Filters








417 Hits in 7.0 sec

Statically Detecting Adversarial Malware through Randomised Chaining [article]

Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue
2021 arXiv   pre-print
With the rapid growth of malware attacks, more antivirus developers consider deploying machine learning technologies into their productions.  ...  Researchers and developers published various machine learning-based detectors with high precision on malware detection in recent years.  ...  In Proceedings of the 28th Annual Computer Security Hao, and Xiaodong Lin. Understanding and detecting mobile ad fraud through Applications Conference, ACSAC ’12, 2012.  ... 
arXiv:2111.14037v2 fatcat:yoeq7huds5ambg2tpvvkgk45zm

Program

2020 2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)  
This study provides users with increased interaction with blockchain virtual pet cats through mobile devices and augmented reality, and adds more interactivity and fun.  ...  Finally, a traffic density estimation method is proposed to estimate the traffic density in accordance with the estimated vehicle speed and the estimated traffic flow.  ...  The user can monitor the output voltage and current through mobile phone immediately. 16:00 An Intelligent Fall Detection Design for Mobile Health-Care Applications Jui-Hung Hsieh, Hui-Lan Zhang and  ... 
doi:10.1109/icce-taiwan49838.2020.9258230 fatcat:g25vw7mzvradxna2grlzp6kgiq

Setting the future of digital and social media marketing research: Perspectives and research propositions

Yogesh K. Dwivedi, Elvira Ismagilova, D. Laurie Hughes, Jamie Carlson, Raffaele Filieri, Jenna Jacobson, Varsha Jain, Heikki Karjaluoto, Hajer Kefi, Anjala S. Krishen, Vikram Kumar, Mohammad M. Rahman (+6 others)
2020 International Journal of Information Management  
, digital content management, mobile marketing and advertising, B2B marketing, electronic word of mouth and ethical issues therein.  ...  A B S T R A C T The use of the internet and social media have changed consumer behavior and the ways in which companies conduct their business.  ...  13) Studies are needed to analyze the role of social media data transparency within ethical organizational practices. 14) Further studies are required on invalid traffic identification and  ... 
doi:10.1016/j.ijinfomgt.2020.102168 fatcat:6gfli73nlnbvrlqqmcwdqbb3qa

Dirty Jobs: The Role of Freelance Labor in Web Service Abuse

Marti Motoyama, Damon McCoy, Kirill Levchenko, Stefan Savage, Geoffrey M. Voelker
2011 USENIX Security Symposium  
We identify the largest classes of abuse work, including account creation, social networking link generation and search engine optimization support, and characterize how pricing and demand have evolved  ...  Using over seven years of data from the popular crowdsourcing site Freelancer.com, as well data from our own active job solicitations, we characterize the labor market involved in service abuse.  ...  This work was supported in part by National Science Foundation grants NSF-0433668 and NSF-0831138, by the Office of Naval Research MURI grant N000140911081, and by generous research, operational and in-kind  ... 
dblp:conf/uss/MotoyamaMLSV11 fatcat:5feca2bxo5bqreyeop52fzusay

Judgment in the case of K.U. v Finland: the European Court of Human Rights requires access to communications data to identify the sender to enable effective criminal prosecution in serious violations of private life

Tuomas Pöysti
2014 Digital Evidence and Electronic Signature Law Review  
Individual digital signature certificates or Organisation digital signature certificates. 30 In the case of digital signature, it is the private key that the subscriber activates to create a digital signature  ...  It is necessary to understand that in attempting to detect fraud, the early cases of a new type of fraud may not be detected for some time.  ...  In this case, the criminals had detected the secret number and thereupon pursued the card holder through Berlin.  ... 
doi:10.14296/deeslr.v6i0.1855 fatcat:alhdynp4nzdc7cwyhu44xlecuy

Big Data: A Survey

Min Chen, Shiwen Mao, Yunhao Liu
2014 Journal on spesial topics in mobile networks and applications  
frauds, errors, and tax difference).  ...  For example, during the acquisition of traffic video, the few video frames that capture the violation of traffic regulations and traffic accidents are more valuable than those only capturing the normal  ... 
doi:10.1007/s11036-013-0489-0 fatcat:lvnmkesqbngc3lgccms3hmm7jq

Using Big Data-machine learning models for diabetes prediction and flight delays analytics

Thérence Nibareke, Jalal Laassiri
2020 Journal of Big Data  
The main contribution of this paper is to give an overview of Big Data tools and machine learning models. We highlight some metrics that allow us to choose a more accurate model.  ...  Further more we analyzed flight delay and produced a dashboard which can help managers of flight companies to have a 360° view of their flights and take strategic decisions.  ...  However, the system needs confidence by making fraud detection a critical factor. Authors presented a Scalable Real-time Fraud Finder (SCARFF).  ... 
doi:10.1186/s40537-020-00355-0 doaj:cced16a888da4ee1ba5257d74e9ffde8 fatcat:zkq6ben46je6niffnghqbxuaiu

Situational Crime Prevention and Its Discontents: Rational Choice and Harm Reduction versus 'Cultural Criminology'

Graham Farrell
2010 Social Policy & Administration  
Some of the many ways SCP applies to expressive and irrational crimes, and how readily they fit into the choice framework, are outlined, and a preliminary critique of Hayward's cultural criminology is  ...  The main thesis was that SCP cannot tackle expressive crimes of anger, hostility and excitement.  ...  '[T]he absence of detailed engagement with classic debates in social anthropology serves to undermine cultural criminology's assertion that the lens of culture provides a critical tool for understanding  ... 
doi:10.1111/j.1467-9515.2009.00699.x fatcat:3bvulevynjc7rgg6tp3khdbxea

Situational Crime Prevention and Its Discontents: Rational Choice and Harm Reduction versus 'Cultural Criminology' [chapter]

Graham Farrell
2017 Crime Opportunity Theories  
Some of the many ways SCP applies to expressive and irrational crimes, and how readily they fit into the choice framework, are outlined, and a preliminary critique of Hayward's cultural criminology is  ...  The main thesis was that SCP cannot tackle expressive crimes of anger, hostility and excitement.  ...  '[T]he absence of detailed engagement with classic debates in social anthropology serves to undermine cultural criminology's assertion that the lens of culture provides a critical tool for understanding  ... 
doi:10.4324/9781315095301-16 fatcat:kvlhizbjszdr5ieu2fv3lzfrna

Enabling Video Privacy through Computer Vision

A. Senior, S. Pankanti, A. Hampapur, L. Brown, Ying-Li Tian, A. Ekin, J. Connell, Chiao Fe Shu, M. Lu
2005 IEEE Security and Privacy  
The paper presents a review of privacy in video surveillance and describes how a computer vision approach to understanding the video can be used to represent "just enough" of the information contained  ...  The technology has been implemented in the form of a privacy console that manages operator access to different versions of the video-derived data according to access control lists.  ...  Blinkers, blinds or physical stops on the motion of steerable cameras, as well as lens caps and indicators of when the camera is in operation can both restrict the field of view of cameras and reassure  ... 
doi:10.1109/msp.2005.65 fatcat:yjxflptaznblvoqm2vpdogqche

Net neutrality - How relevant is it to Australia?

James Endres
2009 Telecommunications Journal of Australia  
ACKNOWLEDGEMENTS Portions of this essay come from earlier testimony before the U.S. Congress. I would like to thank Derek Slater, Carolyn Dalton, and Rick Whitt at Google for their assistance.  ...  ACKNOWLEDGEMENTS The authors benefited from generous assistance from colleagues and interns including Alana Maurushat, Reg Leones, Adam Arnold and Joanna Chow.  ...  The attention levels obtained by these ads, the so-called 'click-through rates' where the viewer actively follows the reference embedded in the ad, are extremely low.  ... 
doi:10.2104/tja09022 fatcat:iyhfeahrmverdoaskclswtokx4

Comparative Analysis and Framework Evaluating Web Single Sign-On Systems [article]

Furkan Alaca, Paul C. van Oorschot
2020 arXiv   pre-print
We perform a comprehensive analysis and comparison of 14 web single sign-on (SSO) systems proposed and/or deployed over the last decade, including federated identity and credential/password management  ...  We also discuss how differences in priorities between users, service providers (SPs), and identity providers (IdPs) impact the design and deployment of SSO schemes.  ...  The second author acknowledges funding from the Natural Sciences and Engineering Research Council of Canada (NSERC) for both his Canada Research Chair in Authentication and Computer Security, and a Discovery  ... 
arXiv:1805.00094v2 fatcat:uxaoaopjfnejfg2cn4u476mnoi

Zeitschriftenlese

2014 Medien & Kommunikationswissenschaft  
Extending this line of inquiry, this study aims to provide a more nuanced understanding of ad effects by distinguishing campaign ads based on advertising tone, the candidate on whose behalf the ads work  ...  through onsite computers, the Internet, and mobile phone calls and text messages.  ...  How should this decay color our understanding of the effects of mass communication?  ... 
doi:10.5771/1615-634x-2014-2-308 fatcat:a2w573pzsbeqbahxiq7ztnkgm4

International Journal of Business and Management, Vol. 3, No. 10, October 2008

Editor IJBM
2009 International Journal of Business and Management  
Acknowledgements This research was supported by the key research project of Shanghai Municipal Education Commission of China (No. 06ZZ34). Expresses the thanks.  ...  References Guo Jian and Cao Ping. (2003). The 21st Century Chinese Management Pattern Philosophy Analysis. Economic Working Guide Periodical, 1: 14-15.  ...  and detection of errors and frauds.  ... 
doi:10.5539/ijbm.v3n10p0 fatcat:dqc2ecw2gnhyrgfqp5jbsqa5ke

Continuous user authentication using multi-modal biometrics

Hataichanok Saevanee, Nathan Clarke, Steven Furnell, Valerio Biscione
2015 Computers & security  
The research begins with an intensive review of mobile technologies and the current security challenges that mobile devices experience to illustrate the imperative of authentication on mobile devices.  ...  The modern mobile handheld devices are capable to provide a wide range of services and applications over multiple networks.  ...  A summary of key literature and results within the domain of fraud detection and authentication is illustrated in Within the area of fraud detection, one of the most significant initial studies was undertaken  ... 
doi:10.1016/j.cose.2015.06.001 fatcat:as4gtrnngbgmlmcay27kvezeba
« Previous Showing results 1 — 15 out of 417 results