Sciweavers

1356 search results - page 215 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
164
Voted
USS
2010
15 years 1 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
PAKDD
2009
ACM
120views Data Mining» more  PAKDD 2009»
16 years 17 days ago
Detecting Link Hijacking by Web Spammers.
Abstract. Since current search engines employ link-based ranking algorithms as an important tool to decide a ranking of sites, Web spammers are making a significant effort to man...
Masaru Kitsuregawa, Masashi Toyoda, Young-joo Chun...
134
Voted
BIBE
2007
IEEE
124views Bioinformatics» more  BIBE 2007»
15 years 9 months ago
Finding Cancer-Related Gene Combinations Using a Molecular Evolutionary Algorithm
—High-throughput data such as microarrays make it possible to investigate the molecular-level mechanism of cancer more efficiently. Computational methods boost the microarray ana...
Chan-Hoon Park, Soo-Jin Kim, Sun Kim, Dong-Yeon Ch...
121
Voted
BMCBI
2007
96views more  BMCBI 2007»
15 years 3 months ago
Structure and function predictions of the Msa protein in Staphylococcus aureus
Background: Staphylococcus aureus is a human pathogen that causes a wide variety of lifethreatening infections using a large number of virulence factors. One of the major global r...
Vijayaraj Nagarajan, Mohamed O. Elasri
126
Voted
MOBISYS
2008
ACM
16 years 2 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...