Results for ' Malware Detection'

981 found
Order:
  1.  27
    Using Dalvik opcodes for malware detection on android.José Gaviria de la Puerta & Borja Sanz - 2017 - Logic Journal of the IGPL 25 (6):938-948.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  2.  18
    Multi-agent reinforcement learning based algorithm detection of malware-infected nodes in IoT networks.Marcos Severt, Roberto Casado-Vara, Ángel Martín del Rey, Héctor Quintián & Jose Luis Calvo-Rolle - forthcoming - Logic Journal of the IGPL.
    The Internet of Things (IoT) is a fast-growing technology that connects everyday devices to the Internet, enabling wireless, low-consumption and low-cost communication and data exchange. IoT has revolutionized the way devices interact with each other and the internet. The more devices become connected, the greater the risk of security breaches. There is currently a need for new approaches to algorithms that can detect malware regardless of the size of the network and that can adapt to dynamic changes in the (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  51
    On Fingerprinting of Public Malware Analysis Services.Alvaro Botas, Ricardo J. Rodríguez, Vicente Matellan, Juan F. Garcia, M. T. Trobajo & Miguel V. Carriegos - 2020 - Logic Journal of the IGPL 28 (4):473-486.
    Automatic public malware analysis services provide controlled, isolated and virtual environments to analyse malicious software samples. Unfortunately, malware is currently incorporating techniques to recognize execution onto a virtual or sandbox environment; when an analysis environment is detected, malware behaves as a benign application or even shows no activity. In this work, we present an empirical study and characterization of automatic PMAS, considering 26 different services. We also show a set of features that allow to easily fingerprint these (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  4.  25
    An Empirical Evaluation of Supervised Learning Methods for Network Malware Identification Based on Feature Selection.C. Manzano, C. Meneses, P. Leger & H. Fukuda - 2022 - Complexity 2022:1-18.
    Malware is a sophisticated, malicious, and sometimes unidentifiable application on the network. The classifying network traffic method using machine learning shows to perform well in detecting malware. In the literature, it is reported that this good performance can depend on a reduced set of network features. This study presents an empirical evaluation of two statistical methods of reduction and selection of features in an Android network traffic dataset using six supervised algorithms: Naïve Bayes, support vector machine, multilayer perceptron (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  19
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel IDS established on (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  6. Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language.Akbal Omran Salman, Dheyaa Ahmed Ibrahim & Mazin Abed Mohammed - 2021 - Journal of Intelligent Systems 30 (1):774-792.
    Spam electronic mails (emails) refer to harmful and unwanted commercial emails sent to corporate bodies or individuals to cause harm. Even though such mails are often used for advertising services and products, they sometimes contain links to malware or phishing hosting websites through which private information can be stolen. This study shows how the adaptive intelligent learning approach, based on the visual anti-spam model for multi-natural language, can be used to detect abnormal situations effectively. The application of this approach (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  7.  8
    Study of infostealers using Graph Neural Networks.Álvaro Bustos-Tabernero, Daniel López-Sánchez, Angélica González-Arrieta & Paulo Novais - forthcoming - Logic Journal of the IGPL.
    Cybersecurity technology has the ability to detect malware through a variety of methods, such as signature recognition, logical rules or the identification of known malware stored in a database or public source. However, threat actors continuously try to create new variants of existing malware by obfuscating or altering parts of the code to evade detection by antivirus engines. Infostealers are one of the most common malicious programs aimed at obtaining personal or banking information from an infected (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Estimation Des signaux (exercices et problèmes corrigés).A. Quinquis Détection - forthcoming - Hermes.
    No categories
     
    Export citation  
     
    Bookmark  
  9.  26
    Moral Status for Malware! The Difficulty of Defining Advanced Artificial Intelligence.Miranda Mowbray - 2021 - Cambridge Quarterly of Healthcare Ethics 30 (3):517-528.
