Search results for " networking"

showing 10 items of 1264 documents

Assisted labeling for spam account detection on twitter

2019

Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…

Social network021110 strategic defence & security studiesInformation retrievalSocial networkbusiness.industryComputer scienceSpam detectionSmart device0211 other engineering and technologies020206 networking & telecommunicationsUsability02 engineering and technologycomputer.software_genrePhishinglaw.inventionManual annotationlawComputer security0202 electrical engineering electronic engineering information engineeringBlacklistingMalwarebusinessCluster analysiscomputer
researchProduct

The role of social networking services in eParticipation

2009

Published version of a chapter published in Lecture Notes in Computer Science, 5694, 46-55. Also available from the publisher at: http://dx.doi.org/10.1007/978-3-642-03781-8_5 A serious problem in eParticipation projects is citizen engagement – citizens do not necessarily become more willing to participate simply because net-services are provided for them. Most forms of eParticipation in democratic contexts are, however, dependent on citizen engagement, interaction and social networking because democratic systems favour the interests of larger groups of citizens – the more voices behind a political proposition, the greater its chances of success. In this context of challenges the study of s…

Social networkComputer sciencebusiness.industrymedia_common.quotation_subjectContext (language use)Public relationsComputer securitycomputer.software_genreDemocracyPeer reviewPoliticseParticipation social networking servicesThe InternetVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321businessCitizen engagementcomputermedia_common
researchProduct

UBFC-Phys: A Multimodal Database For Psychophysiological Studies of Social Stress

2021

As humans, we experience social stress in countless everyday-life situations. Giving a speech in front of an audience, passing a job interview, and similar experiences all lead us to go through stress states that impact both our psychological and physiological states. Therefore, studying the link between stress and physiological responses had become a critical societal issue, and recently, research in this field has grown in popularity. However, publicly available datasets have limitations. In this article, we propose a new dataset, UBFC-Phys, collected with and without contact from participants living social stress situations. A wristband was used to measure contact blood volume pulse (BVP…

Social stressFacial expressionModalitiesComputer scienceSpeech recognition010401 analytical chemistryFeature extraction[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]020206 networking & telecommunications02 engineering and technology01 natural sciencesField (computer science)0104 chemical sciencesHuman-Computer InteractionPsychophysiology[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingStress (linguistics)0202 electrical engineering electronic engineering information engineeringTask analysisComputingMilieux_MISCELLANEOUSSoftwareIEEE Transactions on Affective Computing
researchProduct

The Role of Labour and Associated EU Liberalization Challenges: Insights from the Port Sector

2013

An influential argument holds that labour unions are not likely to succeed in their objectives through current European decision-making processes. In addition, the European Union has extensive leverage to introduce negative integration due to asymmetries towards liberalization in the treaties. Given such arguments it is of interest to study a case, where attempts of EU liberalization reform have failed and labour unions claim this is their victory. An in-depth analysis of the decision-making process of the proposal for a Port Directive highlights that labour unions are most influential when they are able to exploit the division of industry interests to resoundingly oppose policy change. Mor…

Sociology and Political ScienceLiberalizationbusiness.industryVictoryInternational economicsInternational tradeDirectivePort (computer networking)Leverage (negotiation)ArgumentPolitical Science and International RelationsEuropean integrationEconomicsmedia_common.cataloged_instanceEuropean unionbusinessmedia_commonJournal of European Integration
researchProduct

New novel idea for Cloud Computing: How can we use Kalman filter in security of Cloud Computing

2012

Cloud is a virtual image about some amount of undefined powers, that is widespread and had unknown power and inexact amount of hardware and software configurations, and because of we have not any information about clouds location and time dimensions and also the amounts of its sources we tell that Cloud Computing. This technology presents lots of abilities and opportunities such as processing power, storage and accessing it from everywhere, supporting, working - team group - with the latest versions of software and etc., by the means of internet. On the other hand, in such a large scale networks we should consider the reliability and powerfulness of such networks in facing with events such …

SoftwareUtility computingFilter (video)Computer sciencebusiness.industryReliability (computer networking)Distributed computingCloud testingThe InternetCloud computingKalman filterbusiness2012 6th International Conference on Application of Information and Communication Technologies (AICT)
researchProduct

Honeypot Utilization for Network Intrusion Detection

2018

For research purposes, a honeypot is a system that enables observing attacker’s actions in different phases of a cyberattack. In this study, a honeypot called Kippo was used to identify attack behavior in Finland. The gathered data consisted of dictionary attack login attempts, attacker location, and actions after successful login. From the data, attacker behavior was analyzed. Differentiating bots from human actors, linking scanning activity to further attack steps, and identifying malware and tracking malware sites were all done. The knowledge gained could be used to enhance an organization’s cyber resiliency by identifying attacker motivations and the tools used. Automating analysis of h…

