Sciweavers

1056 search results - page 11 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
96
Voted
IAW
2003
IEEE
15 years 2 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
91
Voted
CEAS
2008
Springer
14 years 11 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
ECIR
2008
Springer
14 years 11 months ago
Exploiting Locality of Wikipedia Links in Entity Ranking
Abstract. Information retrieval from web and XML document collections is ever more focused on returning entities instead of web pages or XML elements. There are many research field...
Jovan Pehcevski, Anne-Marie Vercoustre, James A. T...
USS
2008
14 years 12 months ago
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
ICWS
2009
IEEE
15 years 6 months ago
Exploiting Metrics for Similarity-Based Semantic Web Service Discovery
—Semantic Web Services (SWS) aim at the automated discovery and orchestration of Web services on the basis of comprehensive, machine-interpretable semantic descriptions. However,...
Stefan Dietze, Alessio Gugliotta, John Domingue