Sciweavers

199 search results - page 23 / 40
» Developing an Immunity to Spam
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
Peng Liu
LCN
2008
IEEE
14 years 2 months ago
IPclip: An architecture to restore Trust-by-Wire in packet-switched networks
—During the last decades, the Internet has steadily developed into a mass medium. The target group radically changed compared to, e.g., the 90s. Because virtually everyone has ac...
Harald Widiger, Stephan Kubisch, Peter Danielis, J...
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
14 years 1 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif
CIKM
2010
Springer
13 years 6 months ago
Detecting product review spammers using rating behaviors
This paper aims to detect users generating spam reviews or review spammers. We identify several characteristic behaviors of review spammers and model these behaviors so as to dete...
Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Li...
ICCV
2003
IEEE
14 years 9 months ago
Cumulative Residual Entropy, A New Measure of Information & its Application to Image Alignment
In this paper we use the cumulative distribution of a random variable to define the information content in it and use it to develop a novel measure of information that parallels S...
Fei Wang, Baba C. Vemuri, Murali Rao, Yunmei Chen