Sciweavers

6696 search results - page 46 / 1340
» Securing social networks
Sort
View
IFIP8
2007
13 years 10 months ago
Social Networking as a New Trend in E-Marketing
In the world of e-marketing, new business models are frequently introduced, and new trends have started to emerge. One such latest trend is social networking websites, many of whic...
T. Andrew Yang, Dan J. Kim, Vishal Dhalwani
DRM
2006
Springer
14 years 16 days ago
Securing sensitive content in a view-only file system
One of the most fundamental problems in computer security is protecting sensitive digital information from unauthorized disclosure. There are a number of challenges, such as spywa...
Kevin Borders, Xin Zhao, Atul Prakash
ASIASIM
2004
Springer
14 years 2 months ago
Simulating Cyber-intrusion Using Ordered UML Model-Based Scenarios
Abstract. Network security simulator is required for the study on the cyber intrusion and defense as cyber terrors have been increasingly popular. Until now, network security simul...
Eung Ki Park, Joo Beom Yun, Hoh Peter In
GLOBECOM
2010
IEEE
13 years 6 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
ASUNAM
2009
IEEE
14 years 26 days ago
Groupthink and Peer Pressure: Social Influence in Online Social Network Groups
In this paper, we present a horizontal view of social influence, more specifically a quantitative study of the influence of neighbours on the probability of a particular node to jo...
Pan Hui, Sonja Buchegger