1,566 research outputs found

    Using Artificial Intelligence to Identify Perpetrators of Technology Facilitated Coercive Control

    Get PDF
    This study is one of the 21 projects funded by the Home Office for research on perpetrators of domestic abuse. It is interested in a specific form of domestic abuse known as Technology Facilitated Coercive Control (TFCC) and focussed on the digital communication between (alleged) perpetrators and victim/survivors held on mobile phones. The purpose of this feasibility study was twofold, i. to test the viability of an Artificial Intelligence (AI) programme to identify () perpetrators (including alleged perpetrators) of domestic abuse using digital communications held on mobile phones ii. to examine police and victim/survivor attitudes towards using AI in police investigations. Using digital conversations extracted from court transcriptions where TFCC was identified as a factor in the offending, the research team tested data sets built on different methods and techniques of AI. Natural Language Processing (NLP) tools, a subfield of AI, were also tested for their speed and accuracy in recognising abusive communication and identifying and risk assessing perpetrators of TFCC. Conscious of national concern about policing practices relating to Violence Against Women and Girls and that any AI programme would be futile without the co-operation of both the police and the public, two online surveys were devised to measure opinion. The first sought insight into the attitudes of victim/survivors, viewed as experts in domestic abuse, about using AI in police investigations. The second involved the police and questioned their views of using AI in this way

    Using Artificial Intelligence to Identify Perpetrators of Technology Facilitated Coercive Control.

    Get PDF
    This study investigated the feasibility of using Artificial Intelligence to identify perpetrators of coercive control through digital data held on mobile phones. The research also sought the views of the police and victim/survivors of domestic abuse to using technology in this way

    Combining content and social features in a deep learning approach to Vietnamese email prioritization

    Get PDF
    The email overload problem has been discussed in numerous email-related studies. One of the possible solutions to this problem is email prioritization, which is the act of automatically predicting the importance levels of received emails and sorting the user’s inbox accordingly. Several learning-based methods have been proposed to address the email prioritization problem using content features as well as social features. Although these methods have laid the foundation works in this field of study, the reported performance is far from being practical. Recent works on deep neural networks have achieved good results in various tasks. In this paper, the authors propose a novel email prioritization model which incorporates several deep learning techniques and uses a combination of both content features and social features from email data. This method targets Vietnamese emails and is tested against a self-built Vietnamese email corpus. Conducted experiments explored the effects of different model configurations and compared the effectiveness of the new method to that of a previous work

    AI Solutions for MDS: Artificial Intelligence Techniques for Misuse Detection and Localisation in Telecommunication Environments

    Get PDF
    This report considers the application of Articial Intelligence (AI) techniques to the problem of misuse detection and misuse localisation within telecommunications environments. A broad survey of techniques is provided, that covers inter alia rule based systems, model-based systems, case based reasoning, pattern matching, clustering and feature extraction, articial neural networks, genetic algorithms, arti cial immune systems, agent based systems, data mining and a variety of hybrid approaches. The report then considers the central issue of event correlation, that is at the heart of many misuse detection and localisation systems. The notion of being able to infer misuse by the correlation of individual temporally distributed events within a multiple data stream environment is explored, and a range of techniques, covering model based approaches, `programmed' AI and machine learning paradigms. It is found that, in general, correlation is best achieved via rule based approaches, but that these suffer from a number of drawbacks, such as the difculty of developing and maintaining an appropriate knowledge base, and the lack of ability to generalise from known misuses to new unseen misuses. Two distinct approaches are evident. One attempts to encode knowledge of known misuses, typically within rules, and use this to screen events. This approach cannot generally detect misuses for which it has not been programmed, i.e. it is prone to issuing false negatives. The other attempts to `learn' the features of event patterns that constitute normal behaviour, and, by observing patterns that do not match expected behaviour, detect when a misuse has occurred. This approach is prone to issuing false positives, i.e. inferring misuse from innocent patterns of behaviour that the system was not trained to recognise. Contemporary approaches are seen to favour hybridisation, often combining detection or localisation mechanisms for both abnormal and normal behaviour, the former to capture known cases of misuse, the latter to capture unknown cases. In some systems, these mechanisms even work together to update each other to increase detection rates and lower false positive rates. It is concluded that hybridisation offers the most promising future direction, but that a rule or state based component is likely to remain, being the most natural approach to the correlation of complex events. The challenge, then, is to mitigate the weaknesses of canonical programmed systems such that learning, generalisation and adaptation are more readily facilitated

    Proceedings of the 84th European Study Group Mathematics with Industry (SWI 2012), Eindhoven, January 30 - February 3, 2012

    Get PDF
    Introduction There are a few welldefined moments when mathematicians can get in contact with relevant unsolved problems proposed by the industry. One such a moment is the socalled "Study Group". The concept of the Study Group is rather simple and quite efficient: A group of mathematicians (of very different expertise) work together for one week. As a rule, on a Monday the industrial problems are presented by their owners, then few research groups selforganize around the proposed problems and work intensively until Friday, when the main findings are presented. The insight obtained via mathematical modeling together with the transfer of suitable mathematical technology usually lead the groups to adequate approximate solutions. As a direct consequence of this fact, the problem owners often decide to benefit more from such knowledge transfer and suggest related followup projects. In the period January 31– February 3, 2012, it was the turn of the Department of Mathematics and Computer Science of the Eindhoven University of Technology to organize and to host the "Studiegroep Wiskunde met de Industrie/Study Group Mathematics with the Industry" (shortly: SWI 2012, but also referred to as ESG 84, or as the 84th European Study Group with Industry). This was the occasion when about 80 mathematicians enjoyed working on six problems. Most of the participants were coming from a Dutch university, while a few were from abroad (e.g. from UK, Germany, France, India, Russia, Georgia, Turkey, India, and Sri Lanka). The open industrial problems were proposed by Endinet, Philips Lighting, Thales, Marin, Tata Steel, and Bartels Engineering. Their solutions are shown in this proceedings. They combine ingenious mathematical modeling with specific mathematical tools like geometric algorithms, combinatorial optimization of networks, identification of parameters and model structures, probability theory, and statistical data analysis. It is worth mentioning that this scientific proceedings is accompanied by a popular proceedings, written by Ionica Smeets, containing layman’s descriptions of the proposed problems and of the corresponding results

    Proceedings of the 84th European Study Group Mathematics with Industry (SWI 2012), Eindhoven, January 30 - February 3, 2012

    Get PDF
    Introduction There are a few welldefined moments when mathematicians can get in contact with relevant unsolved problems proposed by the industry. One such a moment is the socalled "Study Group". The concept of the Study Group is rather simple and quite efficient: A group of mathematicians (of very different expertise) work together for one week. As a rule, on a Monday the industrial problems are presented by their owners, then few research groups selforganize around the proposed problems and work intensively until Friday, when the main findings are presented. The insight obtained via mathematical modeling together with the transfer of suitable mathematical technology usually lead the groups to adequate approximate solutions. As a direct consequence of this fact, the problem owners often decide to benefit more from such knowledge transfer and suggest related followup projects. In the period January 31– February 3, 2012, it was the turn of the Department of Mathematics and Computer Science of the Eindhoven University of Technology to organize and to host the "Studiegroep Wiskunde met de Industrie/Study Group Mathematics with the Industry" (shortly: SWI 2012, but also referred to as ESG 84, or as the 84th European Study Group with Industry). This was the occasion when about 80 mathematicians enjoyed working on six problems. Most of the participants were coming from a Dutch university, while a few were from abroad (e.g. from UK, Germany, France, India, Russia, Georgia, Turkey, India, and Sri Lanka). The open industrial problems were proposed by Endinet, Philips Lighting, Thales, Marin, Tata Steel, and Bartels Engineering. Their solutions are shown in this proceedings. They combine ingenious mathematical modeling with specific mathematical tools like geometric algorithms, combinatorial optimization of networks, identification of parameters and model structures, probability theory, and statistical data analysis. It is worth mentioning that this scientific proceedings is accompanied by a popular proceedings, written by Ionica Smeets, containing layman’s descriptions of the proposed problems and of the corresponding results

    Advances in Artificial Intelligence: Models, Optimization, and Machine Learning

    Get PDF
    The present book contains all the articles accepted and published in the Special Issue “Advances in Artificial Intelligence: Models, Optimization, and Machine Learning” of the MDPI Mathematics journal, which covers a wide range of topics connected to the theory and applications of artificial intelligence and its subfields. These topics include, among others, deep learning and classic machine learning algorithms, neural modelling, architectures and learning algorithms, biologically inspired optimization algorithms, algorithms for autonomous driving, probabilistic models and Bayesian reasoning, intelligent agents and multiagent systems. We hope that the scientific results presented in this book will serve as valuable sources of documentation and inspiration for anyone willing to pursue research in artificial intelligence, machine learning and their widespread applications

    Firewall resistance to metaferography in network communications

    Get PDF
    In recent years corporations and other enterprises have seen a consolidation of security services on the network perimeter. Services that have traditionally been stand-alone, such as content filtering and antivirus scanning, are pushing their way to the edge and running on security gateways such as firewalls. As a result, firewalls have transitioned from devices that protect availability by preventing denial-of-service to devices that are also responsible for protecting the confidentiality and integrity of data. However, little, if any, practical research has been done on the ability of existing technical controls such as firewalls to detect and prevent covert channels. The experiment in this thesis has been designed to evaluate the effectiveness of firewalls—specifically application-layer firewalls—in detecting, correcting, and preventing covert channels. Several application-layer HTTP covert channel tools, including Wsh and CCTT (both storage channels), as well as Leaker/Recover (a timing channel), are tested using the 7-layer OSI Network Model as a framework for analysis. This thesis concludes that with a priori knowledge of the covert channel and proper signatures, application-layer firewalls can detect both storage and timing channels. Without a priori knowledge of the covert channel, either a heuristic-based or a behavioral-based detection technique would be required. In addition, this thesis demonstrates that application-layer firewalls inherently resist covert channels by adhering to strict type enforcement of RFC standards. This thesis also asserts that metaferography is a more appropriate term than covert channels to describe the study of “carried writing” since metaferography is consistent with the etymology and naming convention of the other main branches of information hiding—namely cryptography and steganography
    • …
    corecore