Edward McFowland III
AT&T Labs Fellowship Award Winner
true Using anomaly detection to ensure data integrity "Bad data leads to sub-optimal decisions ... . Ed McFowland III is one. Using anomaly detection to ensure data integrity Edward
Sensor Data: A Way to Make Smart Devices Secure?
false Accelerometers and gyroscopes on smart phones and tablets make it possible for simple motions to rotate a screen or control a gaming action. They are also extremely sensitive sensors capable of
The Evolution of Internet Threats: A Case for Security in the Network Cloud
system for detecting, back-tracing and resolving network-wide anomalies such as DDoS attacks and routing ... . These challenges illustrate how we are at the limits of existing detection
Content-Based Copy Detection
Content-based Copy Detection is an enabling technology to discover repeated content and events in a large-scale content database.
Content Acquisition Processing, Monitoring, and Forensics for AT&T Services (CONSENT)
CONSENT provides a platform for detection and analysis of content for security and quality assurance.
Scaling up Copy Detection
1 Scaling up Copy Detection Xian Li 1, Xin Luna Dong 2, Kenneth B. Lyons 3, Weiyi Meng 1, Divesh ... significantly improve truth finding from conflicting values. However, existing copy
Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware
Triton: A Carrier-based Approach for Detecting and Mitigating Mobile Malware Arati Baliga1 ... , a new, network-based architecture, and a prototype implementation of it, for detecting
Effective and Scalable Video Copy Detection
Zhu Liu, Zhu Liu, Zhu Liu, Zhu Liu Effective and Scalable Video Copy Detection March ACM SIGMM International Conference on Multimedia Information Retrieval MIR10
Prefix Hijacking Detection Device And Methods Thereof
8443076 Prefix Hijacking Detection Device And Methods Thereof United States Patent: 8443076 ( 1 of 1 ) United States Patent 8,443,076 Ji , et al. May 14, 2013 Prefix hijacking detection