Ubiquitous Surveillance: Difference between revisions
No edit summary |
No edit summary |
||
Line 3: | Line 3: | ||
==== '''Introduction''' ==== | ==== '''Introduction''' ==== | ||
[http://www.livingbooksaboutlife.org/books/Surveillance/Introduction Ubiquitous Mobile Persistent Surveillance.] - | David Parry | ||
[http://www.livingbooksaboutlife.org/books/Surveillance/Introduction Ubiquitous Mobile Persistent Surveillance.] -<br> | |||
Live Surveillance Table of Contents. | Live Surveillance Table of Contents. | ||
Line 19: | Line 21: | ||
Tamer Abuhmed ''et al''. [http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System] | Tamer Abuhmed ''et al''. [http://arxiv.org/pdf/0803.0037v1 A Survey on Deep Packet Inspection for Intrusion Detection System] | ||
<br> | |||
==== '''Somebody is Watching You: Video Surveillance ''' ==== | |||
==== '''Somebody is Watching You: Video Surveillance ''' ==== | |||
Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba [http://www.hindawi.com/journals/ivp/2011/163682/ Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance] | Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba [http://www.hindawi.com/journals/ivp/2011/163682/ Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance] | ||
Line 31: | Line 33: | ||
Renzo De Nard ''et al.'' [http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles] | Renzo De Nard ''et al.'' [http://cogprints.org/5569/1/bristoluav21.pdf SwarMAV: A Swarm of Miniature Aerial Vehicles] | ||
<br> | |||
==== '''Monitoring Bodies: Surveilling Health ''' ==== | |||
==== '''Monitoring Bodies: Surveilling Health ''' ==== | |||
Daniel Chandramohan ''et al''. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers] | Daniel Chandramohan ''et al''. [http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.0050057 Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers] | ||
Line 43: | Line 45: | ||
Emily Chan ''et al''. [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance] | Emily Chan ''et al''. [http://www.plosntds.org/article/info:doi/10.1371/journal.pntd.0001206 Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance] | ||
<br> | |||
==== '''Judging Privacy: Legal Issues ''' ==== | |||
==== '''Judging Privacy: Legal Issues ''' ==== | |||
Samuel D. Warren, Louis D. Brandeis [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy] | Samuel D. Warren, Louis D. Brandeis [http://groups.csail.mit.edu/mac/classes/6.805/articles/privacy/Privacy_brand_warr2.html The Right to Privacy] | ||
Line 55: | Line 57: | ||
Paul Ohm [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance] | Paul Ohm [http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1261344 The Rise and Fall of Invasive ISP Surveillance] | ||
<br> | |||
==== '''Appendix: How It Works ''' ==== | |||
==== '''Appendix: How It Works ''' ==== | |||
Emily Steel [http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name] | Emily Steel [http://online.wsj.com/article/SB10001424052702304410504575560243259416072.html A Web Pioneer Profiles Users by Name] |
Revision as of 13:19, 6 September 2011
Introduction
David Parry
Ubiquitous Mobile Persistent Surveillance. -
Live Surveillance Table of Contents.
Knowing Everything: Data Mining
Daniel Gayo-Avello All Liaisons are Dangerous When All Your Friends Are Known to Us
Sang Hoon Lee Googling Social Interactions: Web Search Engine Based Social Network Construction
Mahnoosh Khloghi and Mohammadreza Keyvanpour An Analytical Framework for Data Stream Mining Techniques Based on Challenges and Requirements
Tamer Abuhmed et al. A Survey on Deep Packet Inspection for Intrusion Detection System
Somebody is Watching You: Video Surveillance
Yassine Benabbas, Nacim Ihaddadene, and Chaabane Djeraba Motion Pattern Extraction and Even Detection for Automatic Visual Surveillance
Alexander Artikis and Georgios Paliouras A Logic Programming Approach to Behaviour Recognition
T.P. Pushpavath et al. GPRS Video Streaming Surveillance System GVS
Renzo De Nard et al. SwarMAV: A Swarm of Miniature Aerial Vehicles
Monitoring Bodies: Surveilling Health
Daniel Chandramohan et al. Should Data from Demographic Surveillance Systems Be Made More Widely Available to Researchers
Alireza Taravat Najafabad et al. Web GIS and Public Health
Stuart Rennie et al. Conducting Unlinked Anonymous HIV Surveillance in Developing Countries: Ethical, Epidemiological, and Public Health Concerns
Emily Chan et al. Using Web Search Query Data to Monitor Dengue Epidemics: A New Model for Neglected Tropical Disease Surveillance
Judging Privacy: Legal Issues
Samuel D. Warren, Louis D. Brandeis The Right to Privacy
Daniel J. Solove Data Mining and the Security-Liberty Debate
Omer Tene What Google Knows: Privacy and Internet Search Engines
Paul Ohm The Rise and Fall of Invasive ISP Surveillance
Appendix: How It Works
Emily Steel A Web Pioneer Profiles Users by Name
The Wall Street Journal Cracking the Code
Ted Morgan Location makes mobile Mobile
David Bond Erasing David
Ondi Timoner We Live in Public