202 Hits in 2.4 sec

Analysing and strengthening OpenWPM's reliability [article]

Benjamin Krumnow, Hugo Jonker, Stefan Karsch
2022 arXiv   pre-print
We measure to what extent fingerprint-based detection is already leveraged against OpenWPM clients on 100,000 sites and observe that it is commonly detected (~14% of front pages).  ...  We analyse (1) detectability of OpenWPM, (2) prevalence of OpenWPM detection, and (3) integrity of OpenWPM's data recording. Our analysis reveals OpenWPM is easily detectable.  ...  surface of web bots.  ... 
arXiv:2205.08890v1 fatcat:exs5nmj6jnfmbk6mmmsbbcms4u

IoT Based Home Security System

Midhuna Subart, Nasiya Y Salim, Dr. Vince Paul
2019 IJARCCE  
Whenever a person come in front of the house the PIR motion detector sensor detect the person and a message will send to the house owner and he can see the person through the camera in front of the house  ...  of any intruder in the house, upon detection an alarm is raised and the owner of the house and notification messages are provided.  ...  Vince Paul of Universal Engineering College. We would also like to thank "Department of Computer Science", Universal engineering College for providing maximum support for our project.  ... 
doi:10.17148/ijarcce.2019.8430 fatcat:wk2cu5grqve6pc6jzyoo2gpoyq

Audio, Speech, Language, Signal Processing for COVID-19: A Comprehensive Overview [article]

Gauri Deshpande, Björn W. Schuller
2020 arXiv   pre-print
Several efforts, from collection of COVID-19 patients' data to screening them for the virus's detection are taken with rigour.  ...  In this paper, we give an overview of the speech and other audio signal, language and general signal processing-based work done using Artificial Intelligence techniques to screen, diagnose, monitor, and  ...  Considering the trauma that the health care providers are going through, a web-based chat-bot named Symptoma developed in [67], is a significant step.  ... 
arXiv:2011.14445v1 fatcat:o2jvifwth5h5zgyoyycrzdemae

Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection [chapter]

Jacopo Corbetta, Luca Invernizzi, Christopher Kruegel, Giovanni Vigna
2014 Lecture Notes in Computer Science  
We envision that this type of heuristics could be a valuable addition to existing detection systems.  ...  To show this, we have implemented a proofof-concept detector that, based solely on a similarity score computed on our metrics, can already achieve a high precision (95%) and a good recall (73%).  ...  Envisioning that these detection methods can complement existing detection tools, we have implemented a proof-of-concept detector based exclusively on these methods to discover online malicious pages.  ... 
doi:10.1007/978-3-319-11379-1_7 fatcat:3s26vljrhncpbcedbmgataa4km

Cloak of Visibility: Detecting When Machines Browse a Different Web

Luca Invernizzi, Kurt Thomas, Alexandros Kapravelos, Oxana Comanescu, Jean-Michel Picod, Elie Bursztein
2016 2016 IEEE Symposium on Security and Privacy (SP)  
These web cloaking techniques hinder the effectiveness of security crawlers and potentially expose Internet users to harmful content.  ...  In this work, we study the spectrum of blackhat cloaking techniques that target browser, network, or contextual cues to detect organic visitors.  ...  Web Cloaking Incentives Web cloaking refers to the set of techniques that a web server uses to fingerprint incoming visitors in order to customize page content.  ... 
doi:10.1109/sp.2016.50 dblp:conf/sp/InvernizziTKCPB16 fatcat:koc4b2yuvzauvak67dopisnkw4


2021 2021 IEEE 12th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)  
BERT Model for Fake News Detection Based on Social Bot Activities in the 03.5 COVID-19 Pandemic 00103  ...  TrackingInformation System: A 07.3 1570773738 Case Study From Mataram District Court 0226 Development of Web Based Online One Stop Platform to  ... 
doi:10.1109/uemcon53757.2021.9666620 fatcat:kf4age44ubbnflwwp3ldepum3e

A Review of the Teaching and Learning on Power Electronics Course

Krismadinata, Kasman Rukun, Yahfizham
2018 2018 International Conference on Applied Information Technology and Innovation (ICAITI)  
of laboratory equipment.  ...  of laboratory equipment.  ...  The authors would like to thank to Universitas Negeri Padang and Universitas Islam Negeri SU Medan, for the permission to publish this paper and colleagues particularly for their support in the process of  ... 
doi:10.1109/icaiti.2018.8686748 fatcat:b5vxrilaubhmzd4ws6ztggtzza

The Threat of Offensive AI to Organizations [article]

Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Deng Gelei, Liu Yang, Xiangyu Zhang, Wenke Lee, Yuval Elovici, Battista Biggio
2021 arXiv   pre-print
In this survey, we explore the threat of offensive AI on organizations.  ...  Although offensive AI has been discussed in the past, there is a need to analyze and understand the threat in the context of organizations.  ...  This material is based upon work supported by the Zuckerman STEM Leadership Program.  ... 
arXiv:2106.15764v1 fatcat:zkfukg4krjcczpie2gbdznwqqi

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin [article]

Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He
2022 arXiv   pre-print
In the end, the paper puts forward our security considerations on the future development of DT-based smart grid.  ...  The survey is expected to help developers break knowledge barriers among smart grid, cybersecurity, and DT, and provide guidelines for future security design of DT-based smart grid.  ...  ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants  ... 
arXiv:2205.11783v1 fatcat:fz43u2e6g5gyfepqz44tezelba

Internet of Things Botnet Detection Approaches: Analysis and Recommendations for Future Research

Majda Wazzan, Daniyal Algazzawi, Omaima Bamasaq, Aiiad Albeshri, Li Cheng
2021 Applied Sciences  
The detection methods have been classified based on the techniques used, and the authors investigated the botnet phases during which detection is accomplished.  ...  This research procedure was used to create a source of foundational knowledge of IoT botnet detection methods.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app11125713 fatcat:d56mns6avfhwtk4rqkwxoomoqi

Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions

Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova
2019 IEEE Access  
By employing a plethora of infected machines (bots), attackers manage to compromise the IoT systems and exploit them.  ...  This trend of augmenting so-called nonintelligent everyday devices with computational capabilities has led to the emergence of the Internet of Things (IoT) domain.  ...  The proposed method relied on an initially detection of outliers by using an unsupervised outlier detector followed by the application of the active-learning-based scheme.  ... 
doi:10.1109/access.2019.2916717 fatcat:a3w7kzvdlvh3hcjqri3uoyqsbu

Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey

Yawei Yue, Shancang Li, Phil Legg, Fuzhong Li, Honghao Gao
2021 Security and Communication Networks  
While IoT brings a number of benefits including convenience and efficiency, it also introduces a number of emerging threats.  ...  The number of IoT devices that may be connected, along with the ad hoc nature of such systems, often exacerbates the situation.  ...  Research on the topic of deep learning-based hardware Trojan detection methods is limited but increasing, with many currently based on simple neural networks as an anomaly detector.  ... 
doi:10.1155/2021/8873195 fatcat:oh4dcicpsfdcvmkfn5z2lgr2lm

NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks [article]

Haoyu Liu, Paul Patras
2022 arXiv   pre-print
of detecting attacks such as XSS and web bruteforce.  ...  This suggests malicious/benign behaviors are largely learned superficially and ML-based Network Intrusion Detection System (NIDS) need revisiting, to be effective in practice.  ...  ACKNOWLEDGMENTS This material is based upon work supported by Arm Ltd and Scotland's Innovation Centre for sensing, imaging and Internet of Things technologies (CENSIS).  ... 
arXiv:2202.09873v2 fatcat:xi23vll74zag3irgyss3seyg3u

The Security of IP-Based Video Surveillance Systems

Naor Kalbo, Yisroel Mirsky, Asaf Shabtai, Yuval Elovici
2020 Sensors  
In this review, we explore the attack surface of modern surveillance systems and enumerate the various ways they can be compromised with real examples.  ...  These IP-based surveillance systems now protect industrial facilities, railways, gas stations, and even one's own home.  ...  The objective of this review is to provide the reader with a deeper understanding of an IP-based Surveillance System's attack surface so that he or she may better understand the attacker's goals and techniques  ... 
doi:10.3390/s20174806 pmid:32858840 fatcat:3fp4iwcbojcszft4iqtkjmmvhq

A State of the Art of Drowning Death Detection and Prevention Systems with Various Communication Technologies and Discussion on their Performance

Pillalamarri Laxman
2021 Zenodo  
Swimming Pool, Image Processing, Image Processing Technique, Drowning Accident, Drowning Detection System, Drowning Prevention System, Waterside Monitoring System, Drowning Detection, Portable Bather Monitoring  ...  We can store the fingerprints of up to 100 users in this project. This module holds two modes of operation (Master mode and User mode).  ...  The microcontroller through the commands given controls the movement of the motors. An Obstacle Detection unit is present in order to detect and alert the user with the help of a buzzer.  ... 
doi:10.5281/zenodo.4632810 fatcat:t36jm3mstzgwbbwgyr6yspozqu
« Previous Showing results 1 — 15 out of 202 results