Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- review-articleMay 2024
Autonomous driving system: A comprehensive survey
- Jingyuan Zhao,
- Wenyi Zhao,
- Bo Deng,
- Zhenghong Wang,
- Feng Zhang,
- Wenxiang Zheng,
- Wanke Cao,
- Jinrui Nan,
- Yubo Lian,
- Andrew F. Burke
Expert Systems with Applications: An International Journal (EXWA), Volume 242, Issue Chttps://doi.org/10.1016/j.eswa.2023.122836AbstractAutomation is increasingly at the forefront of transportation research, with the potential to bring fully autonomous vehicles to our roads in the coming years. This comprehensive survey provides a holistic look at the essential components and ...
- ArticleJuly 2021
What if: Human Rights vs Science – or Both?: An Unusual Argument from a Disability Perspective
Digital Human Modeling and Applications in Health, Safety, Ergonomics and Risk Management. AI, Product and ServicePages 220–238https://doi.org/10.1007/978-3-030-77820-0_17AbstractThe author examines the social, economic and political consequences to human rights in terms of modern ICT technologies and biotechnology advances (CRISPR-Cas9) as well as newly developed medical-based rehabilitation techniques. In addition to the ...
- research-articleMarch 2017
Detection of network anomalies using Improved-MSPCA with sketches
Computers and Security (CSEC), Volume 65, Issue CPages 314–328https://doi.org/10.1016/j.cose.2016.10.010Internet has become a battle ground between defenders and attackers. The important and first step for a defender of the network is to detect indicators of attack. One of the indicators is traffic anomaly. In this paper, we propose an Improved-MSPCA ...
- research-articleAugust 2015
Evolving statistical rulesets for network intrusion detection
Applied Soft Computing (APSC), Volume 33, Issue CPages 348–359https://doi.org/10.1016/j.asoc.2015.04.041Graphical abstractDisplay Omitted HighlightsCompact rulesets for detecting network intrusions are evolved.Uses novel two-level performance evaluation to coevolve cooperative rules.Results are strongly comparable with other machine learning techniques. ...
- opinionSeptember 2013
Augmented Intelligence
IEEE Internet Computing (IEEECS_INTERNET), Volume 17, Issue 5Page 96https://doi.org/10.1109/MIC.2013.90Douglas Engelbart, J.C.R. Licklider, DARPA, augmented human intellect, Google Glass, and silicon sapience: what a fascinating amalgam of leaders, devices, and concepts! With today's cloud computing and with the legacy of giants like Engelbart and ...
-
- research-articleJuly 2013
Keyboard-Behavior-Based Authentication
The authors developed a large corpus of keyboard behavior based on temporary workers employed in a simulated office environment. Analysis of this corpus using stylometric techniques shows good accuracy in distinguishing users. This article is part of a ...
- review-articleJanuary 2013
News Briefs
Topics include a fast new 3D transistor, a group of nanomachines that can coordinate their movements so that they function like contracting muscles, a surveillance system that monitors users' brainwaves to detect threats, a UN report that says ...
- articleNovember 2012
Suppose We Got a Do-Over: A Revolution for Secure Computing
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 10, Issue 6Pages 36–39https://doi.org/10.1109/MSP.2012.84Although visionaries think of breakthrough ideas long before the rest of us, they often think of them before there's technology ready to handle them. Would Multics or the Lisp Machine still have achieved little market success if today's VLSI technology ...
- articleSeptember 2012
Security, Privacy, and Policy Roundup
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 10, Issue 5Pages 8–9https://doi.org/10.1109/MSP.2012.129These news briefs cover the latest in security, privacy, and policy.
- ArticleApril 2012
Compositional verification of architectural models
NFM'12: Proceedings of the 4th international conference on NASA Formal MethodsPages 126–140https://doi.org/10.1007/978-3-642-28891-3_13This paper describes a design flow and supporting tools to significantly improve the design and verification of complex cyber-physical systems. We focus on system architecture models composed from libraries of components and complexity-reducing design ...
- articleJanuary 2012
Can Social Network Analysis be Effective at Improving the Intelligence Community While Ensuring Civil Rights?