Software_OPERATINGSYSTEMSDictionary attackHoneypotComputer science020206 networking & telecommunications02 engineering and technology021001 nanoscience & nanotechnologycomputer.software_genreComputer securityLoginComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS0202 electrical engineering electronic engineering information engineeringMalwareNetwork intrusion detection0210 nano-technologycomputerSecurity system
researchProduct

On the Consistency of Non-Stationary Multipath Fading Channels with Respect to the Average Doppler Shift and the Doppler Spread

2017

This paper is concerned with the consistency of non-stationary multipath fading channels. We introduce conditions under which a channel model is consistent w.r.t. the average Doppler shift and the Doppler spread. The conditions are applied to two classes of non-stationary channel models. The first class, which is termed Class A, is characterized by channel models based on an integral relationship between the path phases and the associated time-variant Doppler frequencies. The second class of models, called the Class B models, emerges from standard sum-of-cisoids (SOC) models by replacing the time-independent Doppler frequencies by time-dependent Doppler frequencies. It is shown that the Cla…

SoundnessClass (set theory)05 social sciences050801 communication & media studies020206 networking & telecommunications02 engineering and technologyFirst classsymbols.namesake0508 media and communicationsConsistency (statistics)Path (graph theory)Statistics0202 electrical engineering electronic engineering information engineeringsymbolsFadingAlgorithmDoppler effectMultipath propagationMathematics
researchProduct

5G IoT System for Real-Time Psycho-Acoustic Soundscape Monitoring in Smart Cities With Dynamic Computational Offloading to the Edge

2021

Environmental noise monitoring for smart cities need to be as much efficient as possible in order to mitigate its significant impact in the health of their inhabitants. 5G Internet of Things (IoT) systems offer a big opportunity to offload the computation from the sensor nodes, since it provides a series of new concepts for dynamic computing that the previous technologies did not offer. In this article, a complete 5G IoT system for psycho-acoustic monitoring has been designed and implemented using different options for offloading computation to different parts of the system. This offloading has been done by developing different functional splittings of the psycho-acoustic metrics algorithms…

SoundscapeComputer Networks and Communicationsbusiness.industryComputer scienceDistributed computingComputation020206 networking & telecommunications02 engineering and technologyComputer Science ApplicationsHardware and ArchitecturePerformance comparisonSmart citySignal Processing0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingEnhanced Data Rates for GSM EvolutionInternet of ThingsbusinessEnvironmental noise5GInformation SystemsIEEE Internet of Things Journal
researchProduct

Spatio-Temporal Analysis of Urban Acoustic Environments with Binaural Psycho-Acoustical Considerations for IoT-Based Applications

2018

Sound pleasantness or annoyance perceived in urban soundscapes is a major concern in environmental acoustics. Binaural psychoacoustic parameters are helpful to describe generic acoustic environments, as it is stated within the ISO 12913 framework. In this paper, the application of a Wireless Acoustic Sensor Network (WASN) to evaluate the spatial distribution and the evolution of urban acoustic environments is described. Two experiments are presented using an indoor and an outdoor deployment of a WASN with several nodes using an Internet of Things (IoT) environment to collect audio data and calculate meaningful parameters such as the sound pressure level, binaural loudness and binaural sharp…

SoundscapeMicrophone arrayIoTComputer sciencesoundscapeBinauralReal-time computingInternet of ThingsAnnoyance02 engineering and technologylcsh:Chemical technology01 natural sciencesBiochemistryArticleAnalytical ChemistryLoudnessspatial statisticsWASN0202 electrical engineering electronic engineering information engineeringlcsh:TP1-1185PsychoacousticsElectrical and Electronic EngineeringAcousticSound pressureInstrumentationacoustic environment010401 analytical chemistry020206 networking & telecommunicationspsychoacousticsLoudnessAtomic and Molecular Physics and Optics0104 chemical sciencesacoustic environment; soundscape; WASN; psychoacoustics; IoT; spatial statisticsSmart CitiesBinaural recordingSensors; Volume 18; Issue 3; Pages: 690
researchProduct

Routing Algorithm for Maximizing Lifetime of Wireless Sensor Network for Broadcast Transmission

2018

In the article we discuss solutions of the maximum lifetime broadcasting problem in wireless sensor networks. Due to limited energy resources of the network nodes to find an optimal transmission route of the broadcasted data we minimize the maximum energy consumed by the nodes. We give an analytical solution of the problem in one dimensional regular sensor network for the point-to-point and point-to-multipoint data transmission scheme. We show that in such a network, when the cost of data transmission is a polynomial function of distance between transmitter and receiver, there exist solutions with an equal energy, i.e., all nodes of the network consume the same amount of energy. We assume t…

Spanning treeComputer scienceNode (networking)Wireless communication020206 networking & telecommunications02 engineering and technologyEnergy consumptionTopologyComputer Science ApplicationsBroadcast transmissionBroadcasting (networking)Energy efficiencyTransmission (telecommunications)0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingSensor network lifetimeElectrical and Electronic EngineeringTime complexityWireless sensor networkData transmissionWireless Personal Communications
researchProduct