Sciweavers

239 search results - page 38 / 48
» Accountable Privacy
Sort
View
CCS
2010
ACM
13 years 11 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
CCS
2006
ACM
14 years 2 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
AAAI
2012
12 years 1 months ago
Discovering Spammers in Social Networks
As the popularity of the social media increases, as evidenced in Twitter, Facebook and China’s Renren, spamming activities also picked up in numbers and variety. On social netwo...
Yin Zhu, Xiao Wang, ErHeng Zhong, Nathan Nan Liu, ...
ICCCN
2007
IEEE
14 years 5 months ago
Evaluation of Security Protocols for the Session Initiation Protocol
— Despite the popularity of VoIP these days, this method of communication may present significant security challenges in terms of privacy and accounting. Authentication and messa...
Eun-Chul Cha, Hyoung-Kee Choi, Sung-Jae Cho
PERVASIVE
2010
Springer
14 years 2 months ago
Object-Based Activity Recognition with Heterogeneous Sensors on Wrist
Abstract. This paper describes how we recognize activities of daily living (ADLs) with our designed sensor device, which is equipped with heterogeneous sensors such as a camera, a ...
Takuya Maekawa, Yutaka Yanagisawa, Yasue Kishino, ...