Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- surveyApril 2024
Identifying Authorship in Malicious Binaries: Features, Challenges & Datasets
ACM Computing Surveys (CSUR), Volume 56, Issue 8Article No.: 212, Pages 1–36https://doi.org/10.1145/3653973Attributing a piece of malware to its creator typically requires threat intelligence. Binary attribution increases the level of difficulty as it mostly relies upon the ability to disassemble binaries to obtain authorship-related features. We perform a ...
- surveyApril 2024
Generalized Video Anomaly Event Detection: Systematic Taxonomy and Comparison of Deep Models
ACM Computing Surveys (CSUR), Volume 56, Issue 7Article No.: 189, Pages 1–38https://doi.org/10.1145/3645101Video Anomaly Detection (VAD) serves as a pivotal technology in the intelligent surveillance systems, enabling the temporal or spatial identification of anomalous events within videos. While existing reviews predominantly concentrate on conventional ...
- surveyJanuary 2024
Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions
ACM Computing Surveys (CSUR), Volume 56, Issue 5Article No.: 131, Pages 1–37https://doi.org/10.1145/3635030The Industrial Internet of Things (IIoT) has been positioned as a key pillar of the Industry 4.0 revolution, which is projected to continue accelerating and realizing digital transformations. The IIoT is becoming indispensable, providing the means through ...
- surveyNovember 2023
Economic Systems in the Metaverse: Basics, State of the Art, and Challenges
- Huang Huawei,
- Zhang Qinnan,
- Li Taotao,
- Yang Qinglin,
- Yin Zhaokang,
- Wu Junhao,
- Zehui Xiong,
- Zhu Jianming,
- Jiajing Wu,
- Zibin Zheng
ACM Computing Surveys (CSUR), Volume 56, Issue 4Article No.: 99, Pages 1–33https://doi.org/10.1145/3626315Economic systems play pivotal roles in the metaverse. However, we have not yet found an overview that systematically introduces economic systems for the metaverse. Therefore, we review the state-of-the-art solutions, architectures, and systems related to ...
- surveyOctober 2023
3D Face Reconstruction: The Road to Forensics
ACM Computing Surveys (CSUR), Volume 56, Issue 3Article No.: 77, Pages 1–38https://doi.org/10.1145/36252883D face reconstruction algorithms from images and videos are applied to many fields, from plastic surgery to the entertainment sector, thanks to their advantageous features. However, when looking at forensic applications, 3D face reconstruction must ...
- surveyJuly 2023
Device Fingerprinting for Cyber-Physical Systems: A Survey
ACM Computing Surveys (CSUR), Volume 55, Issue 14sArticle No.: 302, Pages 1–41https://doi.org/10.1145/3584944The continued growth of the cyber-physical system (CPS) and Internet of Things technologies raises device security and monitoring concerns. For device identification, authentication, conditioning, and security, device fingerprint/fingerprinting (DFP) is ...
- surveyFebruary 2023
A Comprehensive Review on Vision-Based Violence Detection in Surveillance Videos
ACM Computing Surveys (CSUR), Volume 55, Issue 10Article No.: 200, Pages 1–44https://doi.org/10.1145/3561971Recent advancements in intelligent surveillance systems for video analysis have been a topic of great interest in the research community due to the vast number of applications to monitor humans’ activities. The growing demand for these systems aims ...
- research-articleMay 2021
Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions
- Khan Muhammad,
- Mohammad S. Obaidat,
- Tanveer Hussain,
- Javier Del Ser,
- Neeraj Kumar,
- Mohammad Tanveer,
- Faiyaz Doctor
ACM Computing Surveys (CSUR), Volume 54, Issue 3Article No.: 68, Pages 1–33https://doi.org/10.1145/3444693CCTV cameras installed for continuous surveillance generate enormous amounts of data daily, forging the term Big Video Data (BVD). The active practice of BVD includes intelligent surveillance and activity recognition, among other challenging tasks. To ...
- surveySeptember 2020
A Survey of Fake News: Fundamental Theories, Detection Methods, and Opportunities
ACM Computing Surveys (CSUR), Volume 53, Issue 5Article No.: 109, Pages 1–40https://doi.org/10.1145/3395046The explosive growth in fake news and its erosion to democracy, justice, and public trust has increased the demand for fake news detection and intervention. This survey reviews and evaluates methods that can detect fake news from four perspectives: the ...
- surveyNovember 2019
A Systematic Survey on Cloud Forensics Challenges, Solutions, and Future Directions
ACM Computing Surveys (CSUR), Volume 52, Issue 6Article No.: 124, Pages 1–38https://doi.org/10.1145/3361216The challenges of cloud forensics have been well-documented by both researchers and government agencies (e.g., U.S. National Institute of Standards and Technology), although many of the challenges remain unresolved. In this article, we perform a ...
- surveyJune 2019
Environmental Audio Scene and Sound Event Recognition for Autonomous Surveillance: A Survey and Comparative Studies
ACM Computing Surveys (CSUR), Volume 52, Issue 3Article No.: 63, Pages 1–34https://doi.org/10.1145/3322240Monitoring of human and social activities is becoming increasingly pervasive in our living environment for public security and safety applications. The recognition of suspicious events is important in both indoor and outdoor environments, such as child-...
- surveyApril 2019
Gait-based Person Re-identification: A Survey
ACM Computing Surveys (CSUR), Volume 52, Issue 2Article No.: 33, Pages 1–34https://doi.org/10.1145/3243043The way people walk is a strong correlate of their identity. Several studies have shown that both humans and machines can recognize individuals just by their gait, given that proper measurements of the observed motion patterns are available. For ...
- surveyJanuary 2019
A Perspective Analysis of Handwritten Signature Technology
ACM Computing Surveys (CSUR), Volume 51, Issue 6Article No.: 117, Pages 1–39https://doi.org/10.1145/3274658Handwritten signatures are biometric traits at the center of debate in the scientific community. Over the last 40 years, the interest in signature studies has grown steadily, having as its main reference the application of automatic signature ...
- surveyMay 2018
Current and Future Trends in Mobile Device Forensics: A Survey
ACM Computing Surveys (CSUR), Volume 51, Issue 3Article No.: 46, Pages 1–31https://doi.org/10.1145/3177847Contemporary mobile devices are the result of an evolution process, during which computational and networking capabilities have been continuously pushed to keep pace with the constantly growing workload requirements. This has allowed devices such as ...