Filters








36 Hits in 11.4 sec

A smart spy robot charged and controlled by wireless systems

M. Balakrishnan, S. Gowthaman, S.P. Jaya Kumaran, G. Rathana Sabhapathy
2015 2015 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)  
A nRF401 Controlled S py Robot is an Arduino Uno based robot that can be monitored and controlled by a remote using a single-chip radio transceiver.  ...  The Wireless Network Camera mounted on the robot can also be displayed on any other Android device for monitoring.  ...  Fig.3 Wireless Camera The Wireless Network Camera, also known as Wi-Fi IP Camera, is used in this system to stream videos live to any mobile device, including Android and iOS devices, using Wi-Fi network  ... 
doi:10.1109/iciiecs.2015.7193096 fatcat:l42ok5vpn5dgxoqr22ua2xg53q

A State of the Art of Drowning Death Detection and Prevention Systems with Various Communication Technologies and Discussion on their Performance

Pillalamarri Laxman
2021 Zenodo  
Pool, Image Processing, Image Processing Technique, Drowning Accident, Drowning Detection System, Drowning Prevention System, Waterside Monitoring System, Drowning Detection, Portable Bather Monitoring Device  ...  Controlled By Android G Sensors P Annapurna Bai 1 , S.P.  ...  BasavarajaBanakara 196 197 ICSMEC-2020/0310 Live Video Streaming FOR Boarder Security 1.Sowmya Dokkupalli 2. JyothirmayeeKilladi 3.  ... 
doi:10.5281/zenodo.4632810 fatcat:t36jm3mstzgwbbwgyr6yspozqu

Malware Analysis in IoT & Android Systems with Defensive Mechanism

Chandra Shekhar Yadav, Jagendra Singh, Aruna Yadav, Himansu Sekhar Pattanayak, Ravindra Kumar, Arfat Ahmad Khan, Mohd Anul Haq, Ahmed Alhussen, Sultan Alharby
2022 Electronics  
Due to the escalated growth of Android devices, users are facing cybercrime through their Android devices. This article aims to provide a comprehensive study of the IoT and Android systems.  ...  Android devices connect to different IoT devices such as IoT-enabled cameras, Alexa powered by Amazon, and various other sensors.  ...  Related Work Modern IoT and IIoT devices are controlled and monitored by Android devices.  ... 
doi:10.3390/electronics11152354 fatcat:saf2a2bb6rdznkbgdukxb3s4fe

Brain leaks and consumer neurotechnology

Marcello Ienca, Pim Haselager, Ezekiel J Emanuel
2018 Nature Biotechnology  
By creating malicious audio or video files, attackers could entice a user to preview a song or video on an unpatched Android device.  ...  However, Google was keen to point out that devices with Android 4.0 and higher (approximately 95% of active Android devices), have protection against a buffer overflow attack built-in, using a technology  ...  T Device control settings that prevent and limit the types of USB devices to be used.  ... 
doi:10.1038/nbt.4240 pmid:30188521 fatcat:dwoyvyborfdifdkklju3p3qek4

Study of Peer-to-Peer Network Based Cybercrime Investigation: Application on Botnet Technologies [article]

Mark Scanlon
2017 arXiv   pre-print
A proof of concept tool was developed for conducting investigations on the BitTorrent network.  ...  The scalable, low overhead attributes of Peer-to-Peer (P2P) Internet protocols and networks lend themselves well to being exploited by criminals to execute a large range of cybercrimes.  ...  The software robots, or bots, which form these distributed systems are controlled remotely by the criminal attacker, or botmaster.  ... 
arXiv:1712.03455v1 fatcat:brkwhni6vza2dm7ristaj5gyoa

Anatomy of Threats to The Internet of Things

Imran Makhdoom, Mehran Abolhasan, Justin Lipman, Ren Ping Liu, Wei Ni
2018 IEEE Communications Surveys and Tutorials  
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices.  ...  compromise of devices pose a significant danger to the sustenance of IoT.  ...  In a similar attack, the researchers were able to initiate video and audio streams in a Philips camera.  ... 
doi:10.1109/comst.2018.2874978 fatcat:5qkflaozurb4nctkfrwswnbce4

Online Advertising Security: Issues, Taxonomy, and Future Directions [article]

Zahra Pooranian, Mauro Conti, Hamed Haddadi, Rahim Tafazolli
2021 arXiv   pre-print
It provides a simple and efficient way for advertisers to display their advertisements to specific individual users, and over the last couple of years has contributed to an explosion in the income stream  ...  Motivated by these considerations, this paper presents a comprehensive review of the security threats to online advertising systems.  ...  To build a botnet, a botmaster (an entity that controls the botnet remotely) needs a network of software robots -i.e., bots -that are run independently and automatically.  ... 
arXiv:2006.03986v4 fatcat:vyxorsmo4rgdllv7lmntc5bv7i

