Sciweavers

1318 search results - page 141 / 264
» Measuring network security using dynamic bayesian network
Sort
View
KDD
2012
ACM
205views Data Mining» more  KDD 2012»
11 years 11 months ago
Intrusion as (anti)social communication: characterization and detection
A reasonable definition of intrusion is: entering a community to which one does not belong. This suggests that in a network, intrusion attempts may be detected by looking for com...
Qi Ding, Natallia Katenka, Paul Barford, Eric D. K...
AINA
2008
IEEE
14 years 3 months ago
A Concept of an Anonymous Direct P2P Distribution Overlay System
The paper introduces a peer-to-peer system called P2PRIV (peer-to-peer direct and anonymous distribution overlay). Basic novel features of P2PRIV are: (i) a peer-to-peer parallel ...
Igor Margasinski, Michal Pióro
WSNA
2003
ACM
14 years 2 months ago
MANTIS: system support for multimodAl NeTworks of in-situ sensors
The MANTIS MultimodAl system for NeTworks of In-situ wireless Sensors provides a new multithreaded embedded operating system integrated with a general-purpose single-board hardwar...
Hector Abrach, Shah Bhatti, James Carlson, Hui Dai...
AIRWEB
2007
Springer
14 years 3 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
ASUNAM
2009
IEEE
14 years 4 months ago
Transformation of Online Representation through Time
In order to understand the evolution of online identities, we measured the correlation between past and current representations of self on the MySpace social network. We applied s...
Roya Feizy, Ian Wakeman, Dan Chalmers