Filters








4,906 Hits in 6.8 sec

Helping Users Understand Their Web Footprints

Lisa Singh, Elchin Asgarli, Hui Yang, Micah Sherr, Yifang Wei, Andrew Hian-Cheong, Kevin Tian, Janet Zhu, Sicong Zhang, Tavish Vaidya
2015 Proceedings of the 24th International Conference on World Wide Web - WWW '15 Companion  
information exposure detection framework that generates and analyzes the web footprints users leave across the social web.  ...  Evaluation over public profiles from multiple sites shows that our framework successfully detects and quantifies information exposure using a small amount of non-sensitive initial knowledge.  ...  the amount of usable information for web footprint construction.  ... 
doi:10.1145/2740908.2742763 dblp:conf/www/SinghYSWHTZZVA15 fatcat:rj3z3bz3rfenrno64dddtsk52a

Automated human mobility mode detection based on GPS tracking data

Jie Tian, Yongyao Jiang, Yuqi Chen, Wenjun Li, Nan Mu
2014 2014 22nd International Conference on Geoinformatics  
Ancillary GIS layers such as building footprints are also included to help identify the GPS points taken indoor.  ...  The effective and efficient detection of mobility mode from raw GPS data is critically important for social behavior and public health research.  ...  For users, the information helps individuals effectively reflect on their past events and better understand their own life pattern [5] .  ... 
doi:10.1109/geoinformatics.2014.6950833 dblp:conf/geoinformatics/TianJCLM14 fatcat:7rlxjbd7zfg4pkml4skbmbyh6q

D4.12 Fully functional App – Last City

Mirjam Fredriksen, Håvard Vika Røen, Svein Knudsen
2019 Zenodo  
The deliverable is the actual system containing the app and web support system, which is now ready for use.  ...  The GreenAnt gives organizations and people data about THEIR activity, THEIR contribution to emissions of pollutants, THEIR carbon footprint and the possible effects on THEIR health.  ...  The user can select between electric, petrol or diesel car or public transport. This will be used when activity vehicle is detected.  ... 
doi:10.5281/zenodo.3972891 fatcat:yserhmzgkfcjbn2tiae4cdiniu

D4.11 Fully functional App - First City

Mirjam Fredriksen, Svein Knudsen
2019 Zenodo  
The main delivery is the launch of GreenAnt, and the availability for users.  ...  The GreenAnt gives organizations and people data about THEIR activity, THEIR contribution to emissions of pollutants, THEIR carbon footprint and the possible effects on THEIR health.  ...  The user can select between electric, petrol or diesel car or public transport. This will be used when activity vehicle is detected.  ... 
doi:10.5281/zenodo.3972700 fatcat:5tlss3g25rdpja4h4zcspnevxq

Detecting Targeted Attacks By Multilayer Deception

Wei Wang, Jeffrey Bickford, Ilona Murynets, Ramesh Subbaraman, Gokul Singaraju
2013 Journal of Cyber Security and Mobility  
Detecting Targeted Attacks by Multilayer Deception 177 phase, gathering information such as the organization background, resources and individual employees to initially target to launch the attack.  ...  Each layer of penetration brings the attacker closer to the targeted information assets.  ...  Attackers typically leave few network and system level footprints in attempts to evade detection.  ... 
doi:10.13052/jcsm2245-1439.224 fatcat:nhofcrt6fbecjk25wxn63dkyle

Studying Fake News via Network Analysis: Detection and Mitigation [article]

Kai Shu, H. Russell Bernard, Huan Liu
2018 arXiv   pre-print
., news with intentionally false information. Fake news on social media poses significant negative societal effects, and also presents unique challenges.  ...  To tackle the challenges, many existing works exploit various features, from a network perspective, to detect and mitigate fake news.  ...  .: Exploiting tri-relationship for fake news detection. arXiv preprint arXiv: . ( ) . Shu, K., Wang, S., Liu, H.: Understanding user profiles on social media for fake news detection.  ... 
arXiv:1804.10233v1 fatcat:ll2cbfv3tbe7zclik34rrlofem

Cyber Attacks Mitigation: Detecting Malicious Activities in Network Traffic – A Review of Literature

Sangeetha Prabhu, Subramanya Bhat
2020 Zenodo  
To counter cyber-attacks, information security researchers rely extensively on intrusion detection systems (IDSs) that can identify suspicious activities by comparing patterns of documented attacks or  ...  detecting anomaly-based activities.  ...  With an ever-expanding web footprint in all application types, with the increasing use of web pages material for practices such as social media communications, online banking, e-commerce, e-government,  ... 
doi:10.5281/zenodo.3978912 fatcat:u6dcenmygvcjpbtveyc7rbfyl4

Cyber Attacks Mitigation: Detecting Malicious Activities in Network Traffic – A Review of Literature

Sangeetha Prabhu, Subrahmanya Bhat
2020 International journal of case studies in business, IT, and education  
To counter cyber-attacks, information security researchers rely extensively on intrusion detection systems (IDSs) that can identify suspicious activities by comparing patterns of documented attacks or  ...  detecting anomaly-based activities.  ...  With an ever-expanding web footprint in all application types, with the increasing use of web pages material for practices such as social media communications, online banking, e-commerce, e-government,  ... 
doi:10.47992/ijcsbe.2581.6942.0078 fatcat:gts2glb2zrayfcs6zrtotho2de

