Filters








851 Hits in 6.3 sec

Autonomous link spam detection in purely collaborative environments

Andrew G. West, Avantika Agrawal, Phillip Baker, Brittney Exline, Insup Lee
2011 Proceedings of the 7th International Symposium on Wikis and Open Collaboration - WikiSym '11  
In particular, this paper examines the use of collaborative functionality to add inappropriate hyperlinks to destinations outside the host environment (i.e., link spam).  ...  Recent research has exposed vulnerabilities in Wikipedia's link spam mitigation, finding that human editors are latent and dwindling in quantity.  ...  Acknowledgements This research was supported in part by ONR MURI N00014-07-1-0907.  ... 
doi:10.1145/2038558.2038574 dblp:conf/wikis/WestABEL11 fatcat:ctpvhvpuc5dyljvzuarl5z6yu4

Link spamming Wikipedia for profit

Andrew G. West, Jian Chang, Krishna Venkatasubramanian, Oleg Sokolsky, Insup Lee
2011 Proceedings of the 8th Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference on - CEAS '11  
Creating and analyzing the first Wikipedia link spam corpus, we find that existing spam strategies perform quite poorly in this regard.  ...  In this work, a particular abuse is examined -link spamming -the addition of promotional or otherwise inappropriate hyperlinks.  ...  Acknowledgements This research is supported in part by ONR MURI N00014-07-1-0907.  ... 
doi:10.1145/2030376.2030394 dblp:conf/ceas/WestCVSL11 fatcat:gb3z74ahpjaa3lwuhlwohfcb2a

Spamming for Science: Active Measurement in Web 2.0 Abuse Research [chapter]

Andrew G. West, Pedram Hayati, Vidyasagar Potdar, Insup Lee
2012 Lecture Notes in Computer Science  
In this work two such experiments serve as case studies: One testing a novel link spam model on Wikipedia and another using blackhat software to target blog comments and forums.  ...  In this work two such experiments serve as case studies: One testing a novel link spam model on Wikipedia and another using blackhat software to target blog comments and forums.  ...  In particular, Robert R. Terrell of UPenn's Office of the General Counsel is thanked for his guidance.  ... 
doi:10.1007/978-3-642-34638-5_9 fatcat:ikgjg6jzvngf3keuxbovehccf4

The Claim Tool Kit for ad hoc recognition of peer entities

Jean-Marc Seigneur, Christian Damsgaard Jensen
2005 Science of Computer Programming  
In ubiquitous/pervasive computing environments, it is envisaged that computing elementsentities-will start interacting in an ad hoc fashion.  ...  in recognition.  ...  An example of a pure recognition scheme is A Peer Entity Recognition scheme (APER is proposed in [26] and extended in Section 2.2).  ... 
doi:10.1016/j.scico.2004.05.005 fatcat:35ciouzu2ndi7afr7e4eomqcti

EXAMINATION OF MODERN CONCEPTS FOR FIREWALLS AND COLLABORATIVE INTRUSION DETECTION

Andriy Luntovskyy, Mykhailo Klymash
2017 Information and Telecommunication Sciences  
The advanced firewalls like SMLIF, IPS, the collaborative intrusion detection systems gain in importance increasingly nowadays.  ...  The aim of the paper is to study the implementation and application of modern concepts of firewalls and collaborative network intrusion detection systems. Methods.  ...  Therefore the cooperation and collaboration of the IDS within a network is of the great meaning. The comparison of the NW-IDS vs. IDS pure is depicted in Fig. 3 .  ... 
doi:10.20535/2411-2976.22017.44-48 fatcat:xmti4qv6sbgubnnpwek2u7q6we

On the Development of an Internetwork-Centric Defense for Scanning Worms

Scott Coull, Boleslaw Szymanski
2007 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07)  
Acknowledgments Research of Boleslaw Szymanski is continuing through participation in the International Technology Alliance sponsored by the U.S. Army Research Laboratory and the U.K.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the US Army Research Laboratory  ...  in untrusted environments, like the Internet.  ... 
doi:10.1109/hicss.2007.406 dblp:conf/hicss/CoullS07 fatcat:eijg4jakmfcqdasvftbb435n54

On the development of an internetwork-centric defense for scanning worms

Scott E. Coull, Boleslaw K. Szymanski
2009 Computers & security  
Acknowledgments Research of Boleslaw Szymanski is continuing through participation in the International Technology Alliance sponsored by the U.S. Army Research Laboratory and the U.K.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the US Army Research Laboratory  ...  in untrusted environments, like the Internet.  ... 
doi:10.1016/j.cose.2009.07.003 fatcat:5caoidsi4retbiaxgc6jr4ypzi

iClouds – Peer-to-Peer Information Sharing in Mobile Environments [chapter]

