Sciweavers

1305 search results - page 253 / 261
» Inferring Privacy Information from Social Networks
Sort
View
IISWC
2008
IEEE
15 years 4 months ago
Workload characterization of selected JEE-based Web 2.0 applications
Web 2.0 represents the evolution of the web from a source of information to a platform. Network advances have permitted users to migrate from desktop applications to so-called Ric...
Priya Nagpurkar, William Horn, U. Gopalakrishnan, ...
JDFP
2006
139views more  JDFP 2006»
14 years 9 months ago
Discovering Hidden Evidence
Over the past decade, the advancement of a myriad of methods, techniques and technologies to conceal digital evidence and covertly communicate have increased at an alarming rate. I...
Chet Hosmer
94
Voted
SIGCOMM
2009
ACM
15 years 4 months ago
Hot today, gone tomorrow: on the migration of MySpace users
While some empirical studies on Online Social Networks (OSNs) have examined the growth of these systems, little is known about the patterns of decline in user population or user a...
Mojtaba Torkjazi, Reza Rejaie, Walter Willinger
ISI
2008
Springer
14 years 9 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
CORR
2006
Springer
113views Education» more  CORR 2006»
14 years 9 months ago
Secure Positioning of Mobile Terminals with Simplex Radio Communication
With the rapid spread of various mobile terminals in our society, the importance of secure positioning is growing for wireless networks in adversarial settings. Recently, several ...
Mikio Fujii