Sciweavers

3451 search results - page 17 / 691
» Collaborative attack modeling
Sort
View
COLCOM
2008
IEEE
14 years 2 months ago
Defending against Attribute-Correlation Attacks in Privacy-Aware Information Brokering
Nowadays, increasing needs for information sharing arise due to extensive collaborations among organizations. Organizations desire to provide data access to their collaborators whi...
Fengjun Li, Bo Luo, Peng Liu, Anna Cinzia Squiccia...
WIDM
2005
ACM
14 years 1 months ago
Preventing shilling attacks in online recommender systems
Collaborative filtering techniques have been successfully employed in recommender systems in order to help users deal with information overload by making high quality personalize...
Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Z...
INFOCOM
2010
IEEE
13 years 6 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes
COLCOM
2005
IEEE
14 years 1 months ago
An experimental evaluation of spam filter performance and robustness against attack
— In this paper, we show experimentally that learning filters are able to classify large corpora of spam and legitimate email messages with a high degree of accuracy. The corpor...
Steve Webb, Subramanyam Chitti, Calton Pu
IJCAT
2010
106views more  IJCAT 2010»
13 years 6 months ago
Fine grain associative feature reasoning in collaborative engineering
: This paper explores the vast domain of systematic collaborative engineering with reference to product lifecycle management approach from the angle of feature-level collaboration ...
Yong-Sheng Ma, C. H. Bong