-
1
-
-
47749136635
-
Secure emails in xml format using web services
-
Washington, DC, USA
-
L. Liao, J. Schwenk, Secure emails in xml format using web services, in: Proceedings of the Fifth European Conference on Web Services, Washington, DC, USA, 2007.
-
(2007)
Proceedings of the Fifth European Conference on Web Services
-
-
Liao, L.1
Schwenk, J.2
-
2
-
-
33846281237
-
Securing email archives through user modeling
-
Washington, DC, USA
-
Y. Li, A. Somayaji, Securing email archives through user modeling, in: Proceedings of the 21st Annual Computer Security Applications Conference, Washington, DC, USA, 2005.
-
(2005)
Proceedings of the 21st Annual Computer Security Applications Conference
-
-
Li, Y.1
Somayaji, A.2
-
3
-
-
14944372409
-
Attachment chain tracing scheme for email virus detection and control
-
ACT:, New York, NY, USA
-
J. Xiong, ACT: Attachment chain tracing scheme for email virus detection and control, in: Proceedings of the 2004 ACM workshop on Rapid malcode, New York, NY, USA, 2004.
-
(2004)
Proceedings of the 2004 ACM workshop on Rapid malcode
-
-
Xiong, J.1
-
4
-
-
35348906237
-
Protecting people from phishing: The design and evaluation of an embedded training email system
-
San Jose, CA, USA
-
P. Kumaraguru, Y. Rhee, A. Acquisti, L.F. Cranor, J. Hong, E. Nunge, Protecting people from phishing: The design and evaluation of an embedded training email system, in: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI07, San Jose, CA, USA, 2007.
-
(2007)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI07
-
-
Kumaraguru, P.1
Rhee, Y.2
Acquisti, A.3
Cranor, L.F.4
Hong, J.5
Nunge, E.6
-
6
-
-
33745495364
-
Email communications analysis: How to use computational intelligence methods and tools?
-
FL
-
M. Negnevitsky, M. Lim, J. Hartnett, L. Reznik, Email communications analysis: How to use computational intelligence methods and tools? in: Proceedings of IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety, FL, 2005.
-
(2005)
Proceedings of IEEE International Conference on Computational Intelligence for Homeland Security and Personal Safety
-
-
Negnevitsky, M.1
Lim, M.2
Hartnett, J.3
Reznik, L.4
-
7
-
-
77950860283
-
EMT/MET: Systems for modeling and detecting errant email
-
Washington, DC, USA
-
S.J. Stolfo, S. Hershkop, K. Wang, O. Nimeskern, EMT/MET: Systems for modeling and detecting errant email, in: Proceedings of the DARPA Information Survivability Conference and Exposition, DISCEX, Washington, DC, USA, 2003.
-
(2003)
Proceedings of the DARPA Information Survivability Conference and Exposition, DISCEX
-
-
Stolfo, S.J.1
Hershkop, S.2
Wang, K.3
Nimeskern, O.4
-
8
-
-
77953309886
-
Addressing email loss with suremail: Measurement, design, and evaluation
-
Berkeley, CA, USA
-
S. Agarwal, V.N. Padmanabhan, D.A. Joseph, Addressing email loss with suremail: Measurement, design, and evaluation, in: USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference, Berkeley, CA, USA, 2007.
-
(2007)
USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
-
-
Agarwal, S.1
Padmanabhan, V.N.2
Joseph, D.A.3
-
9
-
-
33947496984
-
Short term and total life impact analysis of email worms in computer systems
-
Park I., Sharman R., Rao H.R., and Upadhyaya S. Short term and total life impact analysis of email worms in computer systems. Decision Support Systems 43 3 (2007) 827-841
-
(2007)
Decision Support Systems
, vol.43
, Issue.3
, pp. 827-841
-
-
Park, I.1
Sharman, R.2
Rao, H.R.3
Upadhyaya, S.4
-
13
-
-
4944261900
-
Two types of R G-factorizations of quasi-birth-and-death processes and their applications to stochastic integral functionals
-
Li Q.L., and Cao J. Two types of R G-factorizations of quasi-birth-and-death processes and their applications to stochastic integral functionals. Stochastic Models 20 3 (2004) 299-340
-
(2004)
Stochastic Models
, vol.20
, Issue.3
, pp. 299-340
-
-
Li, Q.L.1
Cao, J.2
-
15
-
-
34250338058
-
A queueing analysis for the denial of service (DoS) attacks in computer networks
-
Wang Y., Lin C., Li Q.L., and Fang Y. A queueing analysis for the denial of service (DoS) attacks in computer networks. Computer Networks 51 (2007) 3564-3573
-
(2007)
Computer Networks
, vol.51
, pp. 3564-3573
-
-
Wang, Y.1
Lin, C.2
Li, Q.L.3
Fang, Y.4
-
17
-
-
8144221250
-
An algorithmic approach on sensitivity analysis of perturbed QBD processes
-
Li Q.L., and Liu L.M. An algorithmic approach on sensitivity analysis of perturbed QBD processes. Queueing Systems 48 3-4 (2004) 365-397
-
(2004)
Queueing Systems
, vol.48
, Issue.3-4
, pp. 365-397
-
-
Li, Q.L.1
Liu, L.M.2
|