Sciweavers

6696 search results - page 36 / 1340
» Securing social networks
Sort
View
ASUNAM
2009
IEEE
14 years 25 days ago
Getting Online but Still Living Offline: The Complex Relationship of Technology Adoption and In-person Social Networks
Previous research in Kyrgyzstan has demonstrated the importance of close social networks as avenues for gathering and sharing information, assistance and goods in the country. How...
Cynthia Putnam, Beth E. Kolko
OIR
2006
85views more  OIR 2006»
13 years 8 months ago
Evaluating authoritative sources using social networks: an insight from Wikipedia
Purpose
Nikolaos Korfiatis, Marios Poulos, George Bokos
COMPSEC
2006
90views more  COMPSEC 2006»
13 years 9 months ago
On Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a techn...
Sarandis Mitropoulos, Dimitrios Patsos, Christos D...
PET
2010
Springer
14 years 24 days ago
Drac: An Architecture for Anonymous Low-Volume Communications
We present Drac, a system designed to provide anonymity and unobservability for real-time instant messaging and voice-over-IP communications against a global passive adversary. The...
George Danezis, Claudia Díaz, Carmela Tronc...
CSE
2009
IEEE
14 years 3 months ago
Towards Automating Social Engineering Using Social Networking Sites
—A growing number of people use social networking sites to foster social relationships among each other. While the advantages of the provided services are obvious, drawbacks on a...
Markus Huber, Stewart Kowalski, Marcus Nohlberg, S...