Sciweavers

499 search results - page 45 / 100
» A Study on Latent Vulnerabilities
Sort
View
104
Voted
SAINT
2008
IEEE
15 years 6 months ago
A Sybil-Resilient Reputation Metric for P2P Applications
In this paper, we propose a reputation-based trust model for P2P applications and study it a security framework. This framework makes it easy to reason about the resilience of the...
Tien Tuan Anh Dinh, Mark Ryan
129
Voted
IWIA
2006
IEEE
15 years 6 months ago
Modeling and Execution of Complex Attack Scenarios using Interval Timed Colored Petri Nets
The commonly used flaw hypothesis model (FHM) for performing penetration tests provides only limited, highlevel guidance for the derivation of actual penetration attempts. In thi...
Ole Martin Dahl, Stephen D. Wolthusen
106
Voted
DEBU
2008
186views more  DEBU 2008»
15 years 16 days ago
A Survey of Collaborative Recommendation and the Robustness of Model-Based Algorithms
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Jeff J. Sandvig, Bamshad Mobasher, Robin D. Burke
SDM
2009
SIAM
208views Data Mining» more  SDM 2009»
15 years 9 months ago
Topic Evolution in a Stream of Documents.
Document collections evolve over time, new topics emerge and old ones decline. At the same time, the terminology evolves as well. Much literature is devoted to topic evolution in ...
Alexander Hinneburg, Andrè Gohr, Myra Spili...
CSE
2009
IEEE
15 years 7 months ago
Probabilistic Generative Models of the Social Annotation Process
—With the growth in the past few years of social tagging services like Delicious and CiteULike, there is growing interest in modeling and mining these social systems for deriving...
Said Kashoob, James Caverlee, Elham Khabiri