Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...
Web search logs are of growing importance to researchers as they help understanding search behavior and search engine performance. However, search logs typically contain sensitive...
Despite the success of modern Web search engines, challenges remain when it comes to providing people with access to the right information at the right time. In this paper, we desc...
As part of the Language Observatory Project [4], we have been crawling all the web space since 2004. We have collected terabytes of data mostly from Asian and African ccTLDs. In t...
Rizza Camus Caminero, Pavol Zavarsky, Yoshiki Mika...
Despite recent advances in trust relationship control mechanisms, issues remain that impede the development of effective trust models. One of these is the lack of dynamic mechanis...