Sciweavers

170 search results - page 27 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
66
Voted
SIGCPR
2006
ACM
166views Hardware» more  SIGCPR 2006»
15 years 5 months ago
Podcasting in academia: a new knowledge management paradigm within academic settings
Podcasting represents a new and exciting learning paradigm within an academic setting. Materials such conference reports, research manuscripts, and course lectures can be recorded...
Peter Ractham, Xuesong Zhang
CIKM
2005
Springer
15 years 5 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
CHI
2002
ACM
16 years 20 hour ago
Hocman: supporting mobile group collaboration
We introduce the Hocman prototype, supporting mobile group collaboration among motorcyclists. The design is based on findings from a field study. The motorcyclists are a group wit...
Mattias Esbjörnsson, Mattias Östergren
JNCA
2007
136views more  JNCA 2007»
14 years 11 months ago
Adaptive anomaly detection with evolving connectionist systems
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
Yihua Liao, V. Rao Vemuri, Alejandro Pasos
CCS
2010
ACM
14 years 12 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim