Sciweavers

1305 search results - page 231 / 261
» Inferring Privacy Information from Social Networks
Sort
View
96
Voted
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 8 months ago
Detecting Flooding-Based DDoS Attacks
—A Distributed Denial of Service (DDoS) attack is widely regarded as a major threat for the current Internet because of its ability to create a huge volume of unwanted traffic. ...
Yonghua You, Mohammad Zulkernine, Anwar Haque
125
Voted
CSREASAM
2006
15 years 3 months ago
Session Based Logging (SBL) for IP-Traceback on Network Forensics
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, ...
Omer Demir, Ping Ji, Jinwoo Kim
113
Voted
KES
2007
Springer
15 years 1 months ago
Creating Chances Through Cognitive Niche Construction
Abstract As a matter of fact, humans continuously delegate and distribute cognitive functions to the environment to lessen their limits. They build models, representations, and oth...
Lorenzo Magnani
117
Voted
MM
2009
ACM
147views Multimedia» more  MM 2009»
15 years 6 months ago
Wearing a YouTube hat: directors, comedians, gurus, and user aggregated behavior
While existing studies on YouTube’s massive user-generated video content have mostly focused on the analysis of videos, their characteristics, and network properties, little att...
Joan-Isaac Biel, Daniel Gatica-Perez
118
Voted
APVIS
2008
15 years 3 months ago
MobiVis: A Visualization System for Exploring Mobile Data
The widespread use of mobile devices brings opportunities to capture large-scale, continuous information about human behavior. Mobile data has tremendous value, leading to busines...
Zeqian Shen, Kwan-Liu Ma