|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 24 occurrences of 18 keywords
|
|
|
Results
Found 29 publication records. Showing 29 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Jangseong Kim, Zeen Kim, Kwangjo Kim |
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 37-48, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
63 | Wilfried N. Gansterer, Michael Ilger |
Analyzing UCE/UBE traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 9th International Conference on Electronic Commerce: The Wireless World of Electronic Commerce, 2007, University of Minnesota, Minneapolis, MN, USA, August 19-22, 2007, pp. 195-204, 2007, ACM, 978-1-59593-700-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
UBE, e-mail traffic, spam, honeypots, UCE |
32 | L. Pelletier, Jalal Almhana, Vartan Choulakian |
Adaptive Filtering of SPAM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: 2nd Annual Conference on Communication Networks and Services Research (CNSR 2004), 19-21 May 2004, Fredericton, N.B., Canada, pp. 218-224, 2004, IEEE Computer Society, 0-7695-2096-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
UBE, unsolicited e-mail, filtering, spam, e-mail, UCE |
32 | Thede Loder, Marshall W. van Alstyne, Rick Wash |
An economic answer to unsolicited communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 5th ACM Conference on Electronic Commerce (EC-2004), New York, NY, USA, May 17-20, 2004, pp