Sciweavers

116 search results - page 19 / 24
» Nonseparability of Shared Intentionality
Sort
View
CN
1999
115views more  CN 1999»
13 years 7 months ago
A large scale distributed intrusion detection framework based on attack strategy analysis
To appropriately address the problem of large-scale distributed intrusion assessment/detection, issues such as information exchange, work division and coordination amongst various...
Ming-Yuh Huang, Robert J. Jasper, Thomas M. Wicks
CONEXT
2010
ACM
13 years 5 months ago
Strengthening forensic investigations of child pornography on P2P networks
Measurements of the Internet for law enforcement purposes must be forensically valid. We examine the problems inherent in using various network- and applicationlevel identifiers i...
Marc Liberatore, Brian Neil Levine, Clay Shields
IJWBC
2011
88views more  IJWBC 2011»
13 years 2 months ago
Personal profiles: enhancing social interaction in learning networks
Nowadays, we witness a surge of online profiling sites; in them people make their profile available to others with the intention to share it and get in touch with others, find old ...
Adriana J. Berlanga, Marlies Bitter-Rijpkema, Fran...
WWW
2008
ACM
14 years 8 months ago
Lock-free consistency control for web 2.0 applications
Online collaboration and sharing is the central theme of many webbased services that create the so-called Web 2.0 phenomena. Using the Internet as a computing platform, many Web 2...
Jiangming Yang, Haixun Wang, Ning Gu, Yiming Liu, ...
CCS
2007
ACM
14 years 1 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...