Surveillance/Attributions: Difference between revisions

No edit summary
No edit summary
Line 47: Line 47:




Warren, S. Brandeis, L. (1890). 'The Right to Privacy' ''Harvard Law Review''. Vol IV, No. 5. 12, 1890. [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html]
Solove, Daniel J., (2008) 'Data Mining and the Security-Liberty Debate.' ''University of Chicago Law Review'', Vol. 74, p. 343, 2008; GWU Law School Public Law Research Paper No. 278. Available at SSRN: [http://ssrn.com/abstract=990030 http://ssrn.com/abstract=990030]
 
Licence: © 2008 Solove. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
 
<br>
 
Warren, S. Brandeis, L. (1890). 'The Right to Privacy' ''Harvard Law Review''. Vol IV, No. 5. 12, 1890.&nbsp;[http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html]  


License: Public Domain.
License: Public Domain.

Revision as of 16:16, 21 August 2011

AbuHmed, T. Mohaisen, A. Nyang, D. (2008). 'A Survey on Deep Packet Inspection for Intrusion Detection Systems.' eprint arXiv.org. 0803.0037, 3, 2008. http://arxiv.org/abs/0803.0037v1

Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Artikis, A. Paliouras, G. (2009). 'A Logic Programming Approach to Behaviour Recognition.' eprint arXiv.org. 0905.4614. 5, 2009. http://arxiv.org/abs/0905.4614v1

Licence: © 2009 Artikis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Benabbas, Y., Ihaddadene, N. and Djeraba, C.(2011) “Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance,” EURASIP Journal on Image and Video Processing, vol. 2011, Article ID 163682, 4, 2011. doi:10.1155/2011/163682

Licence: © 2011 Benabbas et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


De Nardi, R. Holland, O. (2007). 'SwarMav: A Swarm of Miniature Aerial Vehicles.' Conference Presentation. Cogprints. 5569. 5, 2007. http://cogprints.org/5569/

Licence: © 2007 De Nardi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Gayo-Avello, D. (2010). 'All liaisons are dangerous when all your friends are known to us.' eprint arXiv.org. 1012.5913, 12, 2010. http://arxiv.org/abs/1012.5913

Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' eprint arXiv.org. 1105.1950, 5, 2011. http://arxiv.org/abs/1105.1950

Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010. doi:10.1371/journal.pone.0011233

Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Pushpavathi, TP. Selvarani, R. Shahsi Kumar, NR. (2010). 'GPRS video Streaming Surveillance System GVSS.' eprint arXiv.org 1002.3011. 2, 2010. http://arxiv.org/abs/1002.3011v1

Licence: © 2010 Pushpavathi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Solove, Daniel J., (2008) 'Data Mining and the Security-Liberty Debate.' University of Chicago Law Review, Vol. 74, p. 343, 2008; GWU Law School Public Law Research Paper No. 278. Available at SSRN: http://ssrn.com/abstract=990030

Licence: © 2008 Solove. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.


Warren, S. Brandeis, L. (1890). 'The Right to Privacy' Harvard Law Review. Vol IV, No. 5. 12, 1890. http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html

License: Public Domain.