Artificial Intelligence [article]

John Paul Mueller Luca Massaron
2018 Zenodo  
A major part of the problem is that movies, television shows, and books have all conspired to give false hopes as to what AI will accomplish.  ...  Humans remotely control some robots, as with the da Vinci robot discussed in the "Assisting a surgeon" section of Chapter 7.  ...  (Reacting after hitting a wall isn't sufficient.) Pathfinding is also useful when moving any other device to a target in space, even a virtual one, such as in a video game or web pages.  ... 
doi:10.5281/zenodo.5599660 fatcat:rn6nyx5xinehzpwfy3knurtzgy

The Role of Social Movements, Coalitions, and Workers in Resisting Harmful Artificial Intelligence and Contributing to the Development of Responsible AI [article]

Susan von Struensee
2021 arXiv   pre-print
video-streaming service.  ...  are given some control over what happens to the video after their assessment.  ... 
arXiv:2107.14052v1 fatcat:etqo64ksjzaihmt4kr7b6auxiu

Cyber-Physical Systems Security: Limitations, Issues and Future Trends

Jean-Paul A. Yaacoub, Ola Salman, Hassan N. Noura, Nesrine Kaaniche, Ali Chehab, Mohamad Malli
2020 Microprocessors and microsystems  
Their integration with IoT led to a new CPS aspect, the Internet of Cyber-Physical Things (IoCPT).  ...  The fast and significant evolution of CPS affects various aspects in people's way of life and enables a wider range of services and applications including e-Health, smart homes, e-Commerce, etc.  ...  digital computers that control the manufacturing processes such as robotic devices performance and/or fault diagnosis processing; hence achieving better flexibility and resiliency. • Distributed Control  ... 
doi:10.1016/j.micpro.2020.103201 pmid:32834204 pmcid:PMC7340599 fatcat:omeihta4vbe55cohyhbhi56mzm

Jeffrey Edmonds/Samuel Bendett/Anya Fink/Mary Chesnut/Dmitry Gorenburg/Michael Kofman/Kasey Stricklin/Julian Waller: Artificial Intelligence and Autonomy in Russia. Arlington, VA: Center for Naval Analyses (CNA), Mai 2021

Artiom Hildebrandt
2021 SIRIUS - Zeitschrift für Strategische Analysen  
This report provides a comprehensive overview of the current state of civilian and military artificial intelligence in Russia, examining all relevant sectors, key institutions, and trends.  ...  Distribution DISTRIBUTION STATEMENT A. Approved for public release: distribution unlimited. 5/12/2021 This work was performed under Federal Government Contract No. N00014-16-D-5003.  ...  But a person will set the task and [retain] control of the actions of robots. 309 2021, Gen.  ... 
doi:10.1515/sirius-2021-4014 fatcat:kebmdg2gmfellh37sljf26sqcm

Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security

Robert Chesney, Danielle Keats Citron
2018 Social Science Research Network  
This capability makes it possible to create audio and video of real people saying and doing things they never said or did.  ...  We survey a broad array of responses, including: the role of technological solutions; criminal penalties, civil liability, and regulatory action; military and covert-action responses; economic sanctions  ...  Android devices).142.  ... 
doi:10.2139/ssrn.3213954 fatcat:njtauzwpdzb4hp5kd3qd4yrp4i

Information politics: liberation and exploitation in the digital society

2015 ChoiceReviews  
can form a stream of new information from recursions.  ...  the corporate control of devices.  ... 
doi:10.5860/choice.192748 fatcat:5pg4tuexzjastgaw5eawzzwzfa

Law, Virtual Reality, and Augmented Reality

Mark A. Lemley, Eugene Volokh
2017 Social Science Research Network  
Burglary sounds more serious-and more tractable-than spying on a VR conversation, even if the spying might in the long run be more harmful.  ...  (For a dark example, think Westworld, but without the difficulty of creating physical robots.)  ... 
doi:10.2139/ssrn.2933867 fatcat:orx2ivdj5nbave32wstfb65gpq

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

R.V. Gundur, Michael Levi, Volkan Topalli, Marie Ouellet, Maria Stolyarova, Lennon Yao-Chung Chang, Diego Domínguez Mejía
2021 CrimRxiv  
Acknowledgements This work was supported by the UK Home Office through a National Cyber Security Programme research grant. Research assistance was provided by Tessa Cole and David Flint.  ...  Criminals choose to target Android devices because it is easier to compromise them than iOS devices and because most users in Russia access mobile applications on the Android platform (68%) (BI.ZONE 2019  ...  A trojan can also help a criminal to establish control over a device and to get the victim's banking and personal details.  ... 
doi:10.21428/cb6ab371.5f335e6f fatcat:vmrt7shntreqbg2z5mgysr5anq
« Previous Showing results 1 — 15 out of 36 results