Sciweavers

2022 search results - page 339 / 405
» Trust in Multi-Agent Systems
Sort
View
AIPRF
2008
14 years 11 months ago
Spam Sender Detection with Classification Modeling on Highly Imbalanced Mail Server Behavior Data
Unsolicited commercial or bulk emails or emails containing viruses pose a great threat to the utility of email communications. A recent solution for filtering is reputation systems...
Yuchun Tang, Sven Krasser, Dmitri Alperovitch, Pau...
MIE
2008
119views Healthcare» more  MIE 2008»
14 years 11 months ago
Reliable Personal Health Records
A number of applications based on personal health records (PHRs) are emerging in the field of health care and wellness. PHRs empower patients by giving them control over their heal...
Ton van Deursen, Paul Koster, Milan Petkovic
ISSA
2004
14 years 11 months ago
Utilizing Neural Networks For Effective Intrusion Detection
Computer security, and intrusion detection in particular, has become increasingly important in today's business environment, to help ensure safe and trusted commerce between ...
Martin Botha
PDCN
2004
14 years 11 months ago
Implementing a secure setuid program
Setuid programs are often exploited by malicious attackers to obtain unauthorized access to local systems. Setuid programs, especially owned by the root user, are granted root pri...
Takahiro Shinagawa, Kenji Kono
ECIS
2000
14 years 11 months ago
The Issue of Mutuality in ECR Adoption: A Case Study
The adoption of ECR has been slow in many regions, despite its many potential benefits to manufacturers, distributors and retailers within a supply chain through reduction of inven...
Sherah Kurnia, Robert B. Johnston