Sciweavers

RAID
2010
Springer
13 years 6 months ago
Abusing Social Networks for Automated User Profiling
Recently, social networks such as Facebook have experienced a huge surge in popularity. The amount of personal information stored on these sites calls for appropriate security prec...
Marco Balduzzi, Christian Platzer, Thorsten Holz, ...
RAID
2010
Springer
13 years 6 months ago
CANVuS: Context-Aware Network Vulnerability Scanning
Enterprise networks face a variety of threats including worms, viruses, and DDoS attacks. Development of effective defenses against these threats requires accurate inventories of n...
Yunjing Xu, Michael Bailey, Eric Vander Weele, Far...
RAID
2010
Springer
13 years 6 months ago
What Is the Impact of P2P Traffic on Anomaly Detection?
Abstract. Recent studies estimate that peer-to-peer (p2p) traffic comprises 40-70% of today's Internet traffic [1]. Surprisingly, the impact of p2p traffic on anomaly detectio...
Irfan Ul Haq, Sardar Ali, Hassan Khan, Syed Ali Kh...
RAID
2010
Springer
13 years 6 months ago
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
We introduce BotSwindler, a bait injection system designed to delude and detect crimeware by forcing it to reveal during the exploitation of monitored information. The implementati...
Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kem...
PERCOM
2010
ACM
13 years 6 months ago
Profiling sprints using on-body sensors
This paper describes the design, implementation and deployment of a wireless sensor system for athletes. The system is designed to profile sprints based on input from on-body senso...
Salman Taherian, Marcelo Pias, Robert Harle, Georg...
PERCOM
2010
ACM
13 years 6 months ago
Privacy-preserving admission to mobile peer-to-peer groups
Mobile peer-to-peer groups, which do not require any pre-deployed infrastructure or trusted centralized authority are valuable for a variety of collaborative applications. This wor...
Mark Manulis
PERCOM
2010
ACM
13 years 6 months ago
SCOPE: A prototype for spontaneous P2P social networking
Mehdi Mani, Anh-Minh Nguyen, Noël Crespi
PERCOM
2010
ACM
13 years 6 months ago
Integrating people-centric sensing with social networks: A privacy research agenda
During the last few years there has been an increasing number of people-centric sensing projects, which combine location information with other sensors available on mobile devices,...
Ioannis Krontiris, Felix C. Freiling
PERCOM
2010
ACM
13 years 6 months ago
Towards automated verification of autonomous networks: A case study in self-configuration
In autonomic networks, the self-configuration of network entities is one of the most desirable properties. In this paper, we show how formal verification techniques can verify the ...
JaeSeung Song, Tiejun Ma, Peter R. Pietzuch
PERCOM
2010
ACM
13 years 6 months ago
A visual, open-ended approach to prototyping ubiquitous computing applications
By nature, ubiquitous computing applications are intimately intertwined with users' everyday life. This situation is challenging because it requires to make the development of...
Zoé Drey, Charles Consel