Author: Emerald Knox (Emerald Knox)

Home / Emerald Knox
Post

Detecting the Presence of ENF Signal in Digital Videos: A Superpixel-Based Approach

Saffet Vatansever, Ahmet Emer Dirik and Nasir Memon Electrical network frequency (ENF) instantaneously fluctuates around its nominal value (50/60 Hz) due to a continuous disparity between generated power and consumed power. Consequently, luminous intensity of a mains-powered light source varies depending on ENF fluctuations in the grid network. Variations in the luminance over time can...

Post

Backpage and Bitcoin: Uncovering Human Traffickers

Rebecca S. Portnoff, Danny Yuxing Huang, Periwinkle Doerfler, Sadia Afroz and Damon McCoy Sites for online classified ads selling sex are widely used by human traffickers to support their pernicious business. The sheer quantity of ads makes manual exploration and analysis unscalable. In addition, discerning whether an ad is advertising a trafficked victim or a independent sex...

Post

Israel is 5th Nation to Host Student Cyber Security Contest

Israel will be the fifth country to host the final rounds of the world’s biggest student-run cybersecurity competition, Cyber Security Awareness Week (CSAW), on November 16 and 17 at Ben-Gurion University of the Negev in Beersheva. CSAW was founded 14 years ago by the New York University Tandon School of Engineering and last year its...

Post

Blockchain AI Researchers Link Specific Bitcoin Wallets to Sex Workers

Damon McCoy, an NYU Tandon assistant professor of computer science and engineering and one of the paper’s co-authors, explained that combining these techniques to identify sex ads by both author and Bitcoin owner represents a considerable advancement in assisting law enforcement and nonprofit organizations. “There are hundreds of thousands of these ads placed every year,...

Post

Follow the Bitcoin to Find Victims of Human Trafficking

A team of university researchers has devised the first automated techniques to identify ads potentially tied to human trafficking rings and link them to public information from Bitcoin — the primary payment method for online sex ads. This is the first step toward developing a suite of freely available tools to help police and nonprofit...

Post

Security features embedded in computer aided design (CAD) solid models for additive manufacturing

Fei Chen, Gary Mac, and Nikhil Gupta The additive manufacturing (AM) process chain relies heavily on cloud based resources and software programs that are connected to the internet. Cybersecurity has become a major concern for cloud based resources. While network security is important and is the responsibility of the information technology departments of corporations, a...

Post

Researchers from NYU Abu Dhabi's Center for Cyber Security Have Developed an Unhackable Computer Chip

Landmark achievements in IT security are happening at NYU Abu Dhabi [Center for Cyber Security]. For the first time, researchers developed a computer chip with security implemented at the lowest possible level, the hardware level. “Logic-locked” chips can’t be hacked or copied, providing future users with new guarantees of security for their devices. (Video)

Post

Google Rolls Out Important Update for Gmail on iOS – Here’s Why You Should Download It

The update fixes a major security loophole which was discovered earlier this year that allowed hackers to send users an email with a Google Doc attachment, which contained a phishing malware. … “This is a very serious situation for anybody who is infected because the victims have their accounts controlled by a malicious party,” said...