Skip to main content

Home/ Groups/ CSIA 459
1More

Smart home - digitally engineered domestic life - 0 views

  •  
    The author's primary focus is to provide consumers with an improved home life experience by integrating technology in their daily lives.
1More

Extracting and visualizing human activity patterns of daily living in a smart home envi... - 0 views

  •  
    In this paper, the author uses smart home technologies used today to test and analyze human behavior patterns.
1More

Home Smart Home - 0 views

  •  
    In this article, the author describes for consumers the different tools available for achieving an automated home.
1More

Autonomous Military Robotics: Risk, Ethics, and Design - 0 views

  •  
    This is an excellent report that was written for the Navy Office of Naval Research regarding semi and autonomous robots usage in the military. It covers everything from various land, sea, and space applications to rules of engagement and the decision making chain. A must read for those who find military robots fascinating.
1More

Insurgents Hack U.S. Drones - 0 views

  •  
    This was an interesting source that talks about how our adversary can utilized off the shelf programs to defeat the multi-million dollars system of our UAV programs.
1More

Computing and Comms Driving UAVS - 0 views

  •  
    This article requires that you login into the UMUC Library in order to view it. It dealt with a more technical aspect of what the UAV is all about it. It contains drawings and addresses some ethical concerns.
1More

Robots, the Military's Newest Forces - 0 views

  •  
    This source describes various applications of robotic usage by the military. It also talks about damages caused by them whether intentional or by mistakes.
1More

Obama meets bin Laden raiders, promises victory over al Qaeda - 0 views

  •  
    Conflicts are become ever increasing and I used this source to show that the U.S. will be relying more on small forces such as the SEAL team in conjunction with unmanned robots.
1More

This Malicious Charger Can Hack Your iPhone | Diigo - 0 views

  •  
    This article describes the device created by a Georgia Research team, known as Mactans that hacks iPhones through a compatible charger.
1More

Near field communication: Transforming transactions - 2 views

  •  
    This publication describes the various applications and the future possibilities of Near Field Communication in the mobile market.
1More

Defining business models for near-field communication payments - 1 views

  •  
    This publication discusses the necessary factors involved in making the mass use of NFC technology a reality.
1More

Mobile near field communications: tap n' go, keep it secure and private - 1 views

  •  
    This publication focuses on the security risks of NFC technology. Also discussed are the methods being developed to mitigate these risks.
1More

Near Field Communication (NFC) - 1 views

  •  
    The authors of this publication describe the technology behind NFC, the various applications for NFC, and the devices that are currently, or have the potential to be, NFC enabled.
1More

Status - mobile wallets utilizing near field communication (NFC) technology. - 1 views

  •  
    This publication outlines the various companies that are offering "mobile wallets" as a payment option. The authors describe Google and Visa as leading the industry as companies who are leading the way with NFC technology implementation. Also discussed is state of acquisitions between the major credit companies and competing mobile wallet platforms.
1More

Cyber Modeling (5 of 5) - 0 views

  •  
    Game Theoretic Solutions to Cyber Attack and Network Defense Problems
1More

Cyber Modeling (4 of 5) - 0 views

  •  
    Queuing Model for Malicious Attack Detection.
1More

Cyber Modeling (3 of 5) - 0 views

  •  
    The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions.
1More

Cyber Modeling (2 of 5) - 0 views

  •  
    School studies Net attacks.
1More

Cyber Modeling (1 of 5) - 1 views

  •  
    Mathematical model on the transmission of worms in wireless sensor network.
1More

Perceptions of biometric experts on whether or not biometric modalities will combat ide... - 0 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source is from Capella University. It explains how identity fraud can be reduced with the use of fingerprinting.
« First ‹ Previous 61 - 80 of 336 Next › Last »
Showing 20 items per page