Information Security Journal: A Global Perspective (ISJGP), Volume 21, Issue 3Pages 115–126https://doi.org/10.1080/19393555.2011.647251The immediate research has revealed that the Defense Advanced Research Projects Agency's DARPA initial research and development efforts in SNA did not include the necessary requirements for privacy protection as called for in the Intelligence Reform and ...
- opinionJuly 2011
Host Tables, Top-Level Domain Names, and the Origin of Dot Com
IEEE Annals of the History of Computing (ANHC), Volume 33, Issue 3Pages 74–79https://doi.org/10.1109/MAHC.2011.58From as far back as 1971, the Arpanet Network Information Center (NIC) at Stanford Research Institute (now SRI International or SRI), located in Menlo Park, California, maintained the official Arpanet Host Table. This work was carried out under contract ...
- opinionJanuary 2011
INWG and the Conception of the Internet: An Eyewitness Account
IEEE Annals of the History of Computing (ANHC), Volume 33, Issue 1Pages 66–71https://doi.org/10.1109/MAHC.2011.9The ARPANET, which came to life near the end of 1969, had grown to 29 nodes by August 1972. Other packet research projects were underway in Britain and France. Several national post, telephone, and telegraph (PTT) organizations were beginning to ...
- research-articleSeptember 2010
Lessons learned in evaluating DARPA advanced military technologies
PerMIS '10: Proceedings of the 10th Performance Metrics for Intelligent Systems WorkshopPages 227–234https://doi.org/10.1145/2377576.2377619For the past six years, personnel from the National Institute of Standards and Technology (NIST) have served as the Independent Evaluation Team (IET) for two major DARPA programs. DARPA ASSIST (Advanced Soldier Sensor Information System and Technology) ...
- opinionJuly 2010
The Network Information Center and its Archives
IEEE Annals of the History of Computing (ANHC), Volume 32, Issue 3Pages 83–89https://doi.org/10.1109/MAHC.2010.54The NIC was the hub of information exchange on the early Internet. This anecdotal article describes what and how information was exchanged back then and describes the dynamic collaboration that set the tone for how business was carried out on the ...
- ArticleApril 2010
Intrusion Detection and Attack Classification Using Feed-Forward Neural Network
ICCNT '10: Proceedings of the 2010 Second International Conference on Computer and Network TechnologyPages 262–266https://doi.org/10.1109/ICCNT.2010.28Fast Internet growth and increase in number of users make network security essential in recent decades. Lately one of the most hot research topics in network security is intrusion detection systems (IDSs) which try to keep security at the highest level. ...
- ArticleAugust 2009
Modeling Human, Social, Cultural or Behavioral Events for Real World Applications: Results and Implications from the State Stability Project
CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 04Pages 683–690https://doi.org/10.1109/CSE.2009.410Research analysts and decisions makers must find new, more efficient ways to assess world events. Time demands have increasingly exposed limitations in traditional wholly human-based analysis and the capabilities of current HSCB analysis frameworks. ...
- research-articleAugust 2008
Evolution of the SCORE framework to enhance field-based performance evaluations of emerging technologies
PerMIS '08: Proceedings of the 8th Workshop on Performance Metrics for Intelligent SystemsPages 1–8https://doi.org/10.1145/1774674.1774676NIST has developed the System, Component, and Operationally-Relevant Evaluations (SCORE) framework as a formal guide for designing evaluations of emerging technologies. SCORE captures both technical performance and end-user utility assessments of ...
- research-articleMarch 2008
Avoiding Another AI Winter
IEEE Intelligent Systems (IEEECS-INTELLI-NEW), Volume 23, Issue 2Pages 2–4https://doi.org/10.1109/MIS.2008.20Is artificial intelligence headed for another AI Winter? Not if we take action now.
- review-articleSeptember 2005
In the News
Following the Money: Research Funding Fluctuates Globally, Greg Goth Is computer science research being threatened by funding decreases due to the rise of other disciplines?Standards Aim to Improve Computer Security, Terry CostlowStandards bodies are ...