Surveillance/Attributions

From Books

Jump to: navigation, search

Back to the book

AbuHmed, T. Mohaisen, A. Nyang, D. (2008). 'A Survey on Deep Packet Inspection for Intrusion Detection Systems,' arXiv. 0803.0037, 3, 2008. http://arxiv.org/abs/0803.0037v1
Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Artikis, A. Paliouras, G. (2009) 'A Logic Programming Approach to Behaviour Recognition,' arXiv. 0905.4614. 5, 2009. http://arxiv.org/abs/0905.4614v1
Licence: © 2009 Artikis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Benabbas, Y., Ihaddadene, N. and Djeraba, C.(2011) 'Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance,' EURASIP Journal on Image and Video Processing, Article ID 163682, 4. doi:10.1155/2011/163682
Licence: © 2011 Benabbas et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Chan, E.H., Sahai, V., Conrad, C., Brownstein, J.S., (2011) 'Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance.' PLoS Negl Trop Dis 5(5): e1206. doi:10.1371/journal.pntd.0001206
Licence: © 2011 Chan et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Chandramohan D, Shibuya K, Setel P, Cairncross S, Lopez AD, et al. (2008) 'Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers?' PLoS Med 5(2): e57. doi:10.1371/journal.pmed.0050057
Licence: © 2008 Chandramohan. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

De Nardi, R. Holland, O. (2007). 'SwarMav: A Swarm of Miniature Aerial Vehicles.' Conference Presentation. Cogprints. 5569. 5, 2007. http://cogprints.org/5569/
Licence: © 2007 De Nardi et al. Made available here via a link to the author's self-archived copy in the Cogprints repository.

Gayo-Avello, D. (2010). 'All Liaisons are Dangerous When all Your Friends are Known To Us.' eprint arXiv.org. 1012.5913, 12, 2010. http://arxiv.org/abs/1012.5913
Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' arXiv. 1105.1950, 5, 2011. http://arxiv.org/abs/1105.1950
Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010. doi:10.1371/journal.pone.0011233
Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Najafabadi, AT. Pourhassan, M. (2010) 'Web GIS and Public Health Data.' Online Journal of Health and Allied Sciences. Cogprints. 6972. 9, 2010. http://cogprints.org/6972/
Licence: © 2010 Najafabadi et. al. 'Made available here via a link to the author's self-archived copy in the Cogprints repository.

Ohm, Paul, (2008) 'The Rise and Fall of Invasive ISP Surveillance' (August 30, 2008). University of Illinois Law Review, 2009; U of Colorado Law Legal Studies Research Paper No. 08-22. Available at SSRN: http://ssrn.com/abstract=1261344
Licence: © 2008 Ohm. Made available here via a link to the author's self-archived copy in the SSRN repository.

Pushpavathi, T.P., Selvarani, T.P., Shahsi, R. & Kumar, N.R. (2010). 'GPRS video Streaming Surveillance System GVSS,' arXiv 1002.3011. 2, 2010. http://arxiv.org/abs/1002.3011v1
Licence: © 2010 Pushpavathi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Rennie, S., Turner, A.N., Mupenda, B., Behets, F., (2009) 'Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns.' PLoS Med 6(1): e1000004. doi:10.1371/journal.pmed.1000004
Licence: © 2009. Rennie et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Solove, D. J., (2008) 'Data Mining and the Security-Liberty Debate.' University of Chicago Law Review 74, p. 343; GWU Law School Public Law Research Paper No. 278. Available at SSRN: http://ssrn.com/abstract=990030
Licence: © 2008 Solove. Made available here via a link to the author's self-archived copy in the SSRN repository.

Tene, O. (2007) 'What Google Knows: Privacy and Internet Search Engines,' Published online in draft form October 1; finally published in Utah Law Review 2008 (4). Available at SSRN: http://ssrn.com/abstract=1021490

Licence: © 2007 Tene. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Warren, S. Brandeis, L. (1890). 'The Right to Privacy' Harvard Law Review IV (5). 12, 1890;[1]
License: In the public domain.

In the Appendix

Bond, D. (2009)Erasing David. Available online at: http://erasingdavid.com/

Morgan, T. (2010) 'Location Makes Mobile Mobile,' Momo Amsterdam Talk 1. Available online at: http://www.youtube.com/watch?v=bIJyWi9YsYU

Steel, E. (2010) "A Web Pioneer Profiles Users by Name." & 'Cracking the Code.' Wall Street Journal. October 25. Available online at: http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html and http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html

Timoner, O. (2009) We Live in Public. Available online at: http://www.hulu.com/watch/192218/we-live-in-public

Personal tools