Search results for "Fingerprint"

showing 5 items of 215 documents

Selaimen sormenjälkitunnistamisen torjunta käyttöjärjestelmäavusteisella virtualisoinnilla

2017

Selaimen sormenjälkitunnistaminen mahdollistaa käyttäjien seurannan käyttäjien yksityisyyttä luokkaavasti. Tutkielmassa selvitetään voidaanko käyttöjärjestelmäavusteisilla virtualisointiteknologioilla vastata selaimen sormenjälkitunnistamisen torjunnan asettamiin haasteisiin. Tutkielmassa havaittiin neljä eri haastetta selaimen sormenjälkitunnistamisen torjunnalle. Tutkielma keskittyy Linux-kernelin tukemiin käyttöjärjestelmäavusteisiin virtualisointiteknologiohin, jotka mahdollistavat ohjelmistokonttien toteuttamisen. Preventing browser fingerprinting using operating system level virtualization. Browser fingerprinting enables tracking of users in a way that violates users' privacy. In this…

selaimetvirtualisointisovelluksetsormenjälkitunnistaminenohjelmistokontitbrowser fingerprintingtietoturvacontainerprivacyohjelmistokehityssovellukset (tietotekniikka)virtualizationyksilönsuoja
researchProduct

Towards Automated Classification of Firmware Images and Identification of Embedded Devices

2017

Part 4: Operating System and Firmware Security; International audience; Embedded systems, as opposed to traditional computers, bring an incredible diversity. The number of devices manufactured is constantly increasing and each has a dedicated software, commonly known as firmware. Full firmware images are often delivered as multiple releases, correcting bugs and vulnerabilities, or adding new features. Unfortunately, there is no centralized or standardized firmware distribution mechanism. It is therefore difficult to track which vendor or device a firmware package belongs to, or to identify which firmware version is used in deployed embedded devices. At the same time, discovering devices tha…

sulautettu tietotekniikkaComputer scienceVendorvulnerability02 engineering and technologycomputer.software_genreSoftware020204 information systems0202 electrical engineering electronic engineering information engineering[INFO]Computer Science [cs]tietoturvadata securityhaavoittuvuusbusiness.industryFirmwareFingerprint (computing)020206 networking & telecommunicationsubiquitous computingRandom forestIdentification (information)koneoppiminenmachine learningEmbedded systemUser interfaceHardware_CONTROLSTRUCTURESANDMICROPROGRAMMINGbusinesscomputerPrivate network
researchProduct

Cluster-Based RF Fingerprint Positioning Using LTE and WLAN Outdoor Signals

2015

In this paper we evaluate user-equipment (UE) positioning performance of three cluster-based RF fingerprinting methods using LTE and WLAN signals. Real-life LTE and WLAN data were collected for the evaluation purpose using consumer cellular-mobile handset utilizing ‘Nemo Handy’ drive test software tool. Test results of cluster-based methods were compared to the conventional grid-based RF fingerprinting. The cluster-based methods do not require grid-cell layout and training signature formation as compared to the gridbased method. They utilize LTE cell-ID searching technique to reduce the search space for clustering operation. Thus UE position estimation is done in short time with less comput…

ta113PercentileK-nearest neighborComputer sciencebusiness.industrycell-IDFingerprint (computing)Real-time computingFingerprint recognitionGridHandsetlaw.inventionminimization of drive testsEuclidean distanceLTElawEmbedded systemgrid-based RF fingerprintingRadio frequencyCluster analysisbusinessfuzzy C-meanshierarchical clustering
researchProduct

An efficient cluster-based outdoor user positioning using LTE and WLAN signal strengths

2015

In this paper we propose a novel cluster-based RF fingerprinting method for outdoor user-equipment (UE) positioning using both LTE and WLAN signals. It uses a simple cost effective agglomerative hierarchical clustering with Davies-Bouldin criterion to select the optimal cluster number. The positioning method does not require training signature formation prior to UE position estimation phase. It is capable of reducing the search space for clustering operation by using LTE cell-ID searching criteria. This enables the method to estimate UE positioning in short time with less computational expense. To validate the cluster-based positioning real-time field measurements were collected using readi…

ta113SIMPLE (military communications protocol)business.industryComputer scienceReal-time computingLTE cell-IDFingerprint recognitionGridminimization of drive testsDetermining the number of clusters in a data setEmbedded systemgrid-based RF fingerprintingRadio frequencybusinessCluster analysishierarchical clustering
researchProduct

Using VIS/NIR and IR spectral cameras for detecting and separating crime scene details

2012

Detecting invisible details and separating mixed evidence is critical for forensic inspection. If this can be done reliably and fast at the crime scene, irrelevant objects do not require further examination at the laboratory. This will speed up the inspection process and release resources for other critical tasks. This article reports on tests which have been carried out at the University of Jyväskylä in Finland together with the Central Finland Police Department and the National Bureau of Investigation for detecting and separating forensic details with hyperspectral technology. In the tests evidence was sought after at an assumed violent burglary scene with the use of VTT's 500-900 nm wave…

ta113medicine.medical_specialtySDG 16 - PeaceComputer scienceGunshot residueSDG 16 - Peace Justice and Strong InstitutionsdetectionHyperspectral imagingPolice departmentspectral imagingFingerprint recognition/dk/atira/pure/sustainabledevelopmentgoals/peace_justice_and_strong_institutionslatent fingerprintsJustice and Strong InstitutionsVNIRSpectral imagingmedicineCrime sceneDried bloodforensic investigationseparation of bloodRemote sensingCrime scene
researchProduct