Sergio Cinnirella
2022 Knowledge Organization and Management in the Domain of Environment and Earth Observation (KOMEEO)  
A recent reappraisal of the project design recognised the potential of causality for modelling and matching problems. This paper proposes a design compatible with the crowdsourced classification.  ...  The architecture combines the higher-level cognition of humans and their powers of language, abstraction, of inference and analogy, with the storage and processing power of computers.  ...  The FITS file format for the long-term preservation of digital objects ...e Wells, Donald C., and Eric W. Greisen. 1979  ... 
doi:10.5771/9783956508752-99 fatcat:xkycrq4fvjacbb74a2qsdea3j4

Analysis, evaluation and comparison of knowledge extraction tools in the Environmental and Health domain. A holistic approach [chapter]

Anna Rovella, Alexander Murzaku, Eugenio Cesario, Martin Critelli, Armando Bartucci, Francesca M.C. Messiniti
2022 Knowledge Organization and Management in the Domain of Environment and Earth Observation (KOMEEO)  
A recent reappraisal of the project design recognised the potential of causality for modelling and matching problems. This paper proposes a design compatible with the crowdsourced classification.  ...  The architecture combines the higher-level cognition of humans and their powers of language, abstraction, of inference and analogy, with the storage and processing power of computers.  ...  The FITS file format for the long-term preservation of digital objects ...e Wells, Donald C., and Eric W. Greisen. 1979  ... 
doi:10.5771/9783956508752-121 fatcat:oyci76cggfathbabmg46l3kfyy

MRD Hashing [chapter]

Rei Safavi-Naini, Shahram Bakhtiari, Chris Charnes
1998 Lecture Notes in Computer Science  
The goal is to strike a balance between providing a universal service and maintaining enough revenue to cover the costs of publication.  ...  We place an electronic version of this journal in the public domain one year after publication.  ...  The increase of pseudorandomness in a Luby-Racko model of a Feistel cipher with the number of rounds is studied in this paper, both qualitatively and quantitatively.  ... 
doi:10.1007/3-540-69710-1_10 fatcat:mezaspbmk5c4nhu227gayoeejq

Crowdsourcing classification and causality to power a search-and-innovation engine [chapter]

Richard Absalom
2022 Knowledge Organization and Management in the Domain of Environment and Earth Observation (KOMEEO)  
A recent reappraisal of the project design recognised the potential of causality for modelling and matching problems. This paper proposes a design compatible with the crowdsourced classification.  ...  The architecture combines the higher-level cognition of humans and their powers of language, abstraction, of inference and analogy, with the storage and processing power of computers.  ...  The FITS file format for the long-term preservation of digital objects ...e Wells, Donald C., and Eric W. Greisen. 1979  ... 
doi:10.5771/9783956508752-13 fatcat:a243zpohn5aq7cgdlnui46p2sy

Using complexity to protect elections

Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hemaspaandra
2010 Communications of the ACM  
Serdar Tasiran (stasiran@ku.edu.tr), Koç university, Istanbul, turkey.  ...  WYSIWYG editing through the browser.  ...  "Each of these lie tests improves the chances of detecting potential malware, but none of them can prove that no malware exists," says IBM researcher Klaus Julisch.  ... 
doi:10.1145/1839676.1839696 fatcat:hbqpm5boabe3jcpa4jcs7czf6y
« Previous Showing results 1 — 15 out of 42 results