Sciweavers

619 search results - page 106 / 124
» Learning with Security
Sort
View
CIKM
2009
Springer
14 years 23 days ago
A co-classification framework for detecting web spam and spammers in social media web sites
Social media are becoming increasingly popular and have attracted considerable attention from spammers. Using a sample of more than ninety thousand known spam Web sites, we found ...
Feilong Chen, Pang-Ning Tan, Anil K. Jain
ER
2006
Springer
96views Database» more  ER 2006»
14 years 15 days ago
Understanding the Semantics of Data Provenance to Support Active Conceptual Modeling
: Data Provenance refers to the lineage of data including its origin, key events that occur over the course of its lifecycle, and other details associated with data creation, proce...
Sudha Ram, Jun Liu
CRYPTO
2008
Springer
75views Cryptology» more  CRYPTO 2008»
13 years 10 months ago
New Efficient Attacks on Statistical Disclosure Control Mechanisms
The goal of a statistical database is to provide statistics about a population while simultaneously protecting the privacy of the individual records in the database. The tension be...
Cynthia Dwork, Sergey Yekhanin
DIMVA
2008
13 years 10 months ago
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks
Abstract. This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on web applications today. It is believed that input validation (or filtering) c...
Prithvi Bisht, V. N. Venkatakrishnan
LREC
2010
154views Education» more  LREC 2010»
13 years 10 months ago
CCASH: A Web Application Framework for Efficient, Distributed Language Resource Development
We introduce CCASH (Cost-Conscious Annotation Supervised by Humans), an extensible web application framework for cost-efficient annotation. CCASH provides a framework in which cos...
Paul Felt, Owen Merkling, Marc Carmen, Eric K. Rin...