Sciweavers

170 search results - page 27 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
SIGCPR
2006
ACM
166views Hardware» more  SIGCPR 2006»
14 years 1 months ago
Podcasting in academia: a new knowledge management paradigm within academic settings
Podcasting represents a new and exciting learning paradigm within an academic setting. Materials such conference reports, research manuscripts, and course lectures can be recorded...
Peter Ractham, Xuesong Zhang
CIKM
2005
Springer
14 years 1 months ago
MailRank: using ranking for spam detection
Can we use social networks to combat spam? This paper investigates the feasibility of MailRank, a new email ranking and classification scheme exploiting the social communication ...
Paul-Alexandru Chirita, Jörg Diederich, Wolfg...
CHI
2002
ACM
14 years 8 months ago
Hocman: supporting mobile group collaboration
We introduce the Hocman prototype, supporting mobile group collaboration among motorcyclists. The design is based on findings from a field study. The motorcyclists are a group wit...
Mattias Esbjörnsson, Mattias Östergren
JNCA
2007
136views more  JNCA 2007»
13 years 7 months ago
Adaptive anomaly detection with evolving connectionist systems
Anomaly detection holds great potential for detecting previously unknown attacks. In order to be effective in a practical environment, anomaly detection systems have to be capable...
Yihua Liao, V. Rao Vemuri, Alejandro Pasos
CCS
2010
ACM
13 years 7 months ago
Recruiting new tor relays with BRAIDS
Tor, a distributed Internet anonymizing system, relies on volunteers who run dedicated relays. Other than altruism, these volunteers have no incentive to run relays, causing a lar...
Rob Jansen, Nicholas Hopper, Yongdae Kim