Filters








3,548 Hits in 11.9 sec

Knowing who to watch: Identifying attackers whose actions are hidden within false alarms and background noise

Howard Chivers, John A. Clark, Philip Nobles, Siraj A. Shaikh, Hao Chen
2010 Information Systems Frontiers  
Article: Chivers, Howard Robert orcid.org/0000-0001-7057-9650, Clark, John Andrew orcid.org/0000-0002-9230-9739, Nobles, Philip et al. (2 more authors) (2010) Knowing Who to Watch : Efficiently Identifying  ...  Subtle Attackers.  ...  (will be inserted by the editor) Knowing Who to Watch: Identifying attackers whose actions are hidden within false alarms and background noise Howard Chivers · John A.  ... 
doi:10.1007/s10796-010-9268-7 fatcat:lrubrnjom5gurobk7jgxhjxwh4

Connecting the Dots of Sensitive Terrorism Information for Homeland Security

Ugochukwu Onwudebelu, Jackson Akpojaro
2014 Transactions on Machine Learning and Artificial Intelligence  
As we are seeing, one of the major concerns of many nations today is to identify and foil terrorist attacks emanating from different angles.  ...  As society becomes more and more dependent on information and as criminals are increasing their cyber activities in their daily life, it becomes necessary to connect their dots together to track them in  ...  Attacks on borders as well as transportation are increasing in alarming rate recently. Thus, there are so many discussions that are related to securing the borders and transportation industry.  ... 
doi:10.14738/tmlai.23.220 fatcat:nngxxxy7jjenrnzo3zrtdi7ht4

A Blind Video Watermarking Algorithm for Copyright Protection based on Dual Tree Complex Wavelet Transform

P. Senatore, Alessandro Piva, Fabio Garzia, Roberto Cusani
2016 Journal of Information Hiding and Multimedia Signal Processing  
This scheme is also robust to downscaling in resolution, noise addition, geometric attacks (such as upscaling and cropping), compression, watermark estimation, temporal frame averaging, multiple watermark  ...  DVDs and Blu-rays are among the most frequent victims of video content counterfeiting. Primarily, illegal distribution of movies on Internet is a growing menace to film industry.  ...  In addition, an attacker could also make the calculation of the NCC within a frame, but this will not allow anyway to discover the exact pattern of the watermark, that remains hidden to potential attackers  ... 
dblp:journals/jihmsp/SenatorePGC16 fatcat:nyo6cxyebbf7thgsd34dgrfh4e

Surveying Port Scans and Their Detection Methodologies

M. H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita
2011 Computer journal  
However, it is also useful for system administrators and other network defenders to detect port scans as possible preliminaries to more serious attacks.  ...  An attacker performs port scans of IP addresses to find vulnerable hosts to compromise.  ...  Authors are thankful to DIT for funding the project. The authors also thank the esteemed reviewers for their extensive comments on the final draft of the article.  ... 
doi:10.1093/comjnl/bxr035 fatcat:knlumcfv3rgpbc2lakgu3e4kie

The role of biometric applications in air transport security

Smilja Teodorovic
2016 Nauka bezbednost policija  
As the number of air passengers continues to increase worldwide, so do the security demands and challenges in the air transport industry, particularly in lieu of numerous recent terrorist attacks.  ...  The intent of this review is to familiarize readers with biometric tools aimed at establishing and maintaining high security at airports and during flight, as well as to point out promising emerging biometric  ...  TR34019 and the EU Commission project AREA, Contract No. 316004.  ... 
doi:10.5937/nbp1602139t fatcat:ite5lnqeurh37aaopfatk3go5u

Understanding the Detection of View Fraud in Video Content Portals [article]

Miriam Marciel and Ruben Cuevas and Albert Banchs and Roberto Gonzalez and Stefano Traverso and Mohamed Ahmed and Arturo Azcorra
2015 arXiv   pre-print
This means that views identified as fake and discounted from the public view counter are still monetized.  ...  We speculate that even though YouTube's policy puts in lots of effort to compensate users after an attack is discovered, this practice places the burden of the risk on the advertisers, who pay to get their  ...  So as to reduce background noise resulting from real users stumbling upon the videos, the names and descriptions of all experiment videos are set to random hashes, and all external links to them are removed  ... 
arXiv:1507.08874v1 fatcat:c7vpyisycbe3dcn6artjngsyxy

Enabling Video Privacy through Computer Vision

A. Senior, S. Pankanti, A. Hampapur, L. Brown, Ying-Li Tian, A. Ekin, J. Connell, Chiao Fe Shu, M. Lu
2005 IEEE Security and Privacy  
The paper presents a review of privacy in video surveillance and describes how a computer vision approach to understanding the video can be used to represent "just enough" of the information contained  ...  in a video stream to allow video-based tasks (including both surveillance and other "person aware" applications) to be accomplished, while hiding superfluous details, particularly identity, that can contain  ...  ) and false alarm.  ... 
doi:10.1109/msp.2005.65 fatcat:yjxflptaznblvoqm2vpdogqche

CSI:DeSpy

Muhammad Salman, Nguyen Dao, Uichin Lee, Youngtae Noh
2022 Proceedings of the ACM on Interactive Mobile Wearable and Ubiquitous Technologies  
These requirements cause considerable discomfort to the user and limit the practicability of prevalent solutions.  ...  For example, a user needs to carry a smartphone and laboriously perform preset motions (e.g., jumping, waving, and preplanned walking pattern) for synchronous sensing of acceleration signals.  ...  Less than 2 seconds leads to a higher false alarm rate due to the errors caused by the noise in video bitrate measurement.  ... 
doi:10.1145/3534593 fatcat:nvc2xiccsvhptoga6q6gawx6rm

Before, Now, and After the Event of Terror: Situational Terror Awareness for Civilians in US Homeland Security

Kerrin-Sina Arfsten
2019 European Journal for Security Research  
To protect themselves and their communities from harm and ensure an uninterrupted "way of life," citizens are routinely encouraged to be vigilant and aware to signs of potential terror as they attend to  ...  They are asked to stay informed, remain alert, and be ready to respond to the incipiency of terror so that they may avert-or, at least mitigate-its potentially catastrophic and disruptive consequences.  ...  reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.  ... 
doi:10.1007/s41125-019-00054-9 fatcat:vxc4qxkgsvdmxj4hk2szqnlzja

Combatting Bioterrorism [chapter]

Dean A. Wilkening
2008 Encyclopedia of Violence, Peace, & Conflict  
As a rule, using two or more different detection technologies, with uncorrelated noise and background signals, reduces the false alarm rate considerably.  ...  Attack detection and identification Two issues are important with respect to detecting a bioterrorism event: low false alarm rate and speed.  ... 
doi:10.1016/b978-012373985-8.00223-3 fatcat:6zil53gsmvcybnlo6atny7fury

Unsolved Problems in ML Safety [article]

Dan Hendrycks and Nicholas Carlini and John Schulman and Jacob Steinhardt
2022 arXiv   pre-print
Machine learning (ML) systems are rapidly increasing in size, are acquiring new capabilities, and are increasingly deployed in high-stakes settings.  ...  In response to emerging safety challenges in ML, such as those introduced by recent large-scale models, we provide a new roadmap for ML Safety and refine the technical problems that the field needs to  ...  Acknowledgements We would like to thank Sidney Hough, Owain Evans, Collin Burns, Alex Tamkin, Mantas Mazeika, Kevin Liu, Jonathan Uesato, Steven Basart, Henry Zhu, D.  ... 
arXiv:2109.13916v5 fatcat:ikvd6xtehnctzbq4ruoxme46pu

"CNN with Secrets:" 9/11, the CIA, and the Organizational Roots of Failure

Amy B. Zegart
2007 The international journal of intelligence and counter intelligence  
It determines who performs which tasks by what authority and level of competence; who answers to whom; whose memo goes on top; and what formal powers organizational leaders have.  ...  distinguish these warnings from all of the background noise. 61 As Bruce Berkowitz writes, ''This problem of signal-to-noise ratio is so fundamental in the intelligence business that today, if one refers  ... 
doi:10.1080/08850600600888581 fatcat:fw4glpqf7vbsznwnfgerrgq24q

Understanding the Detection of View Fraud in Video Content Portals

Miriam Marciel, Rubén Cuevas, Albert Banchs, Roberto González, Stefano Traverso, Mohamed Ahmed, Arturo Azcorra
2016 Proceedings of the 25th International Conference on World Wide Web - WWW '16  
This means that views identified as fake and discounted from the public view counter are still monetized.  ...  We speculate that even though YouTube's policy puts in lots of effort to compensate users after an attack is discovered, this practice places the burden of the risk on the advertisers, who pay to get their  ...  Acknowledgments This work has been partially supported by the European Union through the FP7 METRICS (607728), H2020 TYPES (653449) and ReCRED(653417) Projects, the Spanish Ministry of Economy and Competitiveness  ... 
doi:10.1145/2872427.2882980 dblp:conf/www/MarcielCBGTAA16 fatcat:nk7tklo2nrcifige5bqpzjttpe

Anti- Forensics: The Tampering of Media

Nour Mohammad, Hasan Fayyad-Kazan, Mohamad Saab
2020 International Journal on Recent and Innovation Trends in Computing and Communication  
We proved that along with the forensic analysis, digital processing, enhancement and authentication via forgery detection algorithms to testify the integrity of the content and the respective source of  ...  This modern shift has allowed the law enforcement to better reconstruct the crime scenes or reveal the truth of any critical event.In this paper we shed the light on the role of video, audio and photos  ...  Last but not least, a profound sense of grace to my precious family whose love and support are always with me in whatever I pursue to provide me with an unending inspiration.  ... 
doi:10.17762/ijritcc.v8i10.5447 fatcat:4ggvkhiqkbgkloqqli3627kqjm

Rescuing Collective Wisdom when the Average Group Opinion Is Wrong

Andres Laan, Gabriel Madirolas, Gonzalo G. de Polavieja
2017 Frontiers in Robotics and AI  
Yet the collective knowledge will remain inaccessible to us unless we are able to find efficient knowledge aggregation methods that produce reliable decisions based on the behavior or opinions of the collective's  ...  The total knowledge contained within a collective supersedes the knowledge of even its most intelligent member.  ...  FUNDING We acknowledge funding from the Champalimaud Foundation (to GP) and from Fundaçao para a Ciência e Tecnologia PTDC/NEU-SCC/0948/2014 (to GP) and FCT fellowship (to AL).  ... 
doi:10.3389/frobt.2017.00056 fatcat:zhqjnn3gmbemplunkycurxyhw4
« Previous Showing results 1 — 15 out of 3,548 results