Search For:

Displaying 1-4 out of 4 total
Clinical Case: Enhancing medical monitoring with visualization and analytics
Found in: 2012 IEEE International Conference on Bioinformatics and Biomedicine (BIBM)
By Michael Farnum,Victor Lobanov,Michael Brennan,Dimitris Agrafiotis,Jeremy Kolpak,Joseph Ciervo,Laurent Alquier
Issue Date:October 2012
pp. 1
Monitoring ongoing clinical trials is a crucial activity for sponsors mandated by the FDA. Some of the important goals a re the early detection of safety issues, assurance of proper trial conduct at remote sites, and tracking efficiency and cost. Generatin...
 
Academic Impact at the Federal Trade Commission
Found in: IEEE Security & Privacy
By Michael Brennan
Issue Date:November 2012
pp. 78-82
How does academic privacy and security research result in real-world privacy protection or enhancement? This isn't just an issue of broader research impact but a fundamental scientific research question. A major means to accomplish impact is through existi...
 
Adversarial stylometry: Circumventing authorship recognition to preserve privacy and anonymity
Found in: ACM Transactions on Information and System Security (TISSEC)
By Michael Brennan, Rachel Greenstadt, Sadia Afroz
Issue Date:November 2012
pp. 1-22
The use of stylometry, authorship recognition through purely linguistic means, has contributed to literary, historical, and criminal investigation breakthroughs. Existing stylometry research assumes that authors have not attempted to disguise their linguis...
     
Mixed-initiative security agents
Found in: Proceedings of the 2nd ACM workshop on Security and artificial intelligence (AISec '09)
By Michael Brennan, Rachel Greenstadt, Sadia Afroz
Issue Date:November 2009
pp. 35-38
Security decision-making is hard for both humans and machines. This is because security decisions are context-dependent, require highly dynamic, specialized knowledge,and require complex risk analysis. Multiple user studies show that humans have difficulty...
     
 1