A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Controversial "Pixel" Prior Rule for JPEG Adaptive Steganography
2018
IET Image Processing
Currently, the most successful model for image adaptive steganography is the framework of minimal distortion, in which a reasonable definition of costs can improve the security level. ...
In the authors' previous work, they developed a rule for cost reassignment in spatial domain called the 'controversial pixel prior (CPP)' rule, which defines controversial pixels by utilizing the controversies ...
On the basis of this discovery, we proposed CPP rule for cost reassignment in spatial steganography. The CPP rule focuses on those controversial pixels and gives them priority of modification. ...
doi:10.1049/iet-ipr.2018.5401
fatcat:x26wdiz52rfqln3morjtcnzxqi
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection
2020
IEEE Access
At present, the complexity, proliferation, and variety of malware pose a real challenge for the existing countermeasures and require their constant improvements. ...
It allows using the victim's machine for various nefarious purposes, e.g., making it a part of the botnet, mining cryptocurrencies, or holding hostage the data stored there. ...
Unfortunately, malware also rapidly adapts to new devices and environments. ...
doi:10.1109/access.2020.3048319
fatcat:tatdk6pzczgp3aylvbxoxabuta
"Friend is Treasure": Exploring and Exploiting Mobile Social Contacts for Efficient Task Offloading
2016
IEEE Transactions on Vehicular Technology
Nevertheless, it would bring fundamental challenges to task reassignment in the following aspects: First of all, some of the friendships are relatively stable, which would lead to a more imbalanced task ...
In summary, ours could effectively explore the social relationship and leverage it for efficient task assignment, which would further encourage more mobile users to work together under the rule of social ...
We propose a new concept for balanced task offloading algorithm design, that is, 'Your friends are more powerful than you.' ...
doi:10.1109/tvt.2015.2465392
fatcat:hd3iw6t3lzhyfkw346r7gjhdvu
Cybersecurity: Past, Present and Future
[article]
2023
arXiv
pre-print
The digital transformation has created a new digital space known as cyberspace. ...
To keep pace with these advancements in cyber technologies there is a need to expand research and develop new cybersecurity methods and tools to secure these domains and environments. ...
AI learns from big data and generates new rules for future cyber analytics. Good data is the lifeblood of AI. ...
arXiv:2207.01227v2
fatcat:54sdflwghrcd3dqodwn4fygtei
IEEE Access Special Section Editorial: Data Mining for Internet of Things
2021
IEEE Access
Khadam et al., ''A steganography algorithm based on Cycle-GAN for covert communication in the Internet of Things,'' by Meng et al., ''Analysis of botnet domain names for IoT cybersecurity,'' by Li et al ...
Compared to the approach of using a better machine, developing an effective or efficient algorithm is also a more cost-effective way for enhancing the overall performance of a system or device. ...
doi:10.1109/access.2021.3090137
fatcat:cnleukmukfgexmkwx7tino2k5y
Security improvements Zone Routing Protocol in Mobile Ad Hoc Network
2014
International Journal of Computer Applications Technology and Research
Proactive routing protocols: In it, all the nodes continuously search for routing information with in a network, so that when a route is needed, the route is already known. ...
However, when there is a lot of node movement then the cost of maintaining all topology information is very high. ...
A solution to this dilemma is steganography. ...
doi:10.7753/ijcatr0309.1001
fatcat:n7yb26a6zbgwnpvfmvka3cnpoq
Malware classification using XGboost-Gradient Boosted Decision Tree
2020
Advances in Science, Technology and Engineering Systems
We propose in this work a malware classification scheme that constructs a model using low-end computing resources and a very large balanced dataset for malware. ...
The model can be trained in low computation resources at less time in 1315 seconds with a reduction in feature set without affecting the performance for classification. ...
It follows an accurate prediction by using a moderately inaccurate rule of rough and moderate heuristics. Adaptive boosting is upgraded to Adaptive, Reweighing, and Combine (ARC) algorithm. ...
doi:10.25046/aj050566
fatcat:7fko7vaksvdh3ky5a7a3cjtani
Music 2025 – The Music Data Dilemma: Issues Facing the Music Industry in Improving Data Management
2019
Social Science Research Network
Acknowledgements The study was instigated by Peter Jenner, (the original manager of Pink Floyd), whose passion and future thinking about the music industry persuaded the IPO, and in particular David Humphries ...
