Surveillance/Attributions: Difference between revisions
Academicdave (talk | contribs) No edit summary |
Academicdave (talk | contribs) No edit summary |
||
Line 1: | Line 1: | ||
=== '''Articles:''' === | === '''Articles:''' === AbuHmed, T. Mohaisen, A. Nyang, D. (2008). 'A Survey on Deep Packet Inspection for Intrusion Detection Systems.' ''eprint arXiv.org''. 0803.0037, 3, 2008. [http://arxiv.org/abs/0803.0037v1 http://arxiv.org/abs/0803.0037v1] Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br> <br> Artikis, A. Paliouras, G. (2009). 'A Logic Programming Approach to Behaviour Recognition.' ''eprint arXiv.org''. 0905.4614. 5, 2009. [http://arxiv.org/abs/0905.4614v1 http://arxiv.org/abs/0905.4614v1] Licence: © 2009 Artikis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br> <br> Benabbas, Y., Ihaddadene, N. and Djeraba, C.(2011) “Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance,” ''EURASIP Journal on Image and Video Processing'', vol. 2011, Article ID 163682, 4, 2011. [http://www.hindawi.com/journals/ivp/2011/163682/ doi:10.1155/2011/163682] Licence: © 2011 Benabbas et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Chan EH, Sahai V, Conrad C, Brownstein JS, 2011 'Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance.' ''PLoS ''Negl Trop Dis 5(5): e1206. [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 doi:10.1371/journal.pntd.0001206] Licence: © 2011 Chan et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Chandramohan D, Shibuya K, Setel P, Cairncross S, Lopez AD, et al. (2008) 'Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers?' ''PLoS Med'' 5(2): e57. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 doi:10.1371/journal.pmed.0050057] Licence: © 2008 Chandramohan. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> De Nardi, R. Holland, O. (2007). 'SwarMav: A Swarm of Miniature Aerial Vehicles.' Conference Presentation. ''Cogprints''. 5569. 5, 2007. [http://cogprints.org/5569/ http://cogprints.org/5569/] Licence: © 2007 De Nardi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Gayo-Avello, D. (2010). 'All liaisons are dangerous when all your friends are known to us.' ''eprint arXiv.org''. 1012.5913, 12, 2010. [http://arxiv.org/abs/1012.5913 http://arxiv.org/abs/1012.5913] Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' ''eprint arXiv.org''. 1105.1950, 5, 2011. [http://arxiv.org/abs/1105.1950 http://arxiv.org/abs/1105.1950] Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010. [http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 doi:10.1371/journal.pone.0011233] Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Najafabadi, AT. Pourhassan, M. (2010) 'Web GIS and Public Health Data.' ''Online Journal of Health and Allied Sciences''. ''Cogprints''. 6972. 9, 2010. [http://cogprints.org/6972/ http://cogprints.org/6972/] Licence: © 2010 Najafabadi et. al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Ohm, Paul, (2008) 'The Rise and Fall of Invasive ISP Surveillance' (August 30, 2008). University of Illinois Law Review, 2009; U of Colorado Law Legal Studies Research Paper No. 08-22. Available at SSRN: [http://ssrn.com/abstract=1261344 http://ssrn.com/abstract=1261344] Licence: © 2008 Ohm. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Pushpavathi, TP. Selvarani, R. Shahsi Kumar, NR. (2010). 'GPRS video Streaming Surveillance System GVSS.' ''eprint arXiv.org'' 1002.3011. 2, 2010. [http://arxiv.org/abs/1002.3011v1 http://arxiv.org/abs/1002.3011v1] Licence: © 2010 Pushpavathi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Rennie S, Turner AN, Mupenda B, Behets F, (2009) 'Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns.' ''PLoS Med'' 6(1): e1000004. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 doi:10.1371/journal.pmed.1000004] Licence: © 2009. Rennie et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Solove, Daniel J., (2008) 'Data Mining and the Security-Liberty Debate.' ''University of Chicago Law Review'', Vol. 74, p. 343, 2008; GWU Law School Public Law Research Paper No. 278. Available at SSRN: [http://ssrn.com/abstract=990030 http://ssrn.com/abstract=990030] Licence: © 2008 Solove. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Tene, Omer, 'What Google Knows: Privacy and Internet Search Engines' (October 1, 2007). Utah Law Review, Vol 2008, No4. Available at SSRN: [http://ssrn.com/abstract=1021490 http://ssrn.com/abstract=1021490] Licence: © 2007 Tene. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. <br> Warren, S. Brandeis, L. (1890). 'The Right to Privacy' ''Harvard Law Review''. Vol IV, No. 5. 12, 1890. [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html] License: Public Domain. === '''In the Appendix'''<br>Bond, David. Erasing David. 2009. Available online at: http://erasingdavid.com/<br>Morgan, T. 'Location Makes mobile Mobile.' Momo Amsterdam Talk. 1, 2010. Available online at: http://www.youtube.com/watch?v=bIJyWi9YsYU<br>Steel, E. "A Web Pioneer Profiles Users by Name." & 'Cracking the Code.' Wall Street Journal. October 25, 2010. Available online at: http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html and http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html<br>Timoner, Ondi. We Live in Public. 2009. Available online at: http://www.hulu.com/watch/192218/we-live-in-public === | ||
AbuHmed, T. Mohaisen, A. Nyang, D. (2008). 'A Survey on Deep Packet Inspection for Intrusion Detection Systems.' ''eprint arXiv.org''. 0803.0037, 3, 2008. [http://arxiv.org/abs/0803.0037v1 http://arxiv.org/abs/0803.0037v1] | |||
