Biblio

Found 2246 results

Filters: First Letter Of Last Name is J  [Clear All Filters]
2018-06-04
2019-09-24
Barford, Paul, Dacier, Marc, Dietterich, Thomas G., Fredrikson, Matt, Giffin, Jon, Jajodia, Sushil, Jha, Somesh, Li, Jason, Liu, Peng, Ning, Peng et al..  2010.  Cyber SA: Situational Awareness for Cyber Defense. Cyber Situational Awareness: Issues and Research. 46:3–13.

Cyber SA is described as the current and predictive knowledge of cyberspace in relation to the Network, Missions and Threats across friendly, neutral and adversary forces. While this model provides a good high-level understanding of Cyber SA, it does not contain actionable information to help inform the development of capabilities to improve SA. In this paper, we present a systematic, human-centered process that uses a card sort methodology to understand and conceptualize Senior Leader Cyber SA requirements. From the data collected, we were able to build a hierarchy of high- and low- priority Cyber SA information, as well as uncover items that represent high levels of disagreement with and across organizations. The findings of this study serve as a first step in developing a better understanding of what Cyber SA means to Senior Leaders, and can inform the development of future capabilities to improve their SA and Mission Performance.

2018-05-23
2018-06-04
Heaslip, Kevin, Jones, Josh, Harpst, Tim, Bolling, Doyt.  2010.  Implementation of road safety audit recommendations: case study in Salt Lake City, Utah. Transportation Research Record: Journal of the Transportation Research Board. :105–112.
2018-05-27
Peter Jones, Venkatesh Saligrama, Sanjoy K. Mitter.  2010.  Probabilistic Belief Revision with Structural Constraints. Advances in Neural Information Processing Systems 23: 24th Annual Conference on Neural Information Processing Systems 2010. Proceedings of a meeting held 6-9 December 2010, Vancouver, British Columbia, Canada.. :1036–1044.
2015-11-18
Santiago Escobar, Universidad Politécnica de Valencia, Spain, Catherine Meadows, Naval Research Laboratory, Jose Meseguer, University of Illinois at Urbana-Champaign, Sonia Santiago, Universidad Politécnica de Valencia, Spain.  2010.  Sequential Protocol Composition in Maude-NPA. 15th European Conference on Research in Computer Security (ESORICS 2010).

Protocols do not work alone, but together, one protocol relying on another to provide needed services. Many of the problems in cryptographic protocols arise when such composition is done incorrectly or is not well understood. In this paper we discuss an extension to the Maude-NPA syntax and operational semantics to support dynamic sequential composition of protocols, so that protocols can be specified sepa- rately and composed when desired. This allows one to reason about many different compositions with minimal changes to the specification. Moreover, we show that, by a simple protocol transformation, we are able to analyze and verify this dynamic composition in the current Maude-NPA tool. We prove soundness and completeness of the protocol transforma- tion with respect to the extended operational semantics, and illustrate our results on some examples.

2018-05-27
Venkatesh Saligrama, Janusz Konrad, Pierre{-}Marc Jodoin.  2010.  Video Anomaly Identification. {IEEE} Signal Process. Mag.. 27:18–33.
2014-09-26
Bursztein, E., Bethard, S., Fabry, C., Mitchell, J.C., Jurafsky, D..  2010.  How Good Are Humans at Solving CAPTCHAs? A Large Scale Evaluation Security and Privacy (SP), 2010 IEEE Symposium on. :399-413.

Captchas are designed to be easy for humans but hard for machines. However, most recent research has focused only on making them hard for machines. In this paper, we present what is to the best of our knowledge the first large scale evaluation of captchas from the human perspective, with the goal of assessing how much friction captchas present to the average user. For the purpose of this study we have asked workers from Amazon’s Mechanical Turk and an underground captchabreaking service to solve more than 318 000 captchas issued from the 21 most popular captcha schemes (13 images schemes and 8 audio scheme). Analysis of the resulting data reveals that captchas are often difficult for humans, with audio captchas being particularly problematic. We also find some demographic trends indicating, for example, that non-native speakers of English are slower in general and less accurate on English-centric captcha schemes. Evidence from a week’s worth of eBay captchas (14,000,000 samples) suggests that the solving accuracies found in our study are close to real-world values, and that improving audio captchas should become a priority, as nearly 1% of all captchas are delivered as audio rather than images. Finally our study also reveals that it is more effective for an attacker to use Mechanical Turk to solve captchas than an underground service.

2018-05-27
Manqi Zhao, Venkatesh Saligrama.  2009.  Anomaly Detection with Score functions based on Nearest Neighbor Graphs. Advances in Neural Information Processing Systems 22: 23rd Annual Conference on Neural Information Processing Systems 2009. Proceedings of a meeting held 7-10 December 2009, Vancouver, British Columbia, Canada.. :2250–2258.
Pierre{-}Marc Jodoin, Venkatesh Saligrama, Janusz Konrad.  2009.  Implicit Active-Contouring with MRF. Image Analysis and Recognition, 6th International Conference, {ICIAR} 2009, Halifax, Canada, July 6-8, 2009. Proceedings. 5627:178–190.
Erhan Baki Ermis, Venkatesh Saligrama, Pierre{-}Marc Jodoin, Janusz Konrad.  2008.  Abnormal behavior detection and behavior matching for networked cameras. 2008 Second {ACM/IEEE} International Conference on Distributed Smart Cameras, Stanford, CA, USA, September 7-11, 2008. :1–10.
2018-06-04
2018-05-27
Pierre{-}Marc Jodoin, Janusz Konrad, Venkatesh Saligrama.  2008.  Modeling background activity for behavior subtraction. 2008 Second {ACM/IEEE} International Conference on Distributed Smart Cameras, Stanford, CA, USA, September 7-11, 2008. :1–10.
Pierre{-}Marc Jodoin, Janusz Konrad, Venkatesh Saligrama, Vincent Veilleux{-}Gaboury.  2008.  Motion detection with an unstable camera. Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}. :229–232.
J. Mike McHugh, Janusz Konrad, Venkatesh Saligrama, Pierre{-}Marc Jodoin, David A. Castañón.  2008.  Motion detection with false discovery rate control. Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}. :873–876.
Erhan Baki Ermis, Venkatesh Saligrama, Pierre{-}Marc Jodoin, Janusz Konrad.  2008.  Motion segmentation and abnormal behavior detection via behavior clustering. Proceedings of the International Conference on Image Processing, {ICIP} 2008, October 12-15, 2008, San Diego, California, {USA}. :769–772.
Onur Savas, Murat Alanyali, Venkatesh Saligrama.  2006.  Efficient In-Network Processing Through Local Ad-Hoc Information Coalescence. Distributed Computing in Sensor Systems, Second {IEEE} International Conference, {DCOSS} 2006, San Francisco, CA, USA, June 18-20, 2006, Proceedings. 4026:252–265.
2019-09-09
G. Klien, D. D. Woods, J. M. Bradshaw, R. R. Hoffman, P. J. Feltovich.  2004.  Ten challenges for making automation a "team player" in joint human-agent activity. IEEE Intelligent Systems. 19:91-95.

We propose 10 challenges for making automation components into effective "team players" when they interact with people in significant ways. Our analysis is based on some of the principles of human-centered computing that we have developed individually and jointly over the years, and is adapted from a more comprehensive examination of common ground and coordination.