Sciweavers

15379 search results - page 2868 / 3076
» Protecting users from
Sort
View
BIOSIG
2008
170views Biometrics» more  BIOSIG 2008»
15 years 5 months ago
Frontex Perspectives on Biometrics for Border Checks
: The European Union is developing new concepts for border management. Biometrics is seen is a key technology to facilitate more secure and convenient border management. Biometric ...
Erik Berglund, Rasa Karbauskaite
COMAD
2008
15 years 5 months ago
CUM: An Efficient Framework for Mining Concept Units
Web is the most important repository of different kinds of media such as text, sound, video, images etc. Web mining is the process of applying data mining techniques to automatica...
Santhi Thilagam
ICWSM
2010
15 years 5 months ago
Who Acquires Friends Through Social Media and Why? "Rich Get Richer" Versus "Seek and Ye Shall Find"
There is an ongoing debate, not just among academics but in popular culture, about whether social media can expand people's social networks, and whether online friends can be...
Zeynep Tufekci
DIMVA
2008
15 years 5 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
DIMVA
2008
15 years 5 months ago
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges
Abstract. This paper presents a novel framework to substantiate selfsigned certificates in the absence of a trusted certificate authority. In particular, we aim to address the prob...
Brett Stone-Gross, David Sigal, Rob Cohn, John Mor...
« Prev « First page 2868 / 3076 Last » Next »