Skip to main content

Home/ Groups/ CSIA 459
LaToya White

Extracting and visualizing human activity patterns of daily living in a smart home envi... - 0 views

  •  
    In this paper, the author uses smart home technologies used today to test and analyze human behavior patterns.
LaToya White

Home Smart Home - 0 views

  •  
    In this article, the author describes for consumers the different tools available for achieving an automated home.
Rumnea Kelly

Autonomous Military Robotics: Risk, Ethics, and Design - 0 views

  •  
    This is an excellent report that was written for the Navy Office of Naval Research regarding semi and autonomous robots usage in the military. It covers everything from various land, sea, and space applications to rules of engagement and the decision making chain. A must read for those who find military robots fascinating.
Rumnea Kelly

Insurgents Hack U.S. Drones - 0 views

  •  
    This was an interesting source that talks about how our adversary can utilized off the shelf programs to defeat the multi-million dollars system of our UAV programs.
Rumnea Kelly

Computing and Comms Driving UAVS - 0 views

  •  
    This article requires that you login into the UMUC Library in order to view it. It dealt with a more technical aspect of what the UAV is all about it. It contains drawings and addresses some ethical concerns.
Rumnea Kelly

Robots, the Military's Newest Forces - 0 views

  •  
    This source describes various applications of robotic usage by the military. It also talks about damages caused by them whether intentional or by mistakes.
Rumnea Kelly

Obama meets bin Laden raiders, promises victory over al Qaeda - 0 views

  •  
    Conflicts are become ever increasing and I used this source to show that the U.S. will be relying more on small forces such as the SEAL team in conjunction with unmanned robots.
Alexandr Yezersky

This Malicious Charger Can Hack Your iPhone | Diigo - 0 views

  •  
    This article describes the device created by a Georgia Research team, known as Mactans that hacks iPhones through a compatible charger.
cpanagopulos

Near field communication: Transforming transactions - 2 views

  •  
    This publication describes the various applications and the future possibilities of Near Field Communication in the mobile market.
cpanagopulos

Defining business models for near-field communication payments - 1 views

  •  
    This publication discusses the necessary factors involved in making the mass use of NFC technology a reality.
cpanagopulos

Mobile near field communications: tap n' go, keep it secure and private - 1 views

  •  
    This publication focuses on the security risks of NFC technology. Also discussed are the methods being developed to mitigate these risks.
cpanagopulos

Near Field Communication (NFC) - 1 views

  •  
    The authors of this publication describe the technology behind NFC, the various applications for NFC, and the devices that are currently, or have the potential to be, NFC enabled.
cpanagopulos

Status - mobile wallets utilizing near field communication (NFC) technology. - 1 views

  •  
    This publication outlines the various companies that are offering "mobile wallets" as a payment option. The authors describe Google and Visa as leading the industry as companies who are leading the way with NFC technology implementation. Also discussed is state of acquisitions between the major credit companies and competing mobile wallet platforms.
Joseph Walbert

Cyber Modeling (5 of 5) - 0 views

  •  
    Game Theoretic Solutions to Cyber Attack and Network Defense Problems
Joseph Walbert

Cyber Modeling (4 of 5) - 0 views

  •  
    Queuing Model for Malicious Attack Detection.
Joseph Walbert

Cyber Modeling (3 of 5) - 0 views

  •  
    The Role of Modeling in the Resilience of Cyberinfrastructure Systems and Preparedness for Cyber Intrusions.
Joseph Walbert

Cyber Modeling (2 of 5) - 0 views

  •  
    School studies Net attacks.
Joseph Walbert

Cyber Modeling (1 of 5) - 1 views

  •  
    Mathematical model on the transmission of worms in wireless sensor network.
sarahterry

Perceptions of biometric experts on whether or not biometric modalities will combat ide... - 0 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source is from Capella University. It explains how identity fraud can be reduced with the use of fingerprinting.
sarahterry

Biometric Fingerprinting for Visa Application: Device and Procedure Are Risk Factors fo... - 0 views

shared by sarahterry on 07 Jul 13 - No Cached
  •  
    Biometrics - Fingerprinting. This source is an example in what companies, government entities as well as products are taking finger prints from people who are applying for credit card, crossing the boarder and how it has stream-lined their process.
« First ‹ Previous 61 - 80 of 332 Next › Last »
Showing 20 items per page