Sciweavers

1191 search results - page 199 / 239
» Online Games and Security
Sort
View
JETAI
2007
141views more  JETAI 2007»
15 years 21 days ago
Exchange market for complex commodities: search for optimal matches
The Internet has led to the development of on-line markets, and computer scientists have designed various auction algorithms, as well as automated exchanges for standardized commo...
Eugene Fink, Jianli Gong, Josh Johnson
119
Voted
CORR
2004
Springer
146views Education» more  CORR 2004»
15 years 19 days ago
ANTIDS: Self-Organized Ant-based Clustering Model for Intrusion Detection System
: Security of computers and the networks that connect them is increasingly becoming of great significance. Computer security is defined as the protection of computing systems again...
Vitorino Ramos, Ajith Abraham
115
Voted
ISI
2008
Springer
15 years 9 days ago
A Generative Model for Statistical Determination of Information Content from Conversation Threads
We present a generative model for determining the information content of a message without analyzing the message content. Such a tool is useful for automated analysis of the vast ...
Yingjie Zhou, Malik Magdon-Ismail, William A. Wall...
101
Voted
TRUSTBUS
2010
Springer
14 years 11 months ago
Privacy Policy Referencing
Data protection legislation was originally defined for a context where personal information is mostly stored on centralized servers with limited connectivity or openness to 3rd pa...
Audun Jøsang, Lothar Fritsch, Tobias Mahler
CSREASAM
2010
14 years 10 months ago
Keyloggers in Cybersecurity Education
Abstract-- Keylogger programs attempt to retrieve confidential information by covertly capturing user input via keystroke monitoring and then relaying this information to others, o...
Christopher Wood, Rajendra Raj