Visible to the public Biblio

Filters: Keyword is traffic surveillance  [Clear All Filters]
2023-03-31
Vinod, G., Padmapriya, Dr. G..  2022.  An Intelligent Traffic Surveillance for Detecting Real-Time Objects Using Deep Belief Networks over Convolutional Neural Networks with improved Accuracy. 2022 International Conference on Business Analytics for Technology and Security (ICBATS). :1–4.
Aim: Object Detection is one of the latest topics in today’s world for detection of real time objects using Deep Belief Networks. Methods & Materials: Real-Time Object Detection is performed using Deep Belief Networks (N=24) over Convolutional Neural Networks (N=24) with the split size of training and testing dataset 70% and 30% respectively. Results: Deep Belief Networks has significantly better accuracy (81.2%) compared to Convolutional Neural Networks (47.7%) and attained significance value of p = 0.083. Conclusion: Deep Belief Networks achieved significantly better object detection than Convolutional Neural Networks for identifying real-time objects in traffic surveillance.
2018-04-02
Elgzil, A., Chow, C. E., Aljaedi, A., Alamri, N..  2017.  Cyber Anonymity Based on Software-Defined Networking and Onion Routing (SOR). 2017 IEEE Conference on Dependable and Secure Computing. :358–365.

Cyber anonymity tools have attracted wide attention in resisting network traffic censorship and surveillance, and have played a crucial role for open communications over the Internet. The Onion Routing (Tor) is considered the prevailing technique for circumventing the traffic surveillance and providing cyber anonymity. Tor operates by tunneling a traffic through a series of relays, making such traffic to appear as if it originated from the last relay in the traffic path, rather than from the original user. However, Tor faced some obstructions in carrying out its goal effectively, such as insufficient performance and limited capacity. This paper presents a cyber anonymity technique based on software-defined networking; named SOR, which builds onion-routed tunnels across multiple anonymity service providers. SOR architecture enables any cloud tenants to participate in the anonymity service via software-defined networking. Our proposed architecture leverages the large capacity and robust connectivity of the commercial cloud networks to elevate the performance of the cyber anonymity service.

2015-05-05
Eckhoff, D., Sommer, C..  2014.  Driving for Big Data? Privacy Concerns in Vehicular Networking Security Privacy, IEEE. 12:77-79.

Communicating vehicles will change road traffic as we know it. With current versions of European and US standards in mind, the authors discuss privacy and traffic surveillance issues in vehicular network technology and outline research directions that could address these issues.