As a rule, each new recording needs a new ISRC; for example, any new musical elements, such as a new drum beat, new sessions etc. should require a new ISRC. ...
single market: EU copyright rules fit for the digital age". 210 The prime objective of the proposed Article 13 of the proposed new rules was to focus on: "fair rules of the game for a better functioning ...
doi:10.2139/ssrn.3437670
fatcat:7pp2dv24cje27awzlsnfznent4
Ribosomal frameshifting and transcriptional slippage: From genetic steganography and cryptography to adventitious use
2016
Nucleic Acids Research
One facet of this is frameshifting that often results in synthesis of a C-terminal region encoded by a new frame. ...
Utilization for synthesis of additional products occurs prominently in the decoding of mobile chromosomal element and viral genomes. ...
The authors are highly appreciative of the key folks ('fellow stenographers of genetic steganography') they have worked with, Norma ...
doi:10.1093/nar/gkw530
pmid:27436286
pmcid:PMC5009743
fatcat:vyxew2vnv5dftmcx77l3bi4kcu
Internet Telephony
[chapter]
2004
The Practical Handbook of Internet Computing
For example, a one-mile call from New Jersey to Manhattan costs the same 10 cents as a call from San Francisco to London. ...
The cost per circuit is the annual investment cost for a 25-year lifetime. ...
PANS Progressive scan: All lines in a frame are scanned consecutively. Typically used for computer displays, as it gives better quality for (moving) text.
PSTN: Public Switched Telephone Network. ...
doi:10.1201/9780203507223.ch6
fatcat:3ljkkei7j5d3lhqedymkwcvpwu
Espionage in the Digital Age: How Technology is Impacting the Recruitment and Handling of Spies
[article]
2021
New developments in technology have both benefited and challenged human intelligence gathering. ...
The introduction considers the impact of technology on society in general and will discuss the implications for the intelligence community. ...
I am also indebted to the University of Texas at Austin as well as the Plan II Honors Program for such a wonderful undergraduate education that I will cherish forever. ...
doi:10.26153/tsw/11267
fatcat:rwvqtzna5bhnhhpccctvgkzhn4
Classifying Infected and Uninfected Red Blood Cell Images for Malaria Detection using Convolutional Neural Networks
2021
American Journal Of Advanced Computing
Recompute the new cluster centers. 4. Repeat steps 2 and 3 until there is no change in reassignment of points. ...
Then it will be classified as class-A using the rules depicted in the tree of Fig. 2 . Random forest is a variant of decision-tree algorithm. ...
doi:10.15864/ajac.2107
fatcat:cnqj7hzy6nbvlobtmrujhoy4bu
Proceedings of the Seminars Future Internet (FI) and Innovative Internet Technologies and Mobile Communication (IITM), Summer Semester 2017
[article]
2017
By adding these costs, a new value of the constant cost per packet is calculated [16] . ...
To meet those demands while saving costs (e.g. costs for hardware, software and energy consumption) and staying environmentally aware, new approaches to meet these demands have been developed. ...
doi:10.2313/net-2017-09-1
fatcat:qtxz2tweurbszpmvspmsek3bsq
Ribosomal Frameshifting and Transcriptional Slippage: From Genetic Steganography & Cryptography to Adventitious use
2016
One facet of this is frameshifting that often results in synthesis of a C-terminal region encoded by a new frame. ...
Utilization for synthesis of additional products occurs prominently in the decoding of mobile chromosomal element and viral genomes. ...
The authors apologize to those whose work on frameshifting they could not include, or dealt with too superficially, for space reasons. J.F.A. warmly thanks Ray ...
doi:10.17863/cam.423
fatcat:4daasrpepjfqhbhe4yii7zchb4
Stinging the Predators: A collection of papers that should never have been published
2018
Figshare
Each paper has a brief introduction. ...
This ebook collects academic papers and conference abstracts that were meant to be so terrible that nobody in their right mind would publish them. ...
I refer of course to the scientific news about the genetic eccentricities of the Catostomus commersonii, or white sucker, a common freshwater Cypriniform fish inhabiting the upper Midwest and Northeast ...
doi:10.6084/m9.figshare.5248264.v11
fatcat:bz72ceqdo5byjly6h4yuvazdyi
« Previous
Showing results 1 — 15 out of 30 results