Licence: © 2010 AbuHmed et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br> | |||
<br> | |||
Artikis, A. Paliouras, G. (2009). 'A Logic Programming Approach to Behaviour Recognition.' ''eprint arXiv.org''. 0905.4614. 5, 2009. [http://arxiv.org/abs/0905.4614v1 http://arxiv.org/abs/0905.4614v1] | |||
Licence: © 2009 Artikis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.<br> | |||
<br> | |||
Benabbas, Y., Ihaddadene, N. and Djeraba, C.(2011) “Motion Pattern Extraction and Event Detection for Automatic Visual Surveillance,” ''EURASIP Journal on Image and Video Processing'', vol. 2011, Article ID 163682, 4, 2011. [http://www.hindawi.com/journals/ivp/2011/163682/ doi:10.1155/2011/163682] | |||
Licence: © 2011 Benabbas et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Chan EH, Sahai V, Conrad C, Brownstein JS, 2011 'Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance.' ''PLoS ''Negl Trop Dis 5(5): e1206. [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 doi:10.1371/journal.pntd.0001206] | |||
Licence: © 2011 Chan et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Chandramohan D, Shibuya K, Setel P, Cairncross S, Lopez AD, et al. (2008) 'Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers?' ''PLoS Med'' 5(2): e57. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 doi:10.1371/journal.pmed.0050057] | |||
Licence: © 2008 Chandramohan. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
De Nardi, R. Holland, O. (2007). 'SwarMav: A Swarm of Miniature Aerial Vehicles.' Conference Presentation. ''Cogprints''. 5569. 5, 2007. [http://cogprints.org/5569/ http://cogprints.org/5569/] | |||
Licence: © 2007 De Nardi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Gayo-Avello, D. (2010). 'All liaisons are dangerous when all your friends are known to us.' ''eprint arXiv.org''. 1012.5913, 12, 2010. [http://arxiv.org/abs/1012.5913 http://arxiv.org/abs/1012.5913] | |||
Licence: © 2010 Gayo-Avello. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Kholghi, M. Keyvanpour, M. (2011). 'An analytical framework for data stream mining techniques based on challenges and requirements.' ''eprint arXiv.org''. 1105.1950, 5, 2011. [http://arxiv.org/abs/1105.1950 http://arxiv.org/abs/1105.1950] | |||
Licence: © 2011 Khoglhi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Lee SH, Kim P-J, Ahn Y-Y, Jeong H, (2010). 'Googling Social Interactions: Web Search Engine Based Social Network Construction.' PLoS ONE 5(7): e11233. 3, 2010. [http://www.plosone.org/article/info:doi/10.1371/journal.pone.0011233 doi:10.1371/journal.pone.0011233] | |||
Licence: © 2010 Lee et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Najafabadi, AT. Pourhassan, M. (2010) 'Web GIS and Public Health Data.' ''Online Journal of Health and Allied Sciences''. ''Cogprints''. 6972. 9, 2010. [http://cogprints.org/6972/ http://cogprints.org/6972/] | |||
Licence: © 2010 Najafabadi et. al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Ohm, Paul, (2008) 'The Rise and Fall of Invasive ISP Surveillance' (August 30, 2008). University of Illinois Law Review, 2009; U of Colorado Law Legal Studies Research Paper No. 08-22. Available at SSRN: [http://ssrn.com/abstract=1261344 http://ssrn.com/abstract=1261344] | |||
Licence: © 2008 Ohm. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Pushpavathi, TP. Selvarani, R. Shahsi Kumar, NR. (2010). 'GPRS video Streaming Surveillance System GVSS.' ''eprint arXiv.org'' 1002.3011. 2, 2010. [http://arxiv.org/abs/1002.3011v1 http://arxiv.org/abs/1002.3011v1] | |||
Licence: © 2010 Pushpavathi et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Rennie S, Turner AN, Mupenda B, Behets F, (2009) 'Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns.' ''PLoS Med'' 6(1): e1000004. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1000004 doi:10.1371/journal.pmed.1000004] | |||
Licence: © 2009. Rennie et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Solove, Daniel J., (2008) 'Data Mining and the Security-Liberty Debate.' ''University of Chicago Law Review'', Vol. 74, p. 343, 2008; GWU Law School Public Law Research Paper No. 278. Available at SSRN: [http://ssrn.com/abstract=990030 http://ssrn.com/abstract=990030] | |||
Licence: © 2008 Solove. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Tene, Omer, 'What Google Knows: Privacy and Internet Search Engines' (October 1, 2007). Utah Law Review, Vol 2008, No4. Available at SSRN: [http://ssrn.com/abstract=1021490 http://ssrn.com/abstract=1021490] | |||
Licence: © 2007 Tene. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | |||
<br> | |||
Warren, S. Brandeis, L. (1890). 'The Right to Privacy' ''Harvard Law Review''. Vol IV, No. 5. 12, 1890. [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html] | |||
License: Public Domain. | |||
=== '''In the Appendix'''<br>Bond, David. Erasing David. 2009. Available online at: http://erasingdavid.com/<br>Morgan, T. 'Location Makes mobile Mobile.' Momo Amsterdam Talk. 1, 2010. Available online at: http://www.youtube.com/watch?v=bIJyWi9YsYU<br>Steel, E. "A Web Pioneer Profiles Users by Name." & 'Cracking the Code.' Wall Street Journal. October 25, 2010. Available online at: http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html and http://s.wsj.net/public/resources/documents/st_RAPLEAF_20101018.html<br>Timoner, Ondi. We Live in Public. 2009. Available online at: http://www.hulu.com/watch/192218/we-live-in-public === |