Sciweavers

186 search results - page 21 / 38
» Online Classification of Network Flows
Sort
View
CCS
2009
ACM
16 years 2 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
ASIAN
2007
Springer
174views Algorithms» more  ASIAN 2007»
15 years 8 months ago
Combining Heterogeneous Classifiers for Network Intrusion Detection
Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
Ali Borji
CHI
2010
ACM
15 years 8 months ago
Contacts 3.0: bringing together research and design teams to reinvent the phonebook
We present a narrative of the design of Contacts 3.0, a service and updated phonebook application on a mobile device that combines on-device communication with communication from ...
Frank R. Bentley, JoEllen Kames, Rafiq Ahmed, Rhia...
82
Voted
CHI
2004
ACM
16 years 2 months ago
Friendster and publicly articulated social networking
This paper presents ethnographic fieldwork on Friendster, an online dating site utilizing social networks to encourage friend-of-friend connections. I discuss how Friendster appli...
Danah Boyd
CSCW
2010
ACM
15 years 10 months ago
Reading between the lines: linguistic cues to deception in online dating profiles
This study investigates whether deception in online dating profiles is detectable through a linguistic approach, which assumes that liars nonconsciously produce different word pat...
Catalina L. Toma, Jeffrey T. Hancock