Sciweavers

CEAS
2011
Springer
14 years 3 months ago
Spam detection using web page content: a new battleground
Traditional content-based e-mail spam filtering takes into account content of e-mail messages and apply machine learning techniques to infer patterns that discriminate spams from...
Marco Túlio Ribeiro, Pedro Henrique Calais ...
109
Voted
CEAS
2011
Springer
14 years 3 months ago
Towards the effective temporal association mining of spam blacklists
Andrew G. West, Insup Lee
CEAS
2011
Springer
14 years 3 months ago
Blocking spam by separating end-user machines from legitimate mail server machines
Spamming botnets present a critical challenge in the control of spam messages due to the sheer volume and wide spread of the botnet members. In this paper we advocate the approach...
Fernando Sanchez, Zhenhai Duan, Yingfei Dong
CCSECIS
2011
47views more  CCSECIS 2011»
14 years 3 months ago
A Simulation System of Social Economic
Macro-control is an important system of regulation in the body of socialist market economy; it plays a significant role in the social economy. To make it come into play, it is nec...
Zhao MingXia, Qiuyan He
150
Voted
CCS
2011
ACM
14 years 3 months ago
Policy auditing over incomplete logs: theory, implementation and applications
We present the design, implementation and evaluation of an algorithm that checks audit logs for compliance with privacy and security policies. The algorithm, which we name reduce,...
Deepak Garg, Limin Jia, Anupam Datta
CCS
2011
ACM
14 years 3 months ago
PaperSpeckle: microscopic fingerprinting of paper
Paper forgery is among the leading causes of corruption in many developing regions [2]. In this paper, we introduce PaperSpeckle, a robust system that leverages the natural random...
Ashlesh Sharma, Lakshminarayanan Subramanian, Eric...
124
Voted
CCS
2011
ACM
14 years 3 months ago
Ciphers that securely encipher their own keys
Mihir Bellare, David Cash, Sriram Keelveedhi
201
Voted
CCS
2011
ACM
14 years 3 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
CCS
2011
ACM
14 years 3 months ago
App isolation: get the security of multiple browsers with just one
Eric Yawei Chen, Jason Bau, Charles Reis, Adam Bar...
CCS
2011
ACM
14 years 3 months ago
Televisions, video privacy, and powerline electromagnetic interference
We conduct an extensive study of information leakage over the powerline infrastructure from eight televisions (TVs) spanning multiple makes, models, and underlying technologies. I...
Miro Enev, Sidhant Gupta, Tadayoshi Kohno, Shwetak...