Sciweavers

1356 search results - page 215 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
USS
2010
13 years 5 months ago
Building a Dynamic Reputation System for DNS
The Domain Name System (DNS) is an essential protocol used by both legitimate Internet applications and cyber attacks. For example, botnets rely on DNS to support agile command an...
Manos Antonakakis, Roberto Perdisci, David Dagon, ...
PAKDD
2009
ACM
120views Data Mining» more  PAKDD 2009»
14 years 5 months ago
Detecting Link Hijacking by Web Spammers.
Abstract. Since current search engines employ link-based ranking algorithms as an important tool to decide a ranking of sites, Web spammers are making a significant effort to man...
Masaru Kitsuregawa, Masashi Toyoda, Young-joo Chun...
BIBE
2007
IEEE
124views Bioinformatics» more  BIBE 2007»
14 years 2 months ago
Finding Cancer-Related Gene Combinations Using a Molecular Evolutionary Algorithm
—High-throughput data such as microarrays make it possible to investigate the molecular-level mechanism of cancer more efficiently. Computational methods boost the microarray ana...
Chan-Hoon Park, Soo-Jin Kim, Sun Kim, Dong-Yeon Ch...
BMCBI
2007
96views more  BMCBI 2007»
13 years 8 months ago
Structure and function predictions of the Msa protein in Staphylococcus aureus
Background: Staphylococcus aureus is a human pathogen that causes a wide variety of lifethreatening infections using a large number of virulence factors. One of the major global r...
Vijayaraj Nagarajan, Mohamed O. Elasri
MOBISYS
2008
ACM
14 years 7 months ago
Improving wireless privacy with an identifier-free link layer protocol
We present the design and evaluation of an 802.11-like wireless link layer protocol that obfuscates all transmitted bits to increase privacy. This includes explicit identifiers su...
Ben Greenstein, Damon McCoy, Jeffrey Pang, Tadayos...