Communications of the ACM
Probability and statistics with reliability, queuing and computer science applications
Probability and statistics with reliability, queuing and computer science applications
Modern Information Retrieval
Capacity Planning for Web Services: metrics, models, and methods
Capacity Planning for Web Services: metrics, models, and methods
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Communications of the ACM - Transforming China
Email prioritization: reducing delays on legitimate mail caused by junk mail
ATEC '04 Proceedings of the annual conference on USENIX Annual Technical Conference
Approximate object location and spam filtering on peer-to-peer systems
Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware
Workload models of spam and legitimate e-mails
Performance Evaluation
Separating wheat from the chaff: a deployable approach to counter spam
SRUTI'06 Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet - Volume 2
Identifying video spammers in online social networks
AIRWeb '08 Proceedings of the 4th international workshop on Adversarial information retrieval on the web
Mining social networks for personalized email prioritization
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Detectando usuários maliciosos em interações via vídeos no YouTube
Proceedings of the 14th Brazilian Symposium on Multimedia and the Web
Outsourcing home network security
Proceedings of the 2010 ACM SIGCOMM workshop on Home networks
Detecting spammers with SNARE: spatio-temporal network-level automatic reputation engine
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Hi-index | 0.00 |
Thorough defense against DoS attacks is extremely difficult without incurring significant changes to the Internet architecture. We present a series of changes aimed at establishing protection boundaries to reduce the effectiveness of most flooding DoS ...