Sciweavers

5909 search results - page 90 / 1182
» Information Sharing Communities
Sort
View
SIGIR
2010
ACM
15 years 1 months ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb
IFIP
1992
Springer
15 years 1 months ago
Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability?
On initiative of the Commission of the European Communities, the Information Technology Security Evaluation Criteria (ITSEC) are designed to provide a yardstick for the evaluation...
Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg
IMCS
2010
76views more  IMCS 2010»
14 years 8 months ago
Human-Related Problems of Information Security in East African Cross-Cultural Environments
Purpose – The purposes of this paper are to find what kinds of problems, while implementing information security policy, may take place in foreign companies in the East African ...
Tatsuo Asai, Ms. Aline Uwera Hakizabera
CIKM
2009
Springer
15 years 4 months ago
Community mining on dynamic weighted directed graphs
Dongsheng Duan, Yuhua Li, Yanan Jin, Zhengding Lu
79
Voted
SIGKDD
2010
93views more  SIGKDD 2010»
14 years 4 months ago
Topic-based social network analysis for virtual communities of interests in the dark web
Gaston L'Huillier, Héctor Álvarez, S...