Sciweavers

248 search results - page 27 / 50
» Web Services Security: Challenges and Techniques
Sort
View
ADAPTIVE
2007
Springer
14 years 2 months ago
Personalization in E-Commerce Applications
This chapter is about personalization and adaptation in electronic commerce (e-commerce) applications. In the first part, we briefly introduce the challenges posed by e-commerce ...
Anna Goy, Liliana Ardissono, Giovanna Petrone
WWW
2007
ACM
14 years 9 months ago
Spam double-funnel: connecting web spammers with advertisers
Spammers use questionable search engine optimization (SEO) techniques to promote their spam links into top search results. In this paper, we focus on one prevalent type of spam ? ...
Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen
CCS
2011
ACM
12 years 8 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker
NCA
2008
IEEE
14 years 2 months ago
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks
Denial of service (DoS) attacks are major threat against availability in the Internet. A large number of countermeasure techniques try to detect attack and then filter out DoS at...
Hakem Beitollahi, Geert Deconinck
CAISE
2010
Springer
13 years 7 months ago
Search Computing Systems
Search computing is a novel discipline whose goal is to answer complex, multi-domain queries. Such queries typically require combining in their results domain knowledge extracted ...
Stefano Ceri, Marco Brambilla