Sciweavers

157 search results - page 27 / 32
» Detecting Steganographic Content on the Internet
Sort
View
GLOBECOM
2006
IEEE
14 years 2 months ago
On the Effectiveness of Service Registration-Based Worm Defense
— Existing Internet worm research focuses either on worm detection inside an AS, or on prevention of Internet-wide worm epidemic. But of more practical concern is how to repel wo...
Jin-Ho Kim, Hyogon Kim, Saewoong Bahk
CEAS
2005
Springer
14 years 2 months ago
Comparative Graph Theoretical Characterization of Networks of Spam
Email is an increasingly important and ubiquitous means of communication, both facilitating contact between individuals and enabling rises in the productivity of organizations. Ho...
Luíz Henrique Gomes, Rodrigo B. Almeida, Lu...
KES
2005
Springer
14 years 2 months ago
Design of a Digital Forensics Image Mining System
Increasing amount of illicit image data transmitted via the internet has triggered the need to develop effective image mining systems for digital forensics purposes. This paper dis...
Ross Brown, Binh Pham, Olivier Y. de Vel
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
14 years 2 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
AWIC
2003
Springer
14 years 1 months ago
ROSA - Multi-agent System for Web Services Personalization
Automatic and non-invasive web personalization seems to be a challenge for nowadays web sites. Many web mining techniques are used to achieve this goal. Since current web sites evo...
Przemyslaw Kazienko, Maciej Kiewra