Sciweavers

7544 search results - page 64 / 1509
» Network Forensics Analysis
Sort
View
ESORICS
2009
Springer
15 years 1 months ago
An Effective Method for Combating Malicious Scripts Clickbots
Abstract. Online advertising has been suffering serious click fraud problem. Fraudulent publishers can generate false clicks using malicious scripts embedded in their web pages. Ev...
Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong ...
EUROSYS
2011
ACM
14 years 1 months ago
Keypad: an auditing file system for theft-prone devices
This paper presents Keypad, an auditing file system for theftprone devices, such as laptops and USB sticks. Keypad provides two important properties. First, Keypad supports fine...
Roxana Geambasu, John P. John, Steven D. Gribble, ...
INFOCOM
2007
IEEE
15 years 4 months ago
On the Performance Analysis of Network-Coded Cooperation in Wireless Networks
—In this letter, a network-coded cooperation scheme with dynamic coding mechanism (DC-NCC) is proposed. In DCNCC, the relay dynamically adapts forming the network-coded data base...
Cong Peng, Qian Zhang, Ming Zhao 0001, Yan Yao
MOBIHOC
2005
ACM
15 years 9 months ago
Modelling and performance analysis of the distributed scheduler in IEEE 802.16 mesh mode
Min Cao, Wenchao Ma, Qian Zhang, Xiaodong Wang, We...
NDSS
2007
IEEE
15 years 4 months ago
A Quantitative Study of Forum Spamming Using Context-based Analysis
Yuan Niu, Hao Chen, Francis Hsu, Yi-Min Wang, Ming...