    The suggestion has been made that future advanced artificial intelligence (AI) that passes some consciousness-related criteria should be treated as having moral status, and therefore, humans would have an ethical obligation to consider its well-being. In this paper, the author discusses the extent to which software and robots already pass proposed criteria for consciousness; and argues against the moral status for AI on the grounds that human malware authors may design malware to fake consciousness. In fact, the article (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  32
    On Malfunction, Mechanisms and Malware Classification.Giuseppe Primiero, Frida J. Solheim & Jonathan M. Spring - 2019 - Philosophy and Technology 32 (2):339-362.
    Malware has been around since the 1980s and is a large and expensive security concern today, constantly growing over the past years. As our social, professional and financial lives become more digitalised, they present larger and more profitable targets for malware. The problem of classifying and preventing malware is therefore urgent, and it is complicated by the existence of several specific approaches. In this paper, we use an existing malware taxonomy to formulate a general, language independent (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  11.  44
    Detecting Errors that Result in Retractions.Line Edslev Andersen & K. Brad Wray - 2019 - Social Studies of Science 46 (6):942-954.
    We present a taxonomy of errors in the scientific literature and an account of how the errors are distributed over the categories. We have developed the taxonomy by studying substantial errors in the scientific literature as described in retraction notices published in the journal Science over the past 35 years. We then examine how the sorts of errors that lead to retracted papers can be prevented and detected, considering the perspective of collaborating scientists, journal editors and referees, and readers of (...)
    Direct download  
     
    Export citation  
     
    Bookmark   6 citations  
  12.  15
    Anomaly Detection of Highway Vehicle Trajectory under the Internet of Things Converged with 5G Technology.Ketao Deng - 2021 - Complexity 2021:1-12.
    The gradual increase in the density of highway vehicles and traffic flow makes the abnormal driving state of vehicles an indispensable tool for assisting traffic dispatch. Intelligent transportation systems can detect and track vehicles in real time, acquire characteristics such as vehicle traffic, vehicle speed, vehicle flow density, and vehicle trajectory, and further perform advanced tasks such as vehicle trajectory. The detection of abnormal vehicle trajectory is an important content of vehicle trajectory understanding. And the development of the Internet (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  18
    Defect Detection of Pandrol Track Fastener Based on Local Depth Feature Fusion Network.Zhaomin Lv, Anqi Ma, Xingjie Chen & Shubin Zheng - 2021 - Complexity 2021:1-9.
    There are three main problems in track fastener defect detection based on image: The number of abnormal fastener pictures is scarce, and supervised learning detection model is difficult to establish. The potential data features obtained by different feature extraction methods are different. Some methods focus on edge features, and some methods focus on texture features. Different features have different detection capabilities, and these features are not effectively fused and utilized. The detection of the track fastener clip (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  15
    Implicit Detection Observation in Different Features, Exposure Duration, and Delay During Change Blindness.Wang Xiang - 2021 - Frontiers in Psychology 11.
    To investigate whether implicit detection occurs uniformly during change blindness with single or combination feature stimuli, and whether implicit detection is affected by exposure duration and delay, two one-shot change detection experiments are designed. The implicit detection effect is measured by comparing the reaction times of baseline trials, in which stimulus exhibits no change and participants report “same,” and change blindness trials, in which the stimulus exhibits a change but participants report “same.” If the RTs of (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15. Change Detection.Ronald A. Rensink - 2002 - Annual Review of Psychology 53 (1):245-277.
    Five aspects of visual change detection are reviewed. The first concerns the concept of change itself, in particular the ways it differs from the related notions of motion and difference. The second involves the various methodological approaches that have been developed to study change detection; it is shown that under a variety of conditions observers are often unable to see large changes directly in their field of view. Next, it is argued that this “change blindness” indicates that focused (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   94 citations  
  16.  11
    Reluctant sleuths, true detectives.Jason Jacobs - 2023 - Albany: SUNY Press.
