CONDENSER: A Graph-Based Approachfor Detecting Botnets Authors: Pedro Camelo, Joao Moura, Ludwig Krippahl | Published: 2014-10-31 2014.10.31 2026.05.01 Literature Database
Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection Authors: Antti Juvonen, Tuomo Sipola | Published: 2014-10-28 2014.10.28 2026.05.01 Literature Database
Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination Authors: Amit Datta, Michael Carl Tschantz, Anupam Datta | Published: 2014-08-27 | Updated: 2015-03-17 2014.08.27 2026.05.01 Literature Database
Offline Signature-Based Fuzzy Vault (OSFV: Review and New Results Authors: George S. Eskander, Robert Sabourin, Eric Granger | Published: 2014-08-18 2014.08.18 2026.05.01 Literature Database
Prediction with Advice of Unknown Number of Experts Authors: Alexey Chernov, Vladimir Vovk | Published: 2014-08-09 2014.08.09 2026.05.01 Literature Database
An Evasion and Counter-Evasion Study in Malicious Websites Detection Authors: Li Xu, Zhenxin Zhan, Shouhuai Xu, Keyin Ye | Published: 2014-08-08 2014.08.08 2026.05.01 Literature Database
An Automated Social Graph De-anonymization Technique Authors: Kumar Sharad, George Danezis | Published: 2014-08-06 | Updated: 2014-08-07 2014.08.06 2026.05.01 Literature Database
Differentially-Private Logistic Regression for Detecting Multiple-SNP Association in GWAS Databases Authors: Fei Yu, Michal Rybar, Caroline Uhler, Stephen E. Fienberg | Published: 2014-07-30 2014.07.30 2026.05.01 Literature Database
Can’t you hear me knocking: Identification of user actions on Android apps via traffic analysis Authors: Mauro Conti, Luigi V. Mancini, Riccardo Spolaor, Nino V. Verde | Published: 2014-07-29 2014.07.29 2026.05.01 Literature Database
TweetCred: Real-Time Credibility Assessment of Content on Twitter Authors: Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, Patrick Meier | Published: 2014-05-21 | Updated: 2015-01-30 2014.05.21 2026.05.01 Literature Database