Sciweavers

1056 search results - page 11 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
IAW
2003
IEEE
14 years 27 days ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
CEAS
2008
Springer
13 years 9 months ago
Exploiting Transport-Level Characteristics of Spam
We present a novel spam detection technique that relies on neither content nor reputation analysis. This work investigates the discriminatory power of email transport-layer charac...
Robert Beverly, Karen R. Sollins
ECIR
2008
Springer
13 years 9 months ago
Exploiting Locality of Wikipedia Links in Entity Ranking
Abstract. Information retrieval from web and XML document collections is ever more focused on returning entities instead of web pages or XML elements. There are many research field...
Jovan Pehcevski, Anne-Marie Vercoustre, James A. T...
USS
2008
13 years 10 months ago
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
ICWS
2009
IEEE
14 years 4 months ago
Exploiting Metrics for Similarity-Based Semantic Web Service Discovery
—Semantic Web Services (SWS) aim at the automated discovery and orchestration of Web services on the basis of comprehensive, machine-interpretable semantic descriptions. However,...
Stefan Dietze, Alessio Gugliotta, John Domingue