Generating summaries of multiple news articles
SIGIR '95 Proceedings of the 18th annual international ACM SIGIR conference on Research and development in information retrieval
The anatomy of a large-scale hypertextual Web search engine
WWW7 Proceedings of the seventh international conference on World Wide Web 7
Geospatial mapping and navigation of the web
Proceedings of the 10th international conference on World Wide Web
Multiagent teamwork: analyzing the optimality and complexity of key theories and models
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 2
How to Own the Internet in Your Spare Time
Proceedings of the 11th USENIX Security Symposium
Proceedings of the 2003 ACM workshop on Rapid malcode
CorMet: a computational, corpus-based conventional metaphor extraction system
Computational Linguistics
Web-a-where: geotagging web content
Proceedings of the 27th annual international ACM SIGIR conference on Research and development in information retrieval
Defending against an Internet-based attack on the physical world
ACM Transactions on Internet Technology (TOIT)
Proceedings of the 2004 ACM workshop on Rapid malcode
On assigning place names to geography related web pages
Proceedings of the 5th ACM/IEEE-CS joint conference on Digital libraries
On the effectiveness of automatic patching
Proceedings of the 2005 ACM workshop on Rapid malcode
Proceedings of the 4th ACM workshop on Recurring malcode
Introduction to Information Retrieval
Introduction to Information Retrieval
Inside the spam cartel
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Pervasive random beacon in the internet for covert coordination
IH'05 Proceedings of the 7th international conference on Information Hiding
Ethical proactive threat research
FC'10 Proceedings of the 14th international conference on Financial cryptograpy and data security
A novel passive worm defense model for multimedia sharing
Proceedings of the 2013 Research in Adaptive and Convergent Systems
A game based passive worm defense model for P2P networks
ACM SIGAPP Applied Computing Review
Hi-index | 0.00 |
How humans behave when faced with a disaster, natural or man-made, can be exploited automatically by news-aware malicious software. We introduce weather worms, worms that can automatically identify abnormal events and their location, and target computers at that physical location. Such worms could be used to take advantage of poorly-defended computers in a disaster zone, and could amplify the effects of a physical attack. Defenses against weather worms require examination of policy and presentation of information on the Internet.