Sciweavers

1592 search results - page 21 / 319
» The state of the email address
Sort
View
SIGCOMM
2006
ACM
14 years 1 months ago
Understanding the network-level behavior of spammers
This paper studies the network-level behavior of spammers, including: IP address ranges that send the most spam, common spamming modes (e.g., BGP route hijacking, bots), how persi...
Anirudh Ramachandran, Nick Feamster
IJCAI
2007
13 years 9 months ago
A Predictive Approach to Help-Desk Response Generation
We are developing a corpus-based approach for the prediction of help-desk responses from features in customers’ emails, where responses are represented at two levels of granular...
Yuval Marom, Ingrid Zukerman
RAID
2010
Springer
13 years 5 months ago
Abusing Social Networks for Automated User Profiling
Recently, social networks such as Facebook have experienced a huge surge in popularity. The amount of personal information stored on these sites calls for appropriate security prec...
Marco Balduzzi, Christian Platzer, Thorsten Holz, ...
ICISC
2008
129views Cryptology» more  ICISC 2008»
13 years 9 months ago
Novel PUF-Based Error Detection Methods in Finite State Machines
We propose a number of techniques for securing finite state machines (FSMs) against fault injection attacks. The proposed security mechanisms are based on physically unclonable fun...
Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar
WSC
1998
13 years 9 months ago
Initializing On-line Simulations from the State of a Distributed System
In this paper, we address the complex task of initializing an on-line simulation to a current system state collected from an operating physical system. The paper begins by discuss...
Fernando G. Gonzalez, Wayne J. Davis