Surveying Port Scans and Their Detection Methodologies

M. H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita
2011 Computer journal  
We provide a comparison of port scan methods based on type, mode of detection, mechanism used for detection, and other characteristics.  ...  This survey also reports on the available datasets and evaluation criteria for port scan detection approaches.  ...  The authors also thank the esteemed reviewers for their extensive comments on the final draft of the article.  ... 
doi:10.1093/comjnl/bxr035 fatcat:knlumcfv3rgpbc2lakgu3e4kie

Detection and Visualization of Compositionally Similar cis-Regulatory Element Clusters in Orthologous and Coordinately Controlled Genes

A. G. Jegga
2002 Genome Research  
However, detecting and visualizing compositionally similar cis-element clusters in the context of conserved sequences is challenging.  ...  On the basis of analyses of several training data sets, the approach also allows for the detection of similarities in composition and relative arrangement of cis-element clusters within nonorthologous  ...  The publication costs of this article were defrayed in part by payment of page charges.  ... 
doi:10.1101/gr.255002 pmid:12213778 pmcid:PMC186658 fatcat:vowrvhnegbgbvdc5duiifblbny

Machine Learning Research Towards Combating COVID-19: Virus Detection, Spread Prevention, and Medical Assistance [article]

Osama Shahid, Mohammad Nasajpour, Seyedamin Pouriyeh, Reza M. Parizi, Meng Han, Maria Valero, Fangyu Li, Mohammed Aledhari, Quan Z. Sheng
2020 arXiv   pre-print
This conversation can help the user to have a better understanding of his or her situation and gives some hints to users so COVIDx Fine Tuning -ResNet Model Model achieves high accuracy for multi-class  ...  A genome is the complete genetic information that provides the architecture of a virus and knowing the genome for COVID-19 can help in better understanding the transmissibility and infectiousness of the  ... 
arXiv:2010.07036v1 fatcat:r55zllnsmjg5hle2rr2wxixmgq

Android inter-app communication threats and detection techniques

Shweta Bhandari, Wafa Ben Jaballah, Vineeta Jain, Vijay Laxmi, Akka Zemmari, Manoj Singh Gaur, Mohamed Mosbah, Mauro Conti
2017 Computers & security  
Also, there is no compulsion to inform user about the communication.  ...  Academic researchers and commercial anti-malware companies are putting great effort to detect such malicious apps.  ...  Taint analysis detects the set of instructions that are affected by user inputs. It helps in identifying sensitive information leakage.  ... 
doi:10.1016/j.cose.2017.07.002 fatcat:owzn5l7bvrcitix4mlfiabdhee

Exploring spatio-temporal-theme correlation between physical and social streaming data for event detection and pattern interpretation from heterogeneous sensors

Minh-Son Dao, Koji Zettsu, Siripen Pongpaichet, Laleh Jalali, Ramesh Jain
2015 2015 IEEE International Conference on Big Data (Big Data)  
The experimental results show that the proposed method can probably detect the prevalence of asthma risks in a specific spatio-temporal context as well as help users understand how a change in the surrounding  ...  environment (e.g. weather condition and air pollution) can influence their health (e.g. asthma attack) by interpreting detected event's patterns.  ...  Users can interact with the system via social networks to update their profile or feed the system with more information in order to improve the output accuracy.  ... 
doi:10.1109/bigdata.2015.7364069 dblp:conf/bigdataconf/DaoZPJJ15 fatcat:avbgluuaafcu7cuncpnfzbbogm

A Systematic Survey of Attack Detection and Prevention in Connected and Autonomous Vehicles [article]

Trupil Limbasiya, Ko Zheng Teng, Sudipta Chattopadhyay, Jianying Zhou
2022 arXiv   pre-print
such methodologies to detect new and conventional threats and protect the CAV systems from unexpected hazards on the road.  ...  Some surveys have a limited discussion on Attacks Detection and Prevention Systems (ADPS), but such surveys provide only partial coverage of different types of ADPS for CAVs.  ...  We thank LTA colleagues and project team members for their helpful input.  ... 
arXiv:2203.14965v2 fatcat:tsuioooylrfxpmxiyd3frht5s4

Virtual Memory Introspection Framework for Cyber Threat Detection in Virtual Environment

Himanshu Upadhyay, Hardik Gohel, Alexander Pons, Leo Lagos
2018 Advances in Science, Technology and Engineering Systems  
The framework can be enhanced to have self-healing properties: any compromised hosts are immediately replaced by their uncompromised versions, limiting the exposure to the wider enterprise network.  ...  A radical solution for malware detection is neededone which cannot be detected and damaged by malicious code.  ...  The user provides a set of welldefined inputs to the virtualization platform based on predetermined test cases, and captures the kernel data structures information and transfers it to the Data Analytics  ... 
doi:10.25046/aj030104 fatcat:igixghustzhhxn7e37ye5d5ble
« Previous Showing results 1 — 15 out of 4,906 results