Sciweavers

157 search results - page 24 / 32
» Detecting Steganographic Content on the Internet
Sort
View
WWW
2003
ACM
14 years 9 months ago
Design, implementation, and evaluation of a client characterization driven web server
In earlier work we proposed a way for a Web server to detect connectivity information about clients accessing it in order to take tailored actions for a client request. This paper...
Balachander Krishnamurthy, Yin Zhang, Craig E. Wil...
ICWSM
2008
13 years 10 months ago
BLEWS: Using Blogs to Provide Context for News Articles
An overwhelming number of news articles are available every day via the internet. Unfortunately, it is impossible for us to peruse more than a handful; furthermore it is difficult...
Michael Gamon, Sumit Basu, Dmitriy Belenko, Danyel...
CIKM
2007
Springer
14 years 2 months ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
CCS
2009
ACM
14 years 9 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
IMC
2009
ACM
14 years 3 months ago
Impact of transient CSMA/CA access delays on active bandwidth measurements
WLAN devices based on CSMA/CA access schemes have become a fundamental component of network deployments. In such wireless scenarios, traditional networking applications, tools, an...
Marc Portoles-Comeras, Albert Cabellos-Aparicio, J...