Sciweavers

1592 search results - page 63 / 319
» The state of the email address
Sort
View
USS
2004
13 years 10 months ago
A Virtual Honeypot Framework
A honeypot is a closely monitored network decoy serving several purposes: it can distract adversaries from more valuable machines on a network, can provide early warning about new...
Niels Provos
CSE
2009
IEEE
13 years 10 months ago
Social Relationship Identification: An Example of Social Query
Every moment, millions of people worldwide are communicating and sharing content online. We express ourselves online to enrich existing relationships and establish new relationship...
Christopher P. Diehl, Jaime Montemayor, Michael Pe...
CORR
2010
Springer
129views Education» more  CORR 2010»
13 years 9 months ago
Performance Analysis and Special Issues of Broadband Strategies in the Computer Communication
Broadband communications consists of the technologies and equipment required to deliver packetbased digital voice, video, and data services to end users. Broadband affords end use...
S. S. Riaz Ahamed, D. Mahesh
TKDE
2008
103views more  TKDE 2008»
13 years 9 months ago
Detecting Word Substitutions in Text
Searching for words on a watchlist is one way in which large-scale surveillance of communication can be done, for example, in intelligence and counterterrorism settings. One obviou...
SzeWang Fong, Dmitri Roussinov, David B. Skillicor...
CACM
1999
138views more  CACM 1999»
13 years 8 months ago
Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
David M. Goldschlag, Michael G. Reed, Paul F. Syve...