Sciweavers

225 search results - page 36 / 45
» Spam, spam, spam, spam: how can we stop it
Sort
View
NSDI
2008
13 years 9 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
SDM
2010
SIAM
226views Data Mining» more  SDM 2010»
13 years 9 months ago
Two-View Transductive Support Vector Machines
Obtaining high-quality and up-to-date labeled data can be difficult in many real-world machine learning applications, especially for Internet classification tasks like review spam...
Guangxia Li, Steven C. H. Hoi, Kuiyu Chang
USS
2004
13 years 9 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
ACSAC
2007
IEEE
14 years 1 months ago
A Taxonomy of Botnet Structures
We propose a taxonomy of botnet structures, based on their utility to the botmaster. We propose key metrics to measure their utility for various activities (e.g., spam, ddos). Usi...
David Dagon, Guofei Gu, Christopher P. Lee, Wenke ...
ICMI
2004
Springer
120views Biometrics» more  ICMI 2004»
14 years 27 days ago
M/ORIS: a medical/operating room interaction system
We propose an architecture for a real-time multimodal system, which provides non-contact, adaptive user interfacing for Computer-Assisted Surgery (CAS). The system, called M/ORIS ...
Sébastien Grange, Terrence Fong, Charles Ba...