-
2
-
-
81255149250
-
Nobody sells gold for the price of silver: Dishonesty, uncertainty and the underground economy
-
T. Moore, D. Pym, and C. Ioannidis, eds., Springer
-
C. Herley and D. Florencio, "Nobody Sells Gold for the Price of Silver: Dishonesty, Uncertainty and the Underground Economy," Economics of Information Security and Privacy, T. Moore, D. Pym, and C. Ioannidis, eds., Springer, 2010, pp. 33-53.
-
(2010)
Economics of Information Security and Privacy
, pp. 33-53
-
-
Herley, C.1
Florencio, D.2
-
4
-
-
84868088467
-
-
tech. report, Sans Inst.
-
B.E. Binde, R. McRee, and T.J. O'Connor, Assessing Outbound Traffic to Uncover Advanced Persistent Threat, tech. report, Sans Inst., 2011.
-
(2011)
Assessing Outbound Traffic to Uncover Advanced Persistent Threat
-
-
Binde, B.E.1
McRee, R.2
O'Connor, T.J.3
-
6
-
-
78349265788
-
Toward predicting collective behavior via social dimension extraction
-
L. Tang and H. Liu, "Toward Predicting Collective Behavior via Social Dimension Extraction," IEEE Intelligent Systems, vol. 35, no. 5, 2010, pp. 19-25.
-
(2010)
IEEE Intelligent Systems
, vol.35
, Issue.5
, pp. 19-25
-
-
Tang, L.1
Liu, H.2
-
7
-
-
79951592132
-
Deductive and inductive stream reasoning for semantic social media analytics
-
D. Barbieri et al., "Deductive and Inductive Stream Reasoning for Semantic Social Media Analytics," IEEE Intelligent Systems, vol. 25, no. 6, 2010, pp. 32-41.
-
(2010)
IEEE Intelligent Systems
, vol.25
, Issue.6
, pp. 32-41
-
-
Barbieri, D.1
-
8
-
-
84855275682
-
Israel poised to pass National I.D. database law
-
N. Jeffay, "Israel Poised to Pass National I.D. Database Law," The Jewish Daily Forward, 2009; www.forward. com/articles/112033.
-
(2009)
The Jewish Daily Forward
-
-
Jeffay, N.1
-
9
-
-
84855287477
-
Privacy fears over gay teenage database
-
D. Emery, "Privacy Fears over Gay Teenage Database," BBC News, 2010; www.bbc.co.uk/news/10612800.
-
(2010)
BBC News
-
-
Emery, D.1
-
14
-
-
80055040446
-
Composite social network for predicting mobile apps installation
-
W. Pan, N. Aharony, and A. Pentland, "Composite Social Network for Predicting Mobile Apps Installation," Proc. 25th Conf. Artificial Intelligence, 2011, pp. 821-827.
-
(2011)
Proc. 25th Conf. Artificial Intelligence
, pp. 821-827
-
-
Pan, W.1
Aharony, N.2
Pentland, A.3
-
15
-
-
77958594601
-
Social network sensors for early detection of contagious outbreaks
-
N.A. Christakis and J.H. Fowler, "Social Network Sensors for Early Detection of Contagious Outbreaks," PLoS ONE, vol. 5, 2010, p. e12948.
-
(2010)
PLoS ONE
, vol.5
-
-
Christakis, N.A.1
Fowler, J.H.2
-
16
-
-
0001902056
-
Three approaches to the quantitative definition of information
-
A. Kolmogorov, "Three Approaches to the Quantitative Definition of Information," Problems Information Transmission, vol. 1, no. 1, 1965, pp. 1-7.
-
(1965)
Problems Information Transmission
, vol.1
, Issue.1
, pp. 1-7
-
-
Kolmogorov, A.1
-
17
-
-
78650008157
-
Social sensing for epidemiological behavior change
-
ACM Press
-
A. Madan et al., "Social Sensing for Epidemiological Behavior Change," Proc. 12th ACM Int'l Conf. Ubiquitous Computing, ACM Press, 2010, pp. 291-300.
-
(2010)
Proc. 12th ACM Int'l Conf. Ubiquitous Computing
, pp. 291-300
-
-
Madan, A.1
-
18
-
-
70349313631
-
Inferring social network structure using mobile phone data
-
N. Eagle, A. Pentland, and D. Lazer, "Inferring Social Network Structure Using Mobile Phone Data," Proc. Nat'l Academy of Sciences, vol. 106, no. 36, 2009, pp. 15274-15278.
-
(2009)
Proc. Nat'l Academy of Sciences
, vol.106
, Issue.36
, pp. 15274-15278
-
-
Eagle, N.1
Pentland, A.2
Lazer, D.3
-
19
-
-
80054080566
-
The social fMRI: Measuring, understanding, and designing social mechanisms in the real world
-
ACM Press
-
N. Aharony et al., "The Social fMRI: Measuring, Understanding, and Designing Social Mechanisms in the Real World," Proc. 13th ACM Int'l Conf. Ubiquitous Computing (Ubicomp), ACM Press, 2011, pp. 445-454.
-
(2011)
Proc. 13th ACM Int'l Conf. Ubiquitous Computing (Ubicomp)
, pp. 445-454
-
-
Aharony, N.1
-
20
-
-
0742276097
-
Inside the slammer worm
-
D. Moore et al., "Inside the Slammer Worm," IEEE Security & Privacy, vol. 1, no. 4, 2003, pp. 33-39.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.4
, pp. 33-39
-
-
Moore, D.1
-
21
-
-
84958983572
-
Detecting malicious software by monitoring anomalous windows registry accesses
-
Springer
-
F. Apap et al., "Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses," Recent Advances in Intrusion Detection, Springer, 2002, pp. 36-53.
-
(2002)
Recent Advances in Intrusion Detection
, pp. 36-53
-
-
Apap, F.1
-
22
-
-
34748915835
-
Host based intrusion detection using machine learning
-
4258682, ISI 2007: 2007 IEEE Intelligence and Security Informatics
-
R. Moskovitch et al., "Host Based Intrusion Detection Using Machine Learning," Proc. IEEE Int'l Conf. Intelligence and Security Informatics (ISI), IEEE Press, 2007, pp. 107-114. (Pubitemid 47469223)
-
(2007)
ISI 2007: 2007 IEEE Intelligence and Security Informatics
, pp. 107-114
-
-
Moskovitch, R.1
Pluderman, S.2
Gus, I.3
Stopel, D.4
Feher, C.5
Parmet, Y.6
Shahar, Y.7
Elovici, Y.8
|