    Explores the figure of the detective as a pursuer of knowledge in four noir films.
    Direct download  
     
    Export citation  
     
    Bookmark  
  17.  22
    Early Detection of Parkinson’s Disease by Using SPECT Imaging and Biomarkers.Bhanu Prasad, T. N. Nagabhushan & Gunjan Pahuja - 2019 - Journal of Intelligent Systems 29 (1):1329-1344.
    Precise and timely diagnosis of Parkinson’s disease is important to control its progression among subjects. Currently, a neuroimaging technique called dopaminergic imaging that uses single photon emission computed tomography (SPECT) with 123I-Ioflupane is popular among clinicians for detecting Parkinson’s disease in early stages. Unlike other studies, which consider only low-level features like gray matter, white matter, or cerebrospinal fluid, this study explores the non-linear relation between different biomarkers (SPECT + biological) using deep learning and multivariate logistic regression. Striatal binding ratios (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  21
    Signal-detection analysis of laterality differences: Some preliminary data, free of recall and report-sequence characteristics.Murray J. White - 1970 - Journal of Experimental Psychology 83 (1p1):174.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19.  96
    Detecting Honest People’s Lies in Handwriting: The Power of the Ten Commandments and Internalized Ethical Values.Thomas Li-Ping Tang - 2012 - Journal of Business Ethics 106 (4):389-400.
    Can managers detect honest people’s lies in a handwritten message? In this article, I will briefly discuss graphology and a basic model of interpersonal communication. I will then develop a fundamental theoretical framework of eight principles for detecting lies based on the basic communication model, handwriting analyses, and the following assumptions: For most people, it is easier to tell the truth than to tell lies. This applies to handwritings also. When most honest people lie, they try to hide their stressful (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  20.  20
    MalSEIRS: Forecasting Malware Spread Based on Compartmental Models in Epidemiology.Isabella Martínez Martínez, Andrés Florián Quitián, Daniel Díaz-López, Pantaleone Nespoli & Félix Gómez Mármol - 2021 - Complexity 2021:1-19.
    Over the last few decades, the Internet has brought about a myriad of benefits to almost every aspect of our daily lives. However, malware attacks have also widely proliferated, mainly aiming at legitimate network users, resulting in millions of dollars in damages if proper protection and response measures are not settled and enforced. In this context, the paper at hand proposes MalSEIRS, a novel dynamic model, to predict malware distribution in a network based on the SEIRS epidemiological model. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21.  8
    The detective of modernity: essays on the work of David Frisby.Georgia Giannakopoulou & Graeme Gilloch (eds.) - 2020 - New York, NY: Routledge/Taylor & Francis Group.
    This book explores the thought of - and is dedicated to - David Frisby, as one of the leading sociologists of the late twentieth and early twenty-first centuries. Presenting original examinations of his unique social theory and underlining his interdisciplinary approach to the critical interpretation of modern metropolitan society and culture, it emphasises Frisby's legacy in highlighting the role of the social researcher as a collector, reader, observer, detective and archivist of the phenomena and ideas that exemplify the modern metropolis (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  22.  38
    Viral Detection: Past, Present, and Future.Konstantina Katsarou, Eirini Bardani, Paraskevi Kallemi & Kriton Kalantidis - 2019 - Bioessays 41 (10):1900049.
    Viruses are essentially composed of a nucleic acid (segmented or not, DNA, or RNA) and a protein coat. Despite their simplicity, these small pathogens are responsible for significant economic and humanitarian losses that have had dramatic consequences in the course of human history. Since their discovery, scientists have developed different strategies to efficiently detect viruses, using all possible viral features. Viruses shape, proteins, and nucleic acid are used in viral detection. In this review, the development of these techniques, especially (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  23.  88
    Detecting temporalities.Gilbert Plumer - 1987 - Philosophy and Phenomenological Research 47 (3):451-460.
