Sciweavers

7544 search results - page 1328 / 1509
» Network Forensics Analysis
Sort
View
CSCW
2010
ACM
16 years 1 months ago
Reading between the lines: linguistic cues to deception in online dating profiles
This study investigates whether deception in online dating profiles is detectable through a linguistic approach, which assumes that liars nonconsciously produce different word pat...
Catalina L. Toma, Jeffrey T. Hancock
CHI
2010
ACM
15 years 11 months ago
Blogging in a region of conflict: supporting transition to recovery
The blogosphere is changing how people experience war and conflict. We conducted an analysis of 125 blogs written by Iraqi citizens experiencing extreme disruption in their countr...
Ban Al-Ani, Gloria Mark, Bryan Semaan
SAC
2010
ACM
15 years 11 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
ACSAC
2009
IEEE
15 years 11 months ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...
156
Voted
CVPR
2009
IEEE
15 years 11 months ago
Learning multi-modal densities on Discriminative Temporal Interaction Manifold for group activity recognition
While video-based activity analysis and recognition has received much attention, existing body of work mostly deals with single object/person case. Coordinated multi-object activi...
Ruonan Li, Rama Chellappa, Shaohua Kevin Zhou
« Prev « First page 1328 / 1509 Last » Next »