Filters








29,291 Hits in 3.2 sec

Network Structure Inference, A Survey: Motivations, Methods, and Applications [article]

Ivan Brugere and Brian Gallagher and Tanya Y. Berger-Wolf
2018 arXiv   pre-print
Existing approaches for inferring networks from data are found across many application domains and use specialized knowledge to infer and measure the quality of inferred network for a specific task or  ...  In this survey, we examine (1) how network representations are constructed from underlying data, (2) the variety of questions and tasks on these representations over several domains, and (3) validation  ...  For example, a social network defined via thresholding on who-calls-whom call record data is more interpretable than a linear regression on node feature vectors.  ... 
arXiv:1610.00782v4 fatcat:neu7tyamijhixbjv6rasksyasu

Visualizing criminal networks reconstructed from mobile phone records [article]

Emilio Ferrara, Pasquale De Meo, Salvatore Catanese, Giacomo Fiumara
2014 arXiv   pre-print
In this paper we show how we employ some interactive visualization techniques to represent criminal and terrorist networks reconstructed from phone traffic data, namely foci, fisheye and geo-mapping network  ...  networks, surveillance data, interview data, experiential police data, and police intelligence files, to acquire knowledge about criminal networks and initiate accurate and destabilizing actions.  ...  reconstructed from phone call records.  ... 
arXiv:1407.2837v1 fatcat:slbcn6pydjctlgzgbj434t6fzi

Uncovering Criminal Behavior with Computational Tools [chapter]

Emilio Ferrara, Salvatore Catanese, Giacomo Fiumara
2015 Social Phenomena  
We present some usecases inspired by real-world criminal investigations where we used LogViewer to study criminal networks reconstructed from mobile phone and social interactions to identify criminal behaviors  ...  To this aim, we present LogViewer, a Web framework we developed to allow network analysts to study combinations of geo-embedded and time-varying data sources like mobile phone networks and social graphs  ...  Let us use the example of data representing a mobile phone call network -the analysis of other sources, such as social network data, follows straightforwardly.  ... 
doi:10.1007/978-3-319-14011-7_10 fatcat:gqaxvkorejfuxikh4tzd6ffzhi

A Unified Forensic Framework for Data Identification and Collection in Mobile Cloud Social Network Applications

Muhammad Faheem, Dr Tahar, Dr An
2016 International Journal of Advanced Computer Science and Applications  
The ClouDroid Inspector (CDI) tool uses of the record traced by forensic logging module and conduct the investigation in both the mobile and the cloud.  ...  The MCFF identifies and collects the automated synchronized copies of data on both the mobile and cloud environment to prove and establish the use of cloud service via Smartphones.  ...  using a tool called ClouDroid Inspector (CDI).  ... 
doi:10.14569/ijacsa.2016.070103 fatcat:swbcatuo5jhf7drne7tof6cnvm

Real-time payments for mobile IP

H. Tewari, D. O'Mahony
2003 IEEE Communications Magazine  
mobile nodes.  ...  The Mobile IP protocol has evolved from providing mobility support for portable computers to support for wireless handheld devices with high mobility patterns.  ...  CALL DELIVERY: DATA From time to time a nodc may wish to contact other fixed nodes in the core network, such as a Web server or a VASP.  ... 
doi:10.1109/mcom.2003.1179561 fatcat:nvkfw4znxbd3jltbgpbetri3ki

Mobile Phone Assessment in Egocentric Networks: A Pilot Study on Gay Men and Their Peers

W. Scott Comulada
2014 Connections  
Mobile phone-based data collection encompasses the richness of social network research. Both individual-level and network-level measures can be recorded.  ...  In particular, benefits and challenges to mobile phone-based data collection are highlighted through our mobile phone-based pilot study that was conducted on egocentric networks of 12 gay men (n = 44 total  ...  Mobile phone-based data collection was supported by ohmage and the following centers at the University of California, Los Angeles: the Center for Embedded Networked Sensing and Mobilize Labs.  ... 
doi:10.17266/34.1.4 pmid:25844003 pmcid:PMC4380161 fatcat:v5eetq32ajc2lbb4jroeweufzq

Forensic Analysis of WhatsApp SQLite Databases on the Unrooted Android Phones

Hasan Fayyad-Kazan, Sondos Kassem-Moussa, Hussin J. Hejase, Ale J. Hejase
2022 HighTech and Innovation Journal  
and video calls.  ...  In the results obtained, it is shown how to reconstruct the list of contacts, the history of exchanged textual and non-textual messages, as well as the details of their contents.  ...  WhatsApp allows users to place voice and videos calls through the mobile broadband network or the Wi-Fi.  ... 
doi:10.28991/hij-2022-03-02-06 fatcat:3otx3pxogvamta6t7q75h6ic6e

Delay tolerant network on smartphones

Hervé Ntareme, Marco Zennaro, Björn Pehrson
2011 Proceedings of the 3rd Extreme Conference on Communication The Amazon Expedition - ExtremeCom '11  
It allows the use of Android phones for the physical transport of data between network nodes in areas where there are no other links available, or where existing links need to be avoided for security reasons  ...  This paper discusses the Delay Tolerant Network (DTN) service and protocol stack and presents an implementation of it on the Android platform that is called "Bytewalla".  ...  Domain Name Service: Bind9 Figure 7 : Architecture of the SSA application The SSA consists of "SSA send" and "SSA receive" applications which are used to send and receive the records.  ... 
doi:10.1145/2414393.2414407 fatcat:lleukc5vpbc2rcq4grixiqhn6u

An empirical study of the performance, security and privacy implications of domain name prefetching

Srinivas Krishnan, Fabian Monrose
2011 2011 IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN)  
In this paper, we present a large-scale evaluation of this practice using data collected over the span of several months, and show that it leads to noticeable increases in load on name servers-with questionable  ...  We also show that the adoption of domain name prefetching raises privacy issues.  ...  The MoU covers specific uses and types of networking data, as well as conditions for securing and accessing such data.  ... 
doi:10.1109/dsn.2011.5958207 dblp:conf/dsn/KrishnanM11 fatcat:5elzkgexr5ednezdljqo2vald4

Scalable Mobile Multimedia Group Conferencing Based on SIP Initiated SSM

Thomas Schmidt, Matthias Wahlisch, Hans Cycon, Mark Palkow
2007 Fourth European Conference on Universal Multiservice Networks (ECUMN'07)  
The Internet uniquely provides the benet of scalable, dynamic group communication services, vitally aiding commonly limited mobile terminals.  ...  Multimedia group communication emerges to focal interest at mobile devices, enriching voice or video conferencing and complex collaborative environments.  ...  We introduced, discussed and analyzed signalling extensions of SIP and routing methods to adapt SSM to source mobility.  ... 
doi:10.1109/ecumn.2007.46 dblp:conf/ecumn/SchmidtWCP07 fatcat:z35hhrgkfvee7av3j6zoiogexm

One-Class Classifiers: A Review and Analysis of Suitability in the Context of Mobile-Masquerader Detection

Oleksiy Mazhelis
2007 ARIMA  
In particular, their use is justified in mobile-masquerader detection, where user characteristics are classified as belonging to the legitimate user class or to the impostor class, and where collecting  ...  the data originated from impostors is problematic.  ...  The author would like to acknowledge the Context project for the implementation of the ContextPhone platform and making available the dataset on mobile context and communication, and would like to thank  ... 
doi:10.46298/arima.1877 fatcat:kw72uwrxbncdxistoowk4yokuq

iShield: A Framework for Preserving Privacy of iOS App User

Arpita Jadhav Bhatt, Chetna Gupta, Sangeeta Mittal
2019 Journal of Cyber Security and Mobility  
However, a comprehensive framework to enable privacy preserving data sharing by apps has not been found.  ...  Some methods have been proposed to preserve user's privacy of specific data like location and health information.  ...  Now this data can be sent from the app over the network. User attributes can be reconstructed at receivers' side by using Equation 7 [21] .  ... 
doi:10.13052/2245-1439.845 fatcat:subym6a6c5dibao6amndrh3dcy

Authentication of mobile users

R. Molva, D. Samfat, G. Tsudik
1994 IEEE Network  
The protocols described herein can be applied in di erent mobile-user environments including wireless networks and mobile user services on traditional wireline networks.  ...  In this paper, we propose a solution for authenticating mobile users in remote domains that maintains the domain separation property.  ...  No gender implication. 3 The term foreign is used to denote a network domain other than the home domain country is used in the traditional, geopolitical sense.  ... 
doi:10.1109/65.272938 fatcat:mkjqaj4wljbx3f4s2oxvt23jha

An Intelligent Software Workflow Process Design for Location Management on Mobile Devices [article]

N.Mallikharjuna Rao
2012 arXiv   pre-print
For improving more flexibility on mobile device, the new challenges in designing software systems for mobile networks include location and mobility management, channel allocation, power saving and security  ...  Advances in the technologies of networking, wireless communication and trimness of computers lead to the rapid development in mobile communication infrastructure, and have drastically changed information  ...  A Mobile-wireless network is a radio network distributed over land areas called cells, each served by at least one fixed-location transceiver known as a cell site or base station.  ... 
arXiv:1204.1597v1 fatcat:jdye4wqgdbgkheesa4cfy24fbm

iShield: A Framework for Preserving Privacyof iOS App User

Arpita Jadhav Bhatt, Chetna Gupta, Sangeeta Mittal, Department of Computer Science & IT, Jaypee Institute of Information Technology, Noida, India, Department of Computer Science & IT, Jaypee Institute of Information Technology, Noida, India, Department of Computer Science & IT, Jaypee Institute of Information Technology, Noida, India
2019 Journal of Cyber Security and Mobility  
However, a comprehensive framework to enable privacy preserving data sharing by apps has not been found.  ...  Some methods have been proposed to preserve user's privacy of specific data like location and health information.  ...  videos Cellular data Collecting cellular information, remote numbers connected on call, internet connectivity, call duration Address Book Collecting user's contact list, contact's personal information  ... 
doi:10.13052/jcsm2245-1439.845 fatcat:n3vhn2o5lzc4ragixydmdwddp4
« Previous Showing results 1 — 15 out of 29,291 results