    This paper argues that A-determinations (past, present, and future) and B-relations (simultaneity and succession) have the same empirical status in that they are all neither historically discoverable nor sensible, but are detectable and are detectable in the same way. This constitutes a reason for thinking they are in the same class with respect to objectivity, contrary to the Russellian view that “in a world in which there was no experience there would be no past, present, or future, but there might (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  24.  88
    Detecting the Identity Signature of Secret Social Groups: Holographic Processes and the Communication of Member Affiliation.Raymond Trevor Bradley - 2010 - World Futures 66 (2):124-162.
    The principles of classical and quantum holography are used to develop the theoretical basis for a non-phonemic method of detecting membership in secret social groups, such as cults, criminal gangs, drug cartels, and terrorist cells. Grounded in the basic sociological premise that every group develops a distinctive sociocultural order, the theory postulates that the primary features of a group's collective identity will be encoded, via a multilevel socio-psycho-physiological process, into the field of bio-emotional relations connecting group members. The principles of (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  25.  21
    Detecting contract cheating in essay and report submissions: process, patterns, clues and conversations.Ann M. Rogerson - 2017 - International Journal for Educational Integrity 13 (1).
    Detecting contract cheating in written submissions can be difficult beyond direct plagiarism detectable via technology. Successfully identifying potential cases of contract cheating in written work such as essays and reports is largely dependent on the experience of assessors and knowledge of student. It is further dependent on their familiarity with the patterns and clues evident in sections of body text and reference materials to identify irregularities. Consequently, some knowledge of what the patterns and clues look like is required. This paper (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   17 citations  
  26.  90
    Detecting Introspective Errors in Consciousness Science.Andy McKilliam - 2025 - Ergo: An Open Access Journal of Philosophy 12.
    Detecting introspective errors about consciousness presents challenges that are widely supposed to be difficult, if not impossible, to overcome. This is a problem for consciousness science because many central questions turn on when and to what extent we should trust subjects’ introspective reports. This has led some authors to suggest that we should abandon introspection as a source of evidence when constructing a science of consciousness. Others have concluded that central questions in consciousness science cannot be answered via empirical investigation. (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27. True Detective: Buddhism, Pessimism or Philosophy?Finn Janning - 2014 - Journal of Philosophy of Life 4 (4).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  32
    Delving into Android Malware Families with a Novel Neural Projection Method.Rafael Vega Vega, Héctor Quintián, Carlos Cambra, Nuño Basurto, Álvaro Herrero & José Luis Calvo-Rolle - 2019 - Complexity 2019:1-10.
    Present research proposes the application of unsupervised and supervised machine-learning techniques to characterize Android malware families. More precisely, a novel unsupervised neural-projection method for dimensionality-reduction, namely, Beta Hebbian Learning, is applied to visually analyze such malware. Additionally, well-known supervised Decision Trees are also applied for the first time in order to improve characterization of such families and compare the original features that are identified as the most important ones. The proposed techniques are validated when facing real-life Android (...) data by means of the well-known and publicly available Malgenome dataset. Obtained results support the proposed approach, confirming the validity of BHL and DTs to gain deep knowledge on Android malware. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  65
    Detection of EEG-resting state independent networks by eLORETA-ICA method.Yasunori Aoki, Ryouhei Ishii, Roberto D. Pascual-Marqui, Leonides Canuet, Shunichiro Ikeda, Masahiro Hata, Kaoru Imajo, Haruyasu Matsuzaki, Toshimitsu Musha, Takashi Asada, Masao Iwase & Masatoshi Takeda - 2015 - Frontiers in Human Neuroscience 9:111175.
