Sciweavers

103 search results - page 11 / 21
» Abusing Social Networks for Automated User Profiling
Sort
View
AINA
2007
IEEE
15 years 3 months ago
Service-Oriented Architectures for Embedded Systems Using Devices Profile for Web Services
In recent years a movement from distributed systems controlled by users to automatic, autonomous and self-configuring distributed systems is noticeable. Web services is one approa...
Elmar Zeeb, Andreas Bobek, Hendrik Bohn, Frank Gol...
DIM
2007
ACM
15 years 1 months ago
Using reputation to augment explicit authorization
Online social networks are formed when web applications allow users to contribute to an online community. The explosive growth of these social networks taxes the management capaci...
Phillip J. Windley, Devlin Daley, Bryant Cutler, K...
ACSAC
2009
IEEE
15 years 1 months ago
A Network Access Control Mechanism Based on Behavior Profiles
Abstract--Current Network Access Control (NAC) technologies manage the access of new devices into a network to prevent rogue devices from attacking network hosts or services. Typic...
Vanessa Frías-Martínez, Joseph Sherr...
MOBISYS
2006
ACM
15 years 9 months ago
WiFiProfiler: cooperative diagnosis in wireless LANs
While 802.11-based wireless hotspots are proliferating, users often have little recourse when the network does not work or performs poorly for them. They are left trying to manual...
Ranveer Chandra, Venkata N. Padmanabhan, Ming Zhan...
68
Voted
USS
2008
14 years 12 months ago
Measurement and Classification of Humans and Bots in Internet Chat
The abuse of chat services by automated programs, known as chat bots, poses a serious threat to Internet users. Chat bots target popular chat networks to distribute spam and malwa...
Steven Gianvecchio, Mengjun Xie, Zhengyu Wu, Haini...