958 research outputs found
Messaging Forensics In Perspective
This chapter presents the central theme and a big picture of the methods and technologies covered in this book (see Fig. 2.2). For the readers to comprehend presented security and forensics issues, and associated solutions, the content is organized as components of a forensics analysis framework. The framework is employed to analyze online messages by integrating machine learning algorithms, natural language processing techniques, and social networking analysis techniques in order to help cybercrime investigation
Cybersecurity And Cybercrime Investigation
Society\u27s increasing reliance on technology, fueled by a growing desire for increased connectivity (given the increased productivity, efficiency, and availability to name a few motivations) has helped give rise to the compounded growth of electronic data. The increasing adoption of various technologies has driven the need to protect said technologies as well as the massive amount of electronic data produced by them. Almost every type of new technology created today, from homes and cars to fridges, toys, and stoves, is designed as a smart device, generating data as an auxiliary function. These devices are all now part of the Internet of Things (IoT), which is comprised of devices that have embedded sensors, networking capabilities, and features that can generate significant amounts of data. Not only has society seen a dramatic rise in the use of IoT devices, but there has also been a marked evolution in the way that businesses use these technologies to deliver goods and services. These include banking, shopping, and procedure-driven processes. These enhanced approaches to delivering added value create avenues for misuse and increase the potential for criminal activities by utilizing the digital information generated for malicious purposes. This threat requires protecting this information from unauthorized access, as this data (ranging from sensitive personal data, demographic data, business data, to system data and context data) can be monetized by criminals
Dynamical regimes and hydrodynamic lift of viscous vesicles under shear
The dynamics of two-dimensional viscous vesicles in shear flow, with
different fluid viscosities and inside and
outside, respectively, is studied using mesoscale simulation techniques.
Besides the well-known tank-treading and tumbling motions, an oscillatory
swinging motion is observed in the simulations for large shear rate. The
existence of this swinging motion requires the excitation of higher-order
undulation modes (beyond elliptical deformations) in two dimensions.
Keller-Skalak theory is extended to deformable two-dimensional vesicles, such
that a dynamical phase diagram can be predicted for the reduced shear rate and
the viscosity contrast . The simulation results
are found to be in good agreement with the theoretical predictions, when
thermal fluctuations are incorporated in the theory. Moreover, the hydrodynamic
lift force, acting on vesicles under shear close to a wall, is determined from
simulations for various viscosity contrasts. For comparison, the lift force is
calculated numerically in the absence of thermal fluctuations using the
boundary-integral method for equal inside and outside viscosities. Both methods
show that the dependence of the lift force on the distance of
the vesicle center of mass from the wall is well described by an effective
power law for intermediate distances with vesicle radius .
The boundary-integral calculation indicates that the lift force decays
asymptotically as far from the wall.Comment: 13 pages, 13 figure
Carthago Delenda Est: Co-opetitive Indirect Information Diffusion Model for Influence Operations on Online Social Media
For a state or non-state actor whose credibility is bankrupt, relying on bots
to conduct non-attributable, non-accountable, and
seemingly-grassroots-but-decentralized-in-actuality influence/information
operations (info ops) on social media can help circumvent the issue of trust
deficit while advancing its interests. Planning and/or defending against
decentralized info ops can be aided by computational simulations in lieu of
ethically-fraught live experiments on social media. In this study, we introduce
Diluvsion, an agent-based model for contested information propagation efforts
on Twitter-like social media. The model emphasizes a user's belief in an
opinion (stance) being impacted by the perception of potentially illusory
popular support from constant incoming floods of indirect information, floods
that can be cooperatively engineered in an uncoordinated manner by bots as they
compete to spread their stances. Our model, which has been validated against
real-world data, is an advancement over previous models because we account for
engagement metrics in influencing stance adoption, non-social tie spreading of
information, neutrality as a stance that can be spread, and themes that are
analogous to media's framing effect and are symbiotic with respect to stance
propagation. The strengths of the Diluvsion model are demonstrated in
simulations of orthodox info ops, e.g., maximizing adoption of one stance;
creating echo chambers; inducing polarization; and unorthodox info ops, e.g.,
simultaneous support of multiple stances as a Trojan horse tactic for the
dissemination of a theme.Comment: 60 pages, 9 figures, 1 tabl
Automatic Fall Risk Detection based on Imbalanced Data
In recent years, the declining birthrate and aging population have gradually brought countries into an ageing society. Regarding accidents that occur amongst the elderly, falls are an essential problem that quickly causes indirect physical loss. In this paper, we propose a pose estimation-based fall detection algorithm to detect fall risks. We use body ratio, acceleration and deflection as key features instead of using the body keypoints coordinates. Since fall data is rare in real-world situations, we train and evaluate our approach in a highly imbalanced data setting. We assess not only different imbalanced data handling methods but also different machine learning algorithms. After oversampling on our training data, the K-Nearest Neighbors (KNN) algorithm achieves the best performance. The F1 scores for three different classes, Normal, Fall, and Lying, are 1.00, 0.85 and 0.96, which is comparable to previous research. The experiment shows that our approach is more interpretable with the key feature from skeleton information. Moreover, it can apply in multi-people scenarios and has robustness on medium occlusion
- …