Sciweavers

47 search results - page 5 / 10
» A weakest precondition approach to active attacks analysis
Sort
View
AAAI
2006
15 years 1 months ago
Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Bamshad Mobasher, Robin D. Burke, Jeff J. Sandvig
CEAS
2005
Springer
15 years 5 months ago
Email Task Management: An Iterative Relational Learning Approach
Today’s email clients were designed for yesterday’s email. Originally, email was merely a communication medium. Today, people engage in a variety of complex behaviours using e...
Rinat Khoussainov, Nicholas Kushmerick
CMS
2010
150views Communications» more  CMS 2010»
14 years 12 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
SIBGRAPI
2006
IEEE
15 years 5 months ago
Expression Transfer between Photographs through Multilinear AAM's
Expression Transfer is a method for mapping a photographed expression performed by a given subject onto the photograph of another person’s face. Building on well succeeded previ...
Ives Macedo, Emilio Vital Brazil, Luiz Velho
INFOCOM
2010
IEEE
14 years 10 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng