Computer surveillance

Results: 1478



#Item
61Cybercrime / Computer security / Surveillance / Harassment / Keystroke logging / Malware / Email / Hawkeye

Piercing the HawkEye: Nigerian Cybercriminals Use a Simple Keylogger to Prey on SMBs Worldwide Ryan Flores and Lord Remorin Trend Micro Forward-Looking Threat Research Team with Mary Yambao and Don Ladores

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2015-06-19 05:45:49
62Surveillance / Video / Computer printing / Line Printer Daemon protocol / Unix / IP camera / Automatic number plate recognition

PDF Document

Add to Reading List

Source URL: www.gvdigital.com

Language: English - Date: 2014-07-04 04:15:17
63Feature detection / Statistical classification / Face recognition / Pedestrian detection / Surveillance / ViolaJones object detection framework / Cascading classifiers / Support vector machine / Edge detection / Receiver operating characteristic / Histogram of oriented gradients / Computer-aided diagnosis

2013 IEEE Intelligent Vehicles Symposium (IV) June 23-26, 2013, Gold Coast, Australia Design and implementation of a high performance pedestrian detection Antonio Prioletti1 , Paolo Grisleri2 , Mohan M. Trivedi3 and Albe

Add to Reading List

Source URL: cvrr.ucsd.edu

Language: English - Date: 2013-07-08 00:37:28
64Crime prevention / Cryptography / Information governance / National security / Security guard / Surveillance / Computer security / Email

How to Manage ePermitting Security

Add to Reading List

Source URL: apps.dep.wv.gov

Language: English - Date: 2014-04-22 11:10:39
65Avionics / Aircraft collision avoidance systems / Warning systems / Aircraft instruments / Traffic collision avoidance system / Computer file formats / Airborne collision avoidance system / ARINC / Automatic dependent surveillance  broadcast / Honeywell

MILACAS-XR POSSIBILITIES OF SAFETY. MADE EASY. MILACAS-XR TCAS II Processor. Change 7.1 For New Installations

Add to Reading List

Source URL: aerospace.honeywell.com

Language: English - Date: 2016-02-22 04:38:32
66Mobile software / Surveillance / EagleEyes / User interface techniques / Computer mouse / Educational technology / Speech recognition / Boston University / University of Utah

WinterEagleEyes Project Boston College Editor: Kelly Robinson, MBA 2008

Add to Reading List

Source URL: cameramouse.org

Language: English - Date: 2013-10-22 13:20:53
67Theoretical computer science / Robotics / Mobile robot / Robot / Motion planning / Algorithm

Auton Robot:173–188 DOIs10514Optimal surveillance coverage for teams of micro aerial vehicles in GPS-denied environments using onboard vision Lefteris Doitsidis · Stephan Weiss · Alessa

Add to Reading List

Source URL: rpg.ifi.uzh.ch

Language: English - Date: 2013-11-17 14:31:28
68Spyware / Surveillance / Cyberwarfare / National security / Cybercrime / Computer and Internet Protocol Address Verifier / Computer security / Malware / Internet privacy / Phishing / Federal Bureau of Investigation / Hacking Team

MEMORANDUM To: From: Date: Re:

Add to Reading List

Source URL: www.aclu.org

Language: English - Date: 2015-04-10 18:25:21
69Security / Prevention / Government / Mass surveillance / Crime prevention / Law enforcement / National security / Phillip Rogaway / Surveillance / Bullrun / William Binney / Edward Snowden

Statement of Condemnation of U.S. Mass-Surveillance Programs, and a Reminder of Our Ethical Responsibilities as Computer Scientists We have all been hearing about the NSA’s mass-surveillance programs, which go by names

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2013-09-13 11:08:48
70

Three Researchers, Five Conjectures: An Empirical Analysis of TOM-Skype Censorship and Surveillance Jeffrey Knockel, Jedidiah R. Crandall, and Jared Saia University of New Mexico Dept. of Computer Science {jeffk, crandal

Add to Reading List

Source URL: cs.unm.edu

Language: English - Date: 2011-08-01 19:43:41
    UPDATE