Now showing items 1-4 of 4
An analysis of face matching accuracy and related variables: a meta-analysis and two follow-up studies
Face matching is used in many different transportation and policing situations and is an important last line of defense in security contexts such as the TSA. Despite how important this task is in ensuring security, no ...
Agent-based modeling framework for adaptive cyber defence of the Internet of Things
The adoption of the Internet of Things (IoT) continues to increase significantly, introducing unique challenges and threats to cybersecurity. In parallel, adaptive and autonomous cyber defence has become an emerging research ...
Virtual machine detection through Central Processing Unit (CPU) detail anomalies
Malware analysts commonly use virtual machines to provide safe environments to study malware. Malware authors in response, include virtual machine detection functions in their malware so it changes its behavior should a ...
Towards a computational model of information trust
Information has been an essential element in the development of collaborative and cooperative frameworks. From decision making to the attainment of different goals, people have been relatively adept at making judgments ...