    Recent fMRI studies have shown that functional networks can be extracted even from resting state data, the so called “resting state networks” (RSNs) by applying independent component analysis (ICA). However, compared to fMRI, EEG and MEG have much higher temporal resolution and provide a direct estimation of cortical activity. To date, MEG studies have applied ICA for separate frequency bands only, disregarding cross-frequency couplings. In this study, we aimed to detect EEG-RSNs and their interactions in all frequency bands. We applied (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  23
    Visual detection of compound motion.L. T. Alexander & A. S. Cooperband - 1966 - Journal of Experimental Psychology 71 (6):816.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  28
    Fast Detection of Deceptive Reviews by Combining the Time Series and Machine Learning.Minjuan Zhong, Zhenjin Li, Shengzong Liu, Bo Yang, Rui Tan & Xilong Qu - 2021 - Complexity 2021:1-11.
    With the rapid growth of online product reviews, many users refer to others’ opinions before deciding to purchase any product. However, unfortunately, this fact has promoted the constant use of fake reviews, resulting in many wrong purchase decisions. The effective identification of deceptive reviews becomes a crucial yet challenging task in this research field. The existing supervised learning methods require a large number of labeled examples of deceptive and truthful opinions by domain experts, while the available unsupervised learning methods are (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  32.  18
    Automatically Detecting the Number of Logs on a Timber Truck.Mark Dougherty & Siril Yella - 2013 - Journal of Intelligent Systems 22 (4):417-435.
    This article describes a method of automatically detecting, counting and classifying logs on a timber truck using a photograph. An image-processing algorithm is developed to process the photograph to calculate an estimate of the number of logs present and their respective diameters. The algorithm uses color information in multiple color spaces as well as geometrical operators to segment the image and extract the relevant information. This information enables the sawmill to better plan internal logistics and production in advance of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  33. True Detective : Pessimism, Buddhism or Philosophy?Finn Janning - 2015 - Journal of Philosophy of Life 5 (1).
    The aim of this paper is to raise two questions. The first question is: How is pessimism related to Buddhism (and vice versa)? The second question is: What relation does an immanent philosophy have to pessimism and Buddhism, if any? Using True Detective, an American television crime drama, as my point of departure, first I will outline some of the likenesses between Buddhism and pessimism. At the same time, I will show how the conduct of one of the main characters (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34.  47
    Conflict detection and social perception: bringing meta-reasoning and social cognition together.André Mata - 2019 - Thinking and Reasoning 26 (1):140-149.
    Research on implicit conflict detection suggests that people are sensitive to violations of logical principles. When they make reasoning errors, their epistemic radar presumably detects an anomaly....
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  35. Detecting racial bias in algorithms and machine learning.Nicol Turner Lee - 2018 - Journal of Information, Communication and Ethics in Society 16 (3):252-260.
    Purpose The online economy has not resolved the issue of racial bias in its applications. While algorithms are procedures that facilitate automated decision-making, or a sequence of unambiguous instructions, bias is a byproduct of these computations, bringing harm to historically disadvantaged populations. This paper argues that algorithmic biases explicitly and implicitly harm racial groups and lead to forms of discrimination. Relying upon sociological and technical research, the paper offers commentary on the need for more workplace diversity within high-tech industries and (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   15 citations  
  36.  15
    Anomaly Detection on Univariate Sensing Time Series Data for Smart Aquaculture Using Deep Learning.Visar Shehu & Aleksandar Petkovski - 2023 - Seeu Review 18 (1):1-16.
    Aquaculture plays a significant role in both economic development and food production. Maintaining an ecological environment with good water quality is essential to ensure the production efficiency and quality of aquaculture. Effective management of water quality can prevent abnormal conditions and contribute significantly to food security. Detecting anomalies in the aquaculture environment is crucial to ensure that the environment is maintained correctly to meet healthy and proper requirements for fish farming. This article focuses on the use of deep learning techniques (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  37.  47
    Assessing the detection, reporting and investigation of adverse events in clinical trial protocols implemented in Cameroon: a documentary review of clinical trial protocols.Akoh Walter Ebile, Jerome Ateudjieu, Martin Ndinakie Yakum, Marceline Ngounoue Djuidje & Pierre Watcho - 2015 - BMC Medical Ethics 16 (1):1-9.
    BackgroundInternational guidelines recommend ethical and scientific quality standards for managing and reporting adverse events occurring during clinical trials to competent research ethics committees and regulatory authorities. The purpose of this study was to determine whether clinical trial protocols in Cameroon are developed in line with national requirements and international guidelines as far as detecting, reporting and investigating of adverse events is concerned.MethodsIt was a documentary review of all approved clinical trial protocols that were submitted at the Cameroon National Ethics Committee (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  38. Signal-Detection, Threshold, and Dual-Process Models of Recognition Memory: ROCs and Conscious Recollection.Andrew P. Yonelinas, Ian Dobbins, Michael D. Szymanski, Harpreet S. Dhaliwal & Ling King - 1995 - Consciousness and Cognition 5 (4):418-441.
    Threshold- and signal-detection-based models have dominated theorizing about recognition memory. Building upon these theoretical frameworks, we have argued for a dual-process model in which conscious recollection and familiarity contribute to memory performance. In the current paper we assessed several memory models by examining the effects of levels of processing and the number of presentations on recognition memory receiver operating characteristics . In general, when the ROCs were plotted in probability space they exhibited an inverted U shape; however, when they (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   16 citations  
  39.  27
    Detection Analysis of Epileptic EEG Using a Novel Random Forest Model Combined With Grid Search Optimization.Xiashuang Wang, Guanghong Gong, Ni Li & Shi Qiu - 2019 - Frontiers in Human Neuroscience 13:424082.
    In the automatic detection of epileptic seizures, the monitoring of critically ill patients with time varying EEG signals is an essential procedure in intensive care units. There is an increasing interest in using EEG analysis to detect seizure, and in this study we aim to get a better understanding of how to visualize the information in the EEG time-frequency feature, and design and train a novel random forest algorithm for EEG decoding, especially for multiple-levels of illness. Here, we propose (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  40.  45
    Police Detectives, Criminal Investigations and Collective Moral Responsibility.Seumas Miller - 2014 - Criminal Justice Ethics 33 (1):21-39.
    In this paper my concern is with the collective moral responsibility of criminal investigators for the outcomes of their investigations, bearing in mind that it is important to distinguish collective moral responsibility from, and relate it to, individual moral responsibility. In what sense, if any, are police detectives individually and collectively morally responsible for their success (or, for that matter, their failure) in gathering sufficient evidence to identify, arrest, and charge an offender who has committed a serious crime? Alternatively, in (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  41.  16
    Should Detection Avoidance Be Criminalized?Wayne A. Logan - 2024 - Criminal Law and Philosophy 18 (2):431-449.
    Human nature being what it is, individuals engaging in unlawful activity will often seek to avoid having their misconduct detected by law enforcement. This article provides the first legal analysis of what are termed detection avoidance measures, and evaluates whether, and how, they should be subject to criminalization.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  27
    Improving wearable-based fall detection with unsupervised learning.Mirko Fáñez, José R. Villar, Enrique de la Cal, Víctor M. González & Javier Sedano - 2022 - Logic Journal of the IGPL 30 (2):314-325.
    Fall detection is a challenging task that has received the attention of the research community in the recent years. This study focuses on FD using data gathered from wearable devices with tri-axial accelerometers, developing a solution centered in elderly people living autonomously. This research includes three different ways to improve a FD method: an analysis of the event detection stage, comparing several alternatives, an evaluation of features to extract for each detected event and an appraisal of up to (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  43. Detection of GPT-4 Generated Text in Higher Education: Combining Academic Judgement and Software to Identify Generative AI Tool Misuse.Mike Perkins, Jasper Roe, Darius Postma, James McGaughran & Don Hickerson - 2024 - Journal of Academic Ethics 22 (1):89-113.
    This study explores the capability of academic staff assisted by the Turnitin Artificial Intelligence (AI) detection tool to identify the use of AI-generated content in university assessments. 22 different experimental submissions were produced using Open AI’s ChatGPT tool, with prompting techniques used to reduce the likelihood of AI detectors identifying AI-generated content. These submissions were marked by 15 academic staff members alongside genuine student submissions. Although the AI detection tool identified 91% of the experimental submissions as containing AI-generated (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  44.  74
    Detecting extrasolar planets.Peter Kosso - 2006 - Studies in History and Philosophy of Science Part A 37 (2):224-236.
    The detection of extrasolar planets presents a good case in which to clarify the distinction between observation and inference from evidence. By asking whether these planets have been observed or inferred from evidence, and by using the scientific details to answer the question, we will get a clearer understanding of the epistemic difference between these two forms of information. The issue of scientific realism pivots on this distinction, and the results of this case will help to articulate the epistemically (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   7 citations  
  45. Introspection Is Signal Detection.Jorge Morales - 2024 - British Journal for the Philosophy of Science 75 (1):99-126.
    Introspection is a fundamental part of our mental lives. Nevertheless, its reliability and its underlying cognitive architecture have been widely disputed. Here, I propose a principled way to model introspection. By using time-tested principles from signal detection theory (SDT) and extrapolating them from perception to introspection, I offer a new framework for an introspective signal detection theory (iSDT). In SDT, the reliability of perceptual judgments is a function of the strength of an internal perceptual response (signal- to-noise ratio) (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   6 citations  
  46.  15
    Detection of the goals of a teaching center from values.Salvador Peiró Gregori - 1983 - Enrahonar: Quaderns de Filosofía 5:123.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47. Intelligent Plagiarism Detection for Electronic Documents.Mohran H. J. Al-Bayed - 2017 - Dissertation, Al-Azhar University, Gaza
    Plagiarism detection is the process of finding similarities on electronic based documents. Recently, this process is highly required because of the large number of available documents on the internet and the ability to copy and paste the text of relevant documents with simply Control+C and Control+V commands. The proposed solution is to investigate and develop an easy, fast, and multi-language support plagiarism detector with the easy of one click to detect the document plagiarism. This process will be done with (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  48. Deepfake detection by human crowds, machines, and machine-informed crowds.Matthew Groh, Ziv Epstein, Chaz Firestone & Rosalind Picard - 2022 - Proceedings of the National Academy of Sciences 119 (1):e2110013119.
    The recent emergence of machine-manipulated media raises an important societal question: How can we know whether a video that we watch is real or fake? In two online studies with 15,016 participants, we present authentic videos and deepfakes and ask participants to identify which is which. We compare the performance of ordinary human observers with the leading computer vision deepfake detection model and find them similarly accurate, while making different kinds of mistakes. Together, participants with access to the model’s (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  49.  20
    Digital Detectives: Websleuthing Reduces Eyewitness Identification Accuracy in Police Lineups.Camilla Elphick, Richard Philpot, Min Zhang, Avelie Stuart, Graham Pike, Ailsa Strathie, Catriona Havard, Zoe Walkington, Lara A. Frumkin, Mark Levine, Blaine A. Price, Arosha K. Bandara & Bashar Nuseibeh - 2021 - Frontiers in Psychology 12.
    Eyewitnesses to crimes sometimes search for a culprit on social media before viewing a police lineup, but it is not known whether this affects subsequent lineup identification accuracy. The present online study was conducted to address this. Two hundred and eighty-five participants viewed a mock crime video, and after a 15–20 min delay either viewed a mock social media site including the culprit, viewed a mock social media site including a lookalike, or completed a filler task. A week later, participants (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  18
    Detection and Recognition of Fearful Facial Expressions During the Coronavirus Disease (COVID-19) Pandemic in an Italian Sample: An Online Experiment.Federica Scarpina - 2020 - Frontiers in Psychology 11.
1 — 50 / 981