Sciweavers

1381 search results - page 241 / 277
» Trusted Computing: Providing Security for Peer-to-Peer Netwo...
Sort
View
125
Voted
NAR
2011
212views Computer Vision» more  NAR 2011»
14 years 1 months ago
UKPMC: a full text article resource for the life sciences
UK PubMed Central (UKPMC) is a full-text article database that extends the functionality of the original PubMed Central (PMC) repository. The UKPMC project was launched as the fir...
Johanna R. McEntyre, Sophia Ananiadou, Stephen And...
CONEXT
2009
ACM
15 years 14 hour ago
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Network traffic can be represented by a Traffic Dispersion Graph (TDG) that contains an edge between two nodes that send a particular type of traffic (e.g., DNS) to one another. T...
Marios Iliofotou, Michalis Faloutsos, Michael Mitz...
89
Voted
CCS
2011
ACM
13 years 11 months ago
Fashion crimes: trending-term exploitation on the web
Online service providers are engaged in constant conflict with miscreants who try to siphon a portion of legitimate traffic to make illicit profits. We study the abuse of “tr...
Tyler Moore, Nektarios Leontiadis, Nicolas Christi...
DFN
2003
15 years 9 days ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
70
Voted
NSPW
2006
ACM
15 years 4 months ago
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts
Spyware, Adware, Bots. In each case, there is significant evidence that there is an increasing financial motivation behind the writing and distribution of these programs. In thi...
Richard Ford, Sarah Gordon