Sciweavers

6696 search results - page 24 / 1340
» Securing social networks
Sort
View
ISI
2007
Springer
13 years 8 months ago
Social Behavior in a Team of Autonomous Sensors
Yasuaki Sakamoto, Jeffrey V. Nickerson
ISI
2004
Springer
14 years 2 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
SOUPS
2010
ACM
13 years 6 months ago
Influence of user perception, security needs, and social factors on device pairing method choices
Recent years have seen a proliferation of secure device pairing methods that try to improve both the usability and security of today's de-facto standard
Iulia Ion, Marc Langheinrich, Ponnurangam Kumaragu...
FC
2001
Springer
123views Cryptology» more  FC 2001»
14 years 1 months ago
Trust: A Collision of Paradigms
The technological challenges of securing networks are great, as recently witnessed in widespread denial of service and virus attacks. The human reaction to these attacks may be ei...
L. Jean Camp, Helen Nissenbaum, Cathleen McGrath
ASUNAM
2010
IEEE
13 years 10 months ago
Identifying Themes in Social Media and Detecting Sentiments
:
Jayanta Kumar Pal, Abhisek Saha