Sciweavers

956 search results - page 159 / 192
» Data Mining Techniques for Security of Web Services
Sort
View
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
14 years 8 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
ESORICS
2008
Springer
14 years 11 months ago
Cryptographic Protocol Explication and End-Point Projection
Abstract. Cryptographic protocols are useful for engineering trust in transactions. There are several languages for describing these protocols, but these tend to capture the commun...
Jay A. McCarthy, Shriram Krishnamurthi
IMC
2010
ACM
14 years 7 months ago
Netalyzr: illuminating the edge network
In this paper we present Netalyzr, a network measurement and debugging service that evaluates the functionality provided by people's Internet connectivity. The design aims to...
Christian Kreibich, Nicholas Weaver, Boris Nechaev...
JCDL
2009
ACM
134views Education» more  JCDL 2009»
15 years 4 months ago
What happens when facebook is gone?
Web users are spending more of their time and creative energies within online social networking systems. While many of these networks allow users to export their personal data or ...
Frank McCown, Michael L. Nelson
ERCIMDL
2008
Springer
112views Education» more  ERCIMDL 2008»
14 years 11 months ago
Releasing the Power of Digital Metadata: Examining Large Networks of Co-related Publications
Bibliographic metadata plays a key role in scientific literature, not only to summarise and establish the facts of the publication record, but also to track citations between publ...
David Tarrant, Les Carr, Terry R. Payne