Sciweavers

53 search results - page 6 / 11
» Generating a privacy footprint on the internet
Sort
View
ECRIME
2007
15 years 1 months ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins
SP
2010
IEEE
140views Security Privacy» more  SP 2010»
15 years 1 months ago
Inspector Gadget: Automated Extraction of Proprietary Gadgets from Malware Binaries
Abstract—Unfortunately, malicious software is still an unsolved problem and a major threat on the Internet. An important component in the fight against malicious software is the...
Clemens Kolbitsch, Thorsten Holz, Christopher Krue...
HICSS
2002
IEEE
116views Biometrics» more  HICSS 2002»
15 years 2 months ago
E-commerce Security Issues
Without trust, most prudent business operators and clients may decide to forgo use of the Internet and revert back to traditional methods of doing business. To counter this trend,...
Randy C. Marchany, Joseph G. Tront
ISI
2005
Springer
15 years 3 months ago
Modeling and Multiway Analysis of Chatroom Tensors
This work identifies the limitations of n-way data analysis techniques in multidimensional stream data, such as Internet chatroom communications data, and establishes a link betwe...
Evrim Acar, Seyit Ahmet Çamtepe, Mukkai S. ...
WWW
2009
ACM
15 years 10 months ago
Releasing search queries and clicks privately
The question of how to publish an anonymized search log was brought to the forefront by a well-intentioned, but privacy-unaware AOL search log release. Since then a series of ad-h...
Aleksandra Korolova, Krishnaram Kenthapadi, Nina M...