A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Statically Detecting Adversarial Malware through Randomised Chaining
[article]
2021
arXiv
pre-print
With the rapid growth of malware attacks, more antivirus developers consider deploying machine learning technologies into their productions. ...
Researchers and developers published various machine learning-based detectors with high precision on malware detection in recent years. ...
In Proceedings of the 28th Annual Computer Security
Hao, and Xiaodong Lin. Understanding and detecting mobile ad fraud through Applications Conference, ACSAC ’12, 2012. ...
arXiv:2111.14037v2
fatcat:yoeq7huds5ambg2tpvvkgk45zm
Program
2020
2020 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-Taiwan)
This study provides users with increased interaction with blockchain virtual pet cats through mobile devices and augmented reality, and adds more interactivity and fun. ...
Finally, a traffic density estimation method is proposed to estimate the traffic density in accordance with the estimated vehicle speed and the estimated traffic flow. ...
The user can monitor the output voltage and current through mobile phone immediately.
16:00 An Intelligent Fall Detection Design for Mobile Health-Care Applications Jui-Hung Hsieh, Hui-Lan Zhang and ...
doi:10.1109/icce-taiwan49838.2020.9258230
fatcat:g25vw7mzvradxna2grlzp6kgiq
Setting the future of digital and social media marketing research: Perspectives and research propositions
2020
International Journal of Information Management
, digital content management, mobile marketing and advertising, B2B marketing, electronic word of mouth and ethical issues therein. ...
A B S T R A C T The use of the internet and social media have changed consumer behavior and the ways in which companies conduct their business. ...
13) Studies are
needed to analyze
the role of social
media data
transparency
within ethical
organizational
practices.
14) Further studies
are required on
invalid traffic
identification and ...
doi:10.1016/j.ijinfomgt.2020.102168
fatcat:6gfli73nlnbvrlqqmcwdqbb3qa
Dirty Jobs: The Role of Freelance Labor in Web Service Abuse
2011
USENIX Security Symposium
We identify the largest classes of abuse work, including account creation, social networking link generation and search engine optimization support, and characterize how pricing and demand have evolved ...
Using over seven years of data from the popular crowdsourcing site Freelancer.com, as well data from our own active job solicitations, we characterize the labor market involved in service abuse. ...
This work was supported in part by National Science Foundation grants NSF-0433668 and NSF-0831138, by the Office of Naval Research MURI grant N000140911081, and by generous research, operational and in-kind ...
dblp:conf/uss/MotoyamaMLSV11
fatcat:5feca2bxo5bqreyeop52fzusay
Judgment in the case of K.U. v Finland: the European Court of Human Rights requires access to communications data to identify the sender to enable effective criminal prosecution in serious violations of private life
2014
Digital Evidence and Electronic Signature Law Review
Individual digital signature certificates or Organisation digital signature certificates. 30 In the case of digital signature, it is the private key that the subscriber activates to create a digital signature ...
It is necessary to understand that in attempting to detect fraud, the early cases of a new type of fraud may not be detected for some time. ...
In this case, the criminals had detected the secret number and thereupon pursued the card holder through Berlin. ...
doi:10.14296/deeslr.v6i0.1855
fatcat:alhdynp4nzdc7cwyhu44xlecuy
Big Data: A Survey
2014
Journal on spesial topics in mobile networks and applications
frauds, errors, and tax difference). ...
For example, during the acquisition of traffic video, the few video frames that capture the violation of traffic regulations and traffic accidents are more valuable than those only capturing the normal ...
doi:10.1007/s11036-013-0489-0
fatcat:lvnmkesqbngc3lgccms3hmm7jq
Using Big Data-machine learning models for diabetes prediction and flight delays analytics
2020
Journal of Big Data
The main contribution of this paper is to give an overview of Big Data tools and machine learning models. We highlight some metrics that allow us to choose a more accurate model. ...
Further more we analyzed flight delay and produced a dashboard which can help managers of flight companies to have a 360° view of their flights and take strategic decisions. ...
However, the system needs confidence by making fraud detection a critical factor. Authors presented a Scalable Real-time Fraud Finder (SCARFF). ...
doi:10.1186/s40537-020-00355-0
doaj:cced16a888da4ee1ba5257d74e9ffde8
fatcat:zkq6ben46je6niffnghqbxuaiu
Situational Crime Prevention and Its Discontents: Rational Choice and Harm Reduction versus 'Cultural Criminology'
2010
Social Policy & Administration
Some of the many ways SCP applies to expressive and irrational crimes, and how readily they fit into the choice framework, are outlined, and a preliminary critique of Hayward's cultural criminology is ...
The main thesis was that SCP cannot tackle expressive crimes of anger, hostility and excitement. ...
'[T]he absence of detailed engagement with classic debates in social anthropology serves to undermine cultural criminology's assertion that the lens of culture provides a critical tool for understanding ...
doi:10.1111/j.1467-9515.2009.00699.x
fatcat:3bvulevynjc7rgg6tp3khdbxea
Situational Crime Prevention and Its Discontents: Rational Choice and Harm Reduction versus 'Cultural Criminology'
[chapter]
2017
Crime Opportunity Theories
Some of the many ways SCP applies to expressive and irrational crimes, and how readily they fit into the choice framework, are outlined, and a preliminary critique of Hayward's cultural criminology is ...
The main thesis was that SCP cannot tackle expressive crimes of anger, hostility and excitement. ...
'[T]he absence of detailed engagement with classic debates in social anthropology serves to undermine cultural criminology's assertion that the lens of culture provides a critical tool for understanding ...
doi:10.4324/9781315095301-16
fatcat:kvlhizbjszdr5ieu2fv3lzfrna
Enabling Video Privacy through Computer Vision
2005
IEEE Security and Privacy
The paper presents a review of privacy in video surveillance and describes how a computer vision approach to understanding the video can be used to represent "just enough" of the information contained ...
The technology has been implemented in the form of a privacy console that manages operator access to different versions of the video-derived data according to access control lists. ...
Blinkers, blinds or physical stops on the motion of steerable cameras, as well as lens caps and indicators of when the camera is in operation can both restrict the field of view of cameras and reassure ...
doi:10.1109/msp.2005.65
fatcat:yjxflptaznblvoqm2vpdogqche
Net neutrality - How relevant is it to Australia?
2009
Telecommunications Journal of Australia
ACKNOWLEDGEMENTS Portions of this essay come from earlier testimony before the U.S. Congress. I would like to thank Derek Slater, Carolyn Dalton, and Rick Whitt at Google for their assistance. ...
ACKNOWLEDGEMENTS The authors benefited from generous assistance from colleagues and interns including Alana Maurushat, Reg Leones, Adam Arnold and Joanna Chow. ...
The attention levels obtained by these ads, the so-called 'click-through rates' where the viewer actively follows the reference embedded in the ad, are extremely low. ...
doi:10.2104/tja09022
fatcat:iyhfeahrmverdoaskclswtokx4
Comparative Analysis and Framework Evaluating Web Single Sign-On Systems
[article]
2020
arXiv
pre-print
We perform a comprehensive analysis and comparison of 14 web single sign-on (SSO) systems proposed and/or deployed over the last decade, including federated identity and credential/password management ...
We also discuss how differences in priorities between users, service providers (SPs), and identity providers (IdPs) impact the design and deployment of SSO schemes. ...
The second author acknowledges funding from the Natural Sciences and Engineering Research Council of Canada (NSERC) for both his Canada Research Chair in Authentication and Computer Security, and a Discovery ...
arXiv:1805.00094v2
fatcat:uxaoaopjfnejfg2cn4u476mnoi
Zeitschriftenlese
2014
Medien & Kommunikationswissenschaft
Extending this line of inquiry, this study aims to provide a more nuanced understanding of ad effects by distinguishing campaign ads based on advertising tone, the candidate on whose behalf the ads work ...
through onsite computers, the Internet, and mobile phone calls and text messages. ...
How should this decay color our understanding of the effects of mass communication? ...
doi:10.5771/1615-634x-2014-2-308
fatcat:a2w573pzsbeqbahxiq7ztnkgm4
International Journal of Business and Management, Vol. 3, No. 10, October 2008
2009
International Journal of Business and Management
Acknowledgements This research was supported by the key research project of Shanghai Municipal Education Commission of China (No. 06ZZ34). Expresses the thanks. ...
References Guo Jian and Cao Ping. (2003). The 21st Century Chinese Management Pattern Philosophy Analysis. Economic Working Guide Periodical, 1: 14-15. ...
and detection of errors and frauds. ...
doi:10.5539/ijbm.v3n10p0
fatcat:dqc2ecw2gnhyrgfqp5jbsqa5ke
Continuous user authentication using multi-modal biometrics
2015
Computers & security
The research begins with an intensive review of mobile technologies and the current security challenges that mobile devices experience to illustrate the imperative of authentication on mobile devices. ...
The modern mobile handheld devices are capable to provide a wide range of services and applications over multiple networks. ...
A summary of key literature and results within the domain of fraud detection and authentication is illustrated in Within the area of fraud detection, one of the most significant initial studies was undertaken ...
doi:10.1016/j.cose.2015.06.001
fatcat:as4gtrnngbgmlmcay27kvezeba
« Previous
Showing results 1 — 15 out of 417 results