Sciweavers

186 search results - page 21 / 38
» Online Classification of Network Flows
Sort
View
CCS
2009
ACM
15 years 10 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
ASIAN
2007
Springer
174views Algorithms» more  ASIAN 2007»
15 years 3 months ago
Combining Heterogeneous Classifiers for Network Intrusion Detection
Extensive use of computer networks and online electronic data and high demand for security has called for reliable intrusion detection systems. A repertoire of different classifier...
Ali Borji
56
Voted
CHI
2010
ACM
15 years 4 months ago
Contacts 3.0: bringing together research and design teams to reinvent the phonebook
We present a narrative of the design of Contacts 3.0, a service and updated phonebook application on a mobile device that combines on-device communication with communication from ...
Frank R. Bentley, JoEllen Kames, Rafiq Ahmed, Rhia...
CHI
2004
ACM
15 years 10 months ago
Friendster and publicly articulated social networking
This paper presents ethnographic fieldwork on Friendster, an online dating site utilizing social networks to encourage friend-of-friend connections. I discuss how Friendster appli...
Danah Boyd
74
Voted
CSCW
2010
ACM
15 years 6 months ago
Reading between the lines: linguistic cues to deception in online dating profiles
This study investigates whether deception in online dating profiles is detectable through a linguistic approach, which assumes that liars nonconsciously produce different word pat...
Catalina L. Toma, Jeffrey T. Hancock