Sciweavers

240 search results - page 16 / 48
» Malicious Users in Unstructured Networks
Sort
View
WOWMOM
2009
ACM
151views Multimedia» more  WOWMOM 2009»
14 years 2 months ago
Distributed user authentication in wireless LANs
—An increasing number of mobile devices, including smartphones, use WLAN for accessing the Internet. Existing WLAN authentication mechanisms are either disruptive, such as presen...
Dmitriy Kuptsov, Andrey Khurri, Andrei Gurtov
SEC
1996
13 years 8 months ago
Intention modelling: approximating computer user intentions for detection and prediction of intrusions
This paper introduces and describes an innovative modelling approach which utilises models that are synthesised through approximate calculations of user actions and extensive repr...
Thomas Spyrou, John Darzentas
TIP
2010
117views more  TIP 2010»
13 years 2 months ago
Cooperation Stimulation Strategies for Peer-to-Peer Wireless Live Video-Sharing Social Networks
Abstract--Human behavior analysis in video sharing social networks is an emerging research area, which analyzes the behavior of users who share multimedia content and investigates ...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu
WOWMOM
2005
ACM
87views Multimedia» more  WOWMOM 2005»
14 years 1 months ago
Reputation Management for Collaborative Content Distribution
We propose a reputation-based trust management system, ROCQ, to reduce inauthentic and corrupted file transfers in end-user collaborative content-distribution systems. Such syste...
Anurag Garg, Roberto G. Cascella
HOTOS
2003
IEEE
14 years 23 days ago
Privacy-Aware Location Sensor Networks
Advances in sensor networking and location tracking technology enable location-based applications but they also create significant privacy risks. Privacy is typically addressed t...
Marco Gruteser, Graham Schelle, Ashish Jain, Richa...