Search Results

91 - 100 of 120 items :

  • Information Technology x
Clear All
Analyzing the Great Firewall of China Over Space and Time

, Sunnyvale, CA, USA, 2009. [24] H. V. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani. iPlane: An information plane for distributed services. In Operating Systems Design and Implementation. USENIX Association, 2006. [25] Z. M. Mao, J. Rexford, J. Wang, and R. H. Katz. Towards an accurate AS-level traceroute tool. In SIGCOMM ’03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages 365-378, New York, NY, USA, 2003. ACM

Open access
Phonion: Practical Protection of Metadata in Telephony Networks

://rfc-editor.org/rfc/rfc3711.txt. [8] E. Ben Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza. Zerocash: Decentralized anonymous payments from Bitcoin. In 2014 IEEE Symposium on Security and Privacy (SP), 2014. [9] A. Biryukov and I. Pustogarov. Proof-of-work as anonymous micropayment: Rewarding a Tor relay. In Financial Cryptography and Data Security 2015, 2015. [10] N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of service or denial of security? In ACM Conference on Computer and Communications Security

Open access
Comparison of Video Steganography Methods for Watermark Embedding

R eferences [1] E. Zielinska, W. Mazurczyk and K. Szczypiorski, “Trends in Steganography,” Communications of the ACM , no. 03, issue 57, 2014, pp. 86–95. http://dx.doi.org/10.1145/2566590.2566610 [2] I. Cox, M. Miller, J. Bloom, J. Fridrich and T. Kalker, Digital Watermarking and Steganography , 2nd Ed., Burlington: Morgan Kaufmann, 2007. [3] G. Konahovich and A. Puzirenko, Digital Steganography, Theory and Practice – Компьютерная стеганография, теория и практика. Kiev: MK-Press, 2006. (in Russian) [4] A. K. Al-Frajat, H. A. Jalab, Z

Open access
Machine Learning Methods for Identifying Composition of Uranium Deposits in Kazakhstan

rezultatov geofizičeskih issledovanij skvažin na plastovo-infiltracionnyh mestoroždenijah urana . Vestnik Akademii Nauk, Almaty, 2008. [5] TOO GRK, Tehničeskaja instrukcija po provedeniju geofizičeskih issledovanij v skvažinah na plastovo infiltracionnyh mestoroždenijah urana . Almaty, 2010. [6] Š. A. Guberman, M. L. Izvekova, Ja. I. Xurgin, “Primenenie metodov raspoznavanija obrazov pri interpretacii geofizičeskih dannyh,” Sb. Samoobučajuŝiesja avtomatičeskie sistemy . M: Nauka, 1966. [7] G. N. Zverev, D. D. Halilov, I. B. Golovackaja. Primenenie

Open access
Development of Requirements Specification for Steganographic Systems

-msp.2007.85 [23] J. Cummins, P. Diskin, S. Lau and R. Parlett. (2004). Steganography and Digital Watermarking. [Online]. Available: http://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS5/Steganography.htm [Accessed: Oct. 8, 2016]. [24] D. Kahn, The Codebreakers . New York: Scribner, 1996, 1224 p. [25] A. Jersovs and P. Rusakovs, “Kutter Steganographical Method’s Improvement and Concept of Universal Stegoconstructor,” in Computer Sciences , vol. 38, pp. 198–208, Jan. 2009. https://doi.org/10.2478/v10143-009-0018-6 [26] M

Open access
Why Privacy Is All But Forgotten
An Empirical Study of Privacy & Sharing Attitude

: Disclosure in online social networking profiles: The case of facebook. Computers in Human Behavior , 26(3):406–418, 2010. [66] A. N. Oppenheim. Questionnaire design, interviewing and attitude measurement . Bloomsbury Publishing, 2000. [67] T. M. Ostrom. The relationship between the affective, behavioral, and cognitive components of attitude. Journal of Experimental Social Psychology , 5(1):12–30, 1969. [68] L. Palen and P. Dourish. Unpacking privacy for a networked world. In CHI ’03 , pages 126–136. ACM, USA, 2003. [69] G. Paolacci, J. Chandler

Open access
Personalized Pseudonyms for Servers in the Cloud

. Schwarzkopf. Using dust clouds to enhance anonymous communication. In 18th International Workshop on Security Protocols , 2014. [28] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Peissens, and G. Vigna. Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In IEEE Symposium on Security and Privacy , May 2013. [29] J. C. Norte. Advanced Tor browser fingerprinting. http://jcarlosnorte.com/security/2016/03/06/advanced-tor-browser-fingerprinting.html , Mar. 2016. [30] G. Owen and N. Savage. The Tor dark net. No. 20

Open access
4 Years of EU Cookie Law: Results and Lessons Learned

: Taking Back Browsing Privacy from Third-Party Trackers . Springer International Publishing, Cham, 2015, pp. 277–289. [50] M arciel , M., C uevas , R., B anchs , A., G onzález , R., T raverso , S., A hmed , M., and A zcorra , A. Understanding the detection of view fraud in video content portals. In Proceedings of the 25th International Conference on World Wide Web (Republic and Canton of Geneva, Switzerland, 2016), WWW ’16, International World Wide Web Conferences Steering Committee, pp. 357–368. [51] M arkou , C. Behavioural Advertising and the New “EU

Open access
Smooth Non-increasing Square Spatial Extents of Filters in Convolutional Layers of CNNs for Image Classification Problems

. 256, 2015, pp. 565–571. https://doi.org/10.1016/j.amc.2015.01.049 [6] D. Costarelli and R. Spigler, “Approximation results for neural network operators activated by sigmoidal functions,” Neural Networks , vol. 44, 2013, pp. 101–106. https://doi.org/10.1016/j.neunet.2013.03.015 [7] G. A. Anastassiou, “Multivariate sigmoidal neural network approximation,” Neural Networks , vol. 24, iss. 4, 2011, pp. 378–386. https://doi.org/10.1016/j.neunet.2011.01.003 [8] Y. LeCun, L. Bottou, Y. Bengio, and P. Haffner, “Gradient-based learning applied to

Open access
Exploiting TLS Client Authentication for Widespread User Tracking

] China Deputizes Smart Phones to Spy on Beijing Residents’ Real-Time Location. https://www.eff.org/deeplinks/2011/03/china-deputizes-smart-phones-spy-beijing-residents , Oct 2011. [12] D. Adrian, K. Bhargavan, Z. Durumeric, P. Gaudry, M. Green, J. A. Halderman, N. Heninger, D. Springall, E. Thomé, L. Valenta, et al. Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security , pages 5–17. ACM, 2015. [13] B. Anderson and D. McGrew. OS Fingerprinting: New

Open access