Sciweavers

459 search results - page 11 / 92
» Detecting Spam at the Network Level
Sort
View
CEAS
2004
Springer
14 years 29 days ago
Reputation Network Analysis for Email Filtering
In addition to traditional spam detection applications, new methods of filtering messages – including whitelist and social network based filters – are being investigated to fur...
Jennifer Golbeck, James A. Hendler
DIMVA
2009
13 years 8 months ago
Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks
Remote code-injection attacks are one of the most frequently used attacking vectors in computer security. To detect and analyze injected code (often called shellcode), some researc...
Makoto Shimamura, Kenji Kono
DCOSS
2009
Springer
14 years 2 months ago
Optimal Allocation of Time-Resources for Multihypothesis Activity-Level Detection
Abstract. The optimal allocation of samples for activity-level detection in a wireless body area network for health-monitoring applications is considered. A wireless body area netw...
Gautam Thatte, Viktor Rozgic, Ming Li, Sabyasachi ...
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 7 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
ADBIS
2006
Springer
90views Database» more  ADBIS 2006»
14 years 1 months ago
Finding Communities in Site Web-Graphs and Citation Graphs
The Web is a typical example of a social network. One of the most intriguing features of the Web is its self-organization behavior, which is usually faced through the existence of ...
Antonis Sidiropoulos