Sciweavers

47 search results - page 5 / 10
» A weakest precondition approach to active attacks analysis
Sort
View
AAAI
2006
13 years 11 months ago
Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Bamshad Mobasher, Robin D. Burke, Jeff J. Sandvig
CEAS
2005
Springer
14 years 3 months ago
Email Task Management: An Iterative Relational Learning Approach
Today’s email clients were designed for yesterday’s email. Originally, email was merely a communication medium. Today, people engage in a variety of complex behaviours using e...
Rinat Khoussainov, Nicholas Kushmerick
CMS
2010
150views Communications» more  CMS 2010»
13 years 10 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
SIBGRAPI
2006
IEEE
14 years 3 months ago
Expression Transfer between Photographs through Multilinear AAM's
Expression Transfer is a method for mapping a photographed expression performed by a given subject onto the photograph of another person’s face. Building on well succeeded previ...
Ives Macedo, Emilio Vital Brazil, Luiz Velho
INFOCOM
2010
IEEE
13 years 8 months ago
From Time Domain to Space Domain: Detecting Replica Attacks in Mobile Ad Hoc Networks
—A common vulnerability of wireless networks, in particular, the mobile ad hoc network (MANET), is their susceptibility to node compromise/physical capture attacks since the wire...
Kai Xing, Xiuzhen Cheng