Sciweavers

263 search results - page 15 / 53
» A day at the root of the internet
Sort
View
WIDM
2006
ACM
14 years 1 months ago
Lazy preservation: reconstructing websites by crawling the crawlers
Backup of websites is often not considered until after a catastrophic event has occurred to either the website or its webmaster. We introduce “lazy preservation” – digital p...
Frank McCown, Joan A. Smith, Michael L. Nelson
ISMIS
2003
Springer
14 years 27 days ago
Enacting an Agent-Based Digital Self in a 24x7 Web Services World
As broadband access to the Internet becomes pervasive, the need for a 24 hours a day, seven days a week (24x7) interface within the client devices, requires a level of sophisticati...
Steve Goschnick
IJNSEC
2008
137views more  IJNSEC 2008»
13 years 7 months ago
Baseline Profile Stability for Network Anomaly Detection
Network attacks are commonplace in the Internet. One of the defense mechanisms against the network attacks is using a baseline profile established during normal operation to detec...
Yoohwan Kim, Ju-Yeon Jo, Kyunghee Kim Suh
IADIS
2004
13 years 9 months ago
Fighting spam: motivating an account-based approach
Spam as unsolicited e-mail to a large number of recipients is known to become an increasingly disturbing and costly issue of electronic business and Internet traffic. Mainly techn...
Guido Schryen
ISSA
2004
13 years 9 months ago
An Investigation Into Computer Forensic Tools
Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with seemingly no barriers while making a countless number of ...
K. K. Arthur