Sciweavers

474 search results - page 79 / 95
» Privacy suites: shared privacy for social networks
Sort
View
ACSAC
2007
IEEE
14 years 1 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
CHI
2011
ACM
12 years 11 months ago
Family portals: connecting families through a multifamily media space
Video conferencing allows distance-separated family members to interact somewhat akin to being together at the same place and time. Yet most video conferencing systems are designe...
Tejinder K. Judge, Carman Neustaedter, Steve Harri...
IJMMS
2008
68views more  IJMMS 2008»
13 years 7 months ago
Mobile technologies in mobile spaces: Findings from the context of train travel
Whilst mobile work is increasingly prevalent, there is little detailed study of this phenomenon in the specific context of a train. Thus, the current study focuses on how mobile w...
Carolyn M. Axtell, Donald Hislop, Steve Whittaker
PERCOM
2011
ACM
12 years 11 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
ISI
2004
Springer
14 years 23 days ago
Analyzing and Visualizing Criminal Network Dynamics: A Case Study
Dynamic criminal network analysis is important for national security but also very challenging. However, little research has been done in this area. In this paper we propose to use...
Jennifer Jie Xu, Byron Marshall, Siddharth Kaza, H...