16 resultados para BEARDSLEY, AUBREY

em Queensland University of Technology - ePrints Archive


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Maximum-likelihood estimates of the parameters of stochastic differential equations are consistent and asymptotically efficient, but unfortunately difficult to obtain if a closed-form expression for the transitional probability density function of the process is not available. As a result, a large number of competing estimation procedures have been proposed. This article provides a critical evaluation of the various estimation techniques. Special attention is given to the ease of implementation and comparative performance of the procedures when estimating the parameters of the Cox–Ingersoll–Ross and Ornstein–Uhlenbeck equations respectively.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In late 2007, Gold Coast City Council libraries embarked on an online library project, designed to ramp up libraries’ online services to customers. As part of this project, the Young People’s team identified a need to connect with youth aged 12 to 16 in the online environment, in order to create a direct channel of communication with this market segment and encourage them to engage with the library. Blogging was identified as an appropriate means of communicating with both current and potential library customers from this age group. The Young People’s team consequently prepared a concept plan for a youth blog for launch in Children’s Book Week 2008 and are working towards development of management and administrative models and documentation and implementation of the blog itself. While many libraries have been quick to take up Web 2.0-style services, there has been little formal publication about the successes (or failures) of this type of project. Likewise, few libraries have published about the planning, management, and administration of such services. The youth blog currently in development at Gold Coast City Council libraries will be supported by a robust planning phase and will be rigorously evaluated as part of the project. This paper will report on the project (its aims, objectives and outputs), the planning process, and the evaluation activities and outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper we demonstrate how to monitor a smartphone running Symbian operating system and Windows Mobile in order to extract features for anomaly detection. These features are sent to a remote server because running a complex intrusion detection system on this kind of mobile device still is not feasible due to capability and hardware limitations. We give examples on how to compute relevant features and introduce the top ten applications used by mobile phone users based on a study in 2005. The usage of these applications is recorded by a monitoring client and visualized. Additionally, monitoring results of public and self-written malwares are shown. For improving monitoring client performance, Principal Component Analysis was applied which lead to a decrease of about 80 of the amount of monitored features.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways from payment systems to assisting the lives of elderly or disabled people. Security threats for these devices become increasingly dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level. Therefore, third-party developers have the opportunity to develop kernel-based low-level security tools which is not normal for smartphone platforms. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS for example, holding the greatest market share among all smartphone OSs, was closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners� privacy. In this work, we present our current results in analyzing the security of Android smartphones with a focus on its Linux side. Our results are not limited to Android, they are also applicable to Linux-based smartphones such as OpenMoko Neo FreeRunner. Our contribution in this work is three-fold. First, we analyze android framework and the Linux-kernel to check security functionalities. We survey wellaccepted security mechanisms and tools which can increase device security. We provide descriptions on how to adopt these security tools on Android kernel, and provide their overhead analysis in terms of resource usage. As open smartphones are released and may increase their market share similar to Symbian, they may attract attention of malware writers. Therefore, our second contribution focuses on malware detection techniques at the kernel level. We test applicability of existing signature and intrusion detection methods in Android environment. We focus on monitoring events on the kernel; that is, identifying critical kernel, log file, file system and network activity events, and devising efficient mechanisms to monitor them in a resource limited environment. Our third contribution involves initial results of our malware detection mechanism basing on static function call analysis. We identified approximately 105 Executable and Linking Format (ELF) executables installed to the Linux side of Android. We perform a statistical analysis on the function calls used by these applications. The results of the analysis can be compared to newly installed applications for detecting significant differences. Additionally, certain function calls indicate malicious activity. Therefore, we present a simple decision tree for deciding the suspiciousness of the corresponding application. Our results present a first step towards detecting malicious applications on Android-based devices.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Driven by the rapid development of ubiquitous and pervasive computing, personalized services and applications are deployed to support our lives. Accordingly, the number of interfaces and devices (smartphone, tablet computer, etc.) provided to access and consume these services is growing continuously. To simplify the complexity of managing many accounts with different credentials, Single Sign-On (SSO) solutions have been introduced. However, a single password for many accounts represents a single-point-of-failure. Furthermore, once initiated SSO session is a high potential risk when the working station is left unlocked and unattended. In this paper, we present a conception of a Persistent Single Sign-On (PSSO) for ubiquitous home environments by involving the capabilities of Behavioral Biometrics to check the identity of the user continuously in an unobtrusive manner.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In the last decade, smartphones have gained widespread usage. Since the advent of online application stores, hundreds of thousands of applications have become instantly available to millions of smart-phone users. Within the Android ecosystem, application security is governed by digital signatures and a list of coarse-grained permissions. However, this mechanism is not fine-grained enough to provide the user with a sufficient means of control of the applications' activities. Abuse of highly sensible private information such as phone numbers without users' notice is the result. We show that there is a high frequency of privacy leaks even among widely popular applications. Together with the fact that the majority of the users are not proficient in computer security, this presents a challenge to the engineers developing security solutions for the platform. Our contribution is twofold: first, we propose a service which is able to assess Android Market applications via static analysis and provide detailed, but readable reports to the user. Second, we describe a means to mitigate security and privacy threats by automated reverse-engineering and refactoring binary application packages according to the users' security preferences.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The evolution of classic power grids to smart grids creates chances for most participants in the energy sector. Customers can save money by reducing energy consumption, energy providers can better predict energy demand and environment benefits since lower energy consumption implies lower energy production including a decrease of emissions from plants. But information and communication systems supporting smart grids can also be subject to classical or new network attacks. Attacks can result in serious damage such as harming privacy of customers, creating economical loss and even disturb the power supply/demand balance of large regions and countries. In this paper, we give an overview about the German smart measuring architecture, protocols and security. Afterwards, we present a simulation framework which enables researchers to analyze security aspects of smart measuring scenarios.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Smartphones get increasingly popular where more and more smartphone platforms emerge. Special attention was gained by the open source platform Android which was presented by the Open Handset Alliance (OHA) hosting members like Google, Motorola, and HTC. Android uses a Linux kernel and a stripped-down userland with a custom Java VM set on top. The resulting system joins the advantages of both environments, while third-parties are intended to develop only Java applications at the moment. In this work, we present the benefit of using native applications in Android. Android includes a fully functional Linux, and using it for heavy computational tasks when developing applications can bring in substantional performance increase. We present how to develop native applications and software components, as well as how to let Linux applications and components communicate with Java programs. Additionally, we present performance measurements of native and Java applications executing identical tasks. The results show that native C applications can be up to 30 times as fast as an identical algorithm running in Dalvik VM. Java applications can become a speed-up of up to 10 times if utilizing JNI.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Static anaylsis represents an approach of checking source code or compiled code of applications before it gets executed. Chess and McGraw state that static anaylsis promises to identify common coding problems automatically. While manual code checking is also a form of static analysis, software tools are used in most cases in order to perform the checks. Chess and McGraw additionaly claim that good static checkers can help to spot and eradicate common security bugs.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Our daily lives become more and more dependent upon smartphones due to their increased capabilities. Smartphones are used in various ways, e.g. for payment systems or assisting the lives of elderly or disabled people. Security threats for these devices become more and more dangerous since there is still a lack of proper security tools for protection. Android emerges as an open smartphone platform which allows modification even on operating system level and where third-party developers first time have the opportunity to develop kernel-based low-level security tools. Android quickly gained its popularity among smartphone developers and even beyond since it bases on Java on top of "open" Linux in comparison to former proprietary platforms which have very restrictive SDKs and corresponding APIs. Symbian OS, holding the greatest market share among all smartphone OSs, was even closing critical APIs to common developers and introduced application certification. This was done since this OS was the main target for smartphone malwares in the past. In fact, more than 290 malwares designed for Symbian OS appeared from July 2004 to July 2008. Android, in turn, promises to be completely open source. Together with the Linux-based smartphone OS OpenMoko, open smartphone platforms may attract malware writers for creating malicious applications endangering the critical smartphone applications and owners privacy. Since signature-based approaches mainly detect known malwares, anomaly-based approaches can be a valuable addition to these systems. They base on mathematical algorithms processing data that describe the state of a certain device. For gaining this data, a monitoring client is needed that has to extract usable information (features) from the monitored system. Our approach follows a dual system for analyzing these features. On the one hand, functionality for on-device light-weight detection is provided. But since most algorithms are resource exhaustive, remote feature analysis is provided on the other hand. Having this dual system enables event-based detection that can react to the current detection need. In our ongoing research we aim to investigates the feasibility of light-weight on-device detection for certain occasions. On other occasions, whenever significant changes are detected on the device, the system can trigger remote detection with heavy-weight algorithms for better detection results. In the absence of the server respectively as a supplementary approach, we also consider a collaborative scenario. Here, mobile devices sharing a common objective are enabled by a collaboration module to share information, such as intrusion detection data and results. This is based on an ad-hoc network mode that can be provided by a WiFi or Bluetooth adapter nearly every smartphone possesses.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Google Android, Google's new product and its first attempt to enter the mobile market, might have an equal impact on mobile users like Apple's hyped product, the iPhone. In this Technical report we are going to present the Google Android platform, what Android is, describe why it might be considered as a worthy rival to Apple's iPhone. We will describe parts of its internals, take a look "under the hood" while explaining components of the underlying operating system. We will show how to develop applications for this platform, which difficulties a developer might have to face, and how developers can possibly use other programming languages to develop for Android than the propagated language Java.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This practice-led research examines the generative function of loss in fiction that explores themes of grief and longing. This research considers how loss may be understood as a structuring mechanism through which characters evaluate time, resolve loss and affect future change. The creative work is a work of literary fiction titled A Distance Too Far Away. Aubrey, the story’s protagonist, is a woman in her twenties living in Brisbane in the early 1980s, carving out an independent life for herself away from her family. Through a flashback narrative sequence, told from the perspective of the twelve year narrator, Aubrey retraces a significant point of rupture in her life following a series of family tragedies. A Distance Too Far Away explores the tension between belonging and freedom, and considers how the past provides a malleable space for illuminating desire in order to traverse the gap between the world as it is and the world as we want it to be. The exegetical component of this research considers an alternative critical frame for interpreting the work of American author Anne Tyler, a writer who has had a significant influence on my own practice. Frequently criticised for creating sentimental and inert characters, many critics observe that nothing happens in Tyler’s circular plots. This research challenges these assertions, and through a contextual analysis of Tyler’s Ladder of Years (1995) investigates how Tyler engages with memory and nostalgia in order to move across time and resolve loss.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The invention relates to a method for monitoring user activity on a mobile device, comprising an input and an output unit, comprising the following steps preferably in the following order: detecting and / or logging user activity on said input unit, identifying a foreground running application, hashing of a user-interface-element management list of the foreground running application, and creating a screenshot comprising items displayed on said input unit. The invention also relates to a method for analyzing user activity at a server, comprising the following step: obtaining at least one of an information about detected and / or logged user activity, an information about a foreground running application, a hashed user-interface-element management list and a screenshot from a mobile device. Further, a computer program product is provided, comprising one or more computer readable media having computer executable instructions for performing the steps of at least one of the aforementioned methods.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Background The Global Burden of Disease Study 2013 (GBD 2013) aims to bring together all available epidemiological data using a coherent measurement framework, standardised estimation methods, and transparent data sources to enable comparisons of health loss over time and across causes, age–sex groups, and countries. The GBD can be used to generate summary measures such as disability-adjusted life-years (DALYs) and healthy life expectancy (HALE) that make possible comparative assessments of broad epidemiological patterns across countries and time. These summary measures can also be used to quantify the component of variation in epidemiology that is related to sociodemographic development. Methods We used the published GBD 2013 data for age-specific mortality, years of life lost due to premature mortality (YLLs), and years lived with disability (YLDs) to calculate DALYs and HALE for 1990, 1995, 2000, 2005, 2010, and 2013 for 188 countries. We calculated HALE using the Sullivan method; 95% uncertainty intervals (UIs) represent uncertainty in age-specific death rates and YLDs per person for each country, age, sex, and year. We estimated DALYs for 306 causes for each country as the sum of YLLs and YLDs; 95% UIs represent uncertainty in YLL and YLD rates. We quantified patterns of the epidemiological transition with a composite indicator of sociodemographic status, which we constructed from income per person, average years of schooling after age 15 years, and the total fertility rate and mean age of the population. We applied hierarchical regression to DALY rates by cause across countries to decompose variance related to the sociodemographic status variable, country, and time. Findings Worldwide, from 1990 to 2013, life expectancy at birth rose by 6·2 years (95% UI 5·6–6·6), from 65·3 years (65·0–65·6) in 1990 to 71·5 years (71·0–71·9) in 2013, HALE at birth rose by 5·4 years (4·9–5·8), from 56·9 years (54·5–59·1) to 62·3 years (59·7–64·8), total DALYs fell by 3·6% (0·3–7·4), and age-standardised DALY rates per 100 000 people fell by 26·7% (24·6–29·1). For communicable, maternal, neonatal, and nutritional disorders, global DALY numbers, crude rates, and age-standardised rates have all declined between 1990 and 2013, whereas for non–communicable diseases, global DALYs have been increasing, DALY rates have remained nearly constant, and age-standardised DALY rates declined during the same period. From 2005 to 2013, the number of DALYs increased for most specific non-communicable diseases, including cardiovascular diseases and neoplasms, in addition to dengue, food-borne trematodes, and leishmaniasis; DALYs decreased for nearly all other causes. By 2013, the five leading causes of DALYs were ischaemic heart disease, lower respiratory infections, cerebrovascular disease, low back and neck pain, and road injuries. Sociodemographic status explained more than 50% of the variance between countries and over time for diarrhoea, lower respiratory infections, and other common infectious diseases; maternal disorders; neonatal disorders; nutritional deficiencies; other communicable, maternal, neonatal, and nutritional diseases; musculoskeletal disorders; and other non-communicable diseases. However, sociodemographic status explained less than 10% of the variance in DALY rates for cardiovascular diseases; chronic respiratory diseases; cirrhosis; diabetes, urogenital, blood, and endocrine diseases; unintentional injuries; and self-harm and interpersonal violence. Predictably, increased sociodemographic status was associated with a shift in burden from YLLs to YLDs, driven by declines in YLLs and increases in YLDs from musculoskeletal disorders, neurological disorders, and mental and substance use disorders. In most country-specific estimates, the increase in life expectancy was greater than that in HALE. Leading causes of DALYs are highly variable across countries. Interpretation Global health is improving. Population growth and ageing have driven up numbers of DALYs, but crude rates have remained relatively constant, showing that progress in health does not mean fewer demands on health systems. The notion of an epidemiological transition—in which increasing sociodemographic status brings structured change in disease burden—is useful, but there is tremendous variation in burden of disease that is not associated with sociodemographic status. This further underscores the need for country-specific assessments of DALYs and HALE to appropriately inform health policy decisions and attendant actions.