Sciweavers

422 search results - page 67 / 85
» Online Generation of Association Rules
Sort
View
ICC
2008
IEEE
118views Communications» more  ICC 2008»
14 years 3 months ago
A Principal Components Analysis-Based Robust DDoS Defense System
—One of the major threats to cyber security is the Distributed Denial-of-Service (DDoS) attack. In our previous projects, PacketScore, ALPi, and other statistical filtering-based...
Huizhong Sun, Yan Zhaung, H. Jonathan Chao
OOPSLA
2010
Springer
13 years 7 months ago
The Spoofax language workbench
Domain-specific languages offer high expressive power foa particular problem domain, abstracting over the accidental complexity associated with traditional software development. ...
Lennart C. L. Kats, Eelco Visser
ESORICS
2008
Springer
13 years 10 months ago
CROO: A Universal Infrastructure and Protocol to Detect Identity Fraud
Abstract. Identity fraud (IDF) may be defined as unauthorized exploitation of credential information through the use of false identity. We propose CROO, a universal (i.e. generic) ...
D. Nali, Paul C. van Oorschot
WSDM
2010
ACM
261views Data Mining» more  WSDM 2010»
14 years 6 months ago
Learning Similarity Metrics for Event Identification in Social Media
Social media sites (e.g., Flickr, YouTube, and Facebook) are a popular distribution outlet for users looking to share their experiences and interests on the Web. These sites host ...
Hila Becker, Mor Naaman, Luis Gravano
WWW
2006
ACM
14 years 9 months ago
Visualizing tags over time
We consider the problem of visualizing the evolution of tags within the Flickr (flickr.com) online image sharing community. Any user of the Flickr service may append a tag to any ...
Micah Dubinko, Ravi Kumar, Joseph Magnani, Jasmine...