Sciweavers

CCS
2010
ACM
13 years 10 months ago
Designs to account for trust in social network-based sybil defenses
Social network-based Sybil defenses exploit the trust exhibited in social graphs to detect Sybil nodes that disrupt an algorithmic property (i.e., the fast mixing) in these graphs...
Abedelaziz Mohaisen, Nicholas Hopper, Yongdae Kim
CCS
2010
ACM
13 years 10 months ago
NoTamper: automatic blackbox detection of parameter tampering opportunities in web applications
Web applications rely heavily on client-side computation to examine and validate form inputs that are supplied by a user (e.g., “credit card expiration date must be valid”). T...
Prithvi Bisht, Timothy Hinrichs, Nazari Skrupsky, ...
CCS
2010
ACM
13 years 10 months ago
Fingerprinting websites using remote traffic analysis
Xun Gong, Negar Kiyavash, Nikita Borisov
CCS
2010
ACM
13 years 10 months ago
PriMa: an effective privacy protection mechanism for social networks
In this paper, we propose PriMa (Privacy Manager), a privacy protection mechanism which supports semi-automated generation of access rules for users’ profile information. PriMa...
Anna Cinzia Squicciarini, Federica Paci, Smitha Su...
ISI
2008
Springer
13 years 11 months ago
A framework for privacy-preserving cluster analysis
Abstract--Releasing person-specific data could potentially reveal sensitive information of individuals. k-anonymization is a promising privacy protection mechanism in data publishi...
Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad ...
ISI
2008
Springer
13 years 11 months ago
A locality model of the evolution of blog networks
We present a model of evolution of large social networks. Our model is based on the local nature of communication: a node's communication energy is spend mostly within it'...
Mark K. Goldberg, Malik Magdon-Ismail, Stephen Kel...
ISI
2008
Springer
13 years 11 months ago
A Generative Model for Statistical Determination of Information Content from Conversation Threads
We present a generative model for determining the information content of a message without analyzing the message content. Such a tool is useful for automated analysis of the vast ...
Yingjie Zhou, Malik Magdon-Ismail, William A. Wall...
SP
2002
IEEE
128views Security Privacy» more  SP 2002»
13 years 11 months ago
Fitting hidden Markov models to psychological data
Markov models have been used extensively in psychology of learning. Applications of hidden Markov models are rare however. This is partially due to the fact that comprehensive stat...
Ingmar Visser, Maartje E. J. Raijmakers, Peter C. ...
SP
2002
IEEE
129views Security Privacy» more  SP 2002»
13 years 11 months ago
The XCAT Science Portal
The design and prototype implementation of the XCAT Grid Science Portal is described in this paper. The portal lets grid application programmers easily script complex distributed ...
Sriram Krishnan, Randall Bramley, Dennis Gannon, R...