Andreas Heinemann, Jussi Kangasharju, Fernando Lyardet, Max Mühlhäuser
2003 Lecture Notes in Computer Science  
In this paper we present iClouds, an architecture for spontaneous mobile user interaction, collaboration, and transparent data exchange. iClouds relies on wireless ad hoc peer-to-peer communications.  ...  The future mobile and ubiquitous computing world will need new forms of information sharing and collaboration between people.  ...  This is a collaborative spam detection and filtering network. The idea is quite simple. Spam is not recognized by sophisticated scanning software, but by the individual user.  ... 
doi:10.1007/978-3-540-45209-6_141 fatcat:7lnb3ckh3zekdngfqvdiwx6b7m

Security in P2P Networks: Survey and Research Directions [chapter]

Esther Palomar, Juan M. Estevez-Tapiador, Julio C. Hernandez-Castro, Arturo Ribagorda
2006 Lecture Notes in Computer Science  
sharing, and collaborative working environments.  ...  A fundamental feature of Peer-to-Peer (P2P) networks is the honest collaboration among an heterogeneous community of participants.  ...  challenges (anonymity, fairness, scalability, performance, content management, etc.) and without forgetting emergent applications such as MANET, GRID, and collaborative environments.  ... 
doi:10.1007/11807964_19 fatcat:qqbpckz7hnagxcg5se6rdylxjm

Contributing to the Internet of Things [chapter]

Luis M. Camarinha-Matos, João Goes, Luís Gomes, João Martins
2013 IFIP Advances in Information and Communication Technology  
Raising awareness among engineering PhD students for the potential of this new wave in their research work is a crucial element in their education.  ...  With this aim, the doctoral conference DoCEIS'13 focused on technological innovation for the Internet of Things, challenging the contributors to analyze in which ways their technical and scientific work  ...  Operation in dangerous environment Tele-operation and tele-presence, Tele-supervisory control, etc. Detection of gas levels and leakages in industrial environments.  ... 
doi:10.1007/978-3-642-37291-9_1 fatcat:a7xabvi7n5aslcrmp5kscpqs6m

Trust in collaborative web applications

Andrew G. West, Jian Chang, Krishna K. Venkatasubramanian, Insup Lee
2012 Future generations computer systems  
Abstract Collaborative functionality is increasingly prevalent in web applications.  ...  In this work, we define the notion of trust for Collaborative Web Applications and survey the state-of-the-art for calculating, interpreting, and presenting trust values.  ...  Acknowledgements: This research was supported in part by ONR MURI N00014-07-1-0907 and NSF CNS-0931239. A preliminary version was published as University of Pennsylvania Technical Report MS-CIS-10-33.  ... 
doi:10.1016/j.future.2011.02.007 fatcat:siwvu6fke5gynafyn6vxketlau

Protecting Future Personal Computing: Challenging Traditional Network Security Models

Helen Angela Brumfitt, Bob Askwith, Bo Zhou
2015 2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, Autonomic and Secure Computing; Pervasive Intelligence and Computing  
In this paper we present our novel framework and introduce our initial work to prove the concept is feasible.  ...  This shows the benefit of the collaborative component in detecting problems and attacks in the distributed environment. This will ultimately enhance security and speed up recovery time.  ...  If the LFA follows the classification and detects the words "download", "install" and "http://" it automatically notifies the user of the detected possible SPAM message.  ... 
doi:10.1109/cit/iucc/dasc/picom.2015.267 dblp:conf/IEEEcit/BrumfittAZ15a fatcat:nbhffbmmw5ayddtvphmekxm43m

Transforming Collaboration Structures into Deployable Informal Processes [chapter]

C. Timurhan Sungur, Christoph Dorn, Schahram Dustdar, Frank Leymann
2015 Lecture Notes in Computer Science  
In this paper, we present an approach and techniques for transforming collaboration structures into automatically deployable informal processes.  ...  Currently, however, there exists a gap between (i) selecting and configuring suitable interaction mechanisms (collaboration level) and (ii) deploying the respective collaboration platforms (IT level).  ...  IPE model enactment depends on conditions in the surrounding execution environment.  ... 
doi:10.1007/978-3-319-19890-3_16 fatcat:6jkccf2xgncqfbdgcsdny44h4i

An orchestration approach for unwanted Internet traffic identification

Eduardo Feitosa, Eduardo Souto, Djamel H. Sadok
2012 Computer Networks  
The increase in Internet link bandwidth and service mix makes the timely detection of unwanted traffic a boring task that does not scale easily as such links increase in capacity.  ...  Some of it may be pure nuisance such as spam messages, other consists of bulky multimedia content result from technological trends in applications, networks and users" habits, including P2P file sharing  ... 
doi:10.1016/j.comnet.2012.04.018 fatcat:2aeso6gfq5dmhixzfzpjo7jrwm

Cloud Computing Security: A Survey

Issa Khalil, Abdallah Khreishah, Muhammad Azeem
2014 Computers  
In this work, we provide a comprehensive study of cloud computing security and privacy concerns.  ...  Finally, we provide a cloud security framework in which we present the various lines of defense and identify the dependency levels among them.  ...  [83] provide a pure concept of autonomous system, as compared to SaaS [82] , particularly autonomic manager in grid and cloud computing.  ... 
doi:10.3390/computers3010001 fatcat:a2xfh7oahzazpij4q7xfu2y67u
« Previous Showing results 1 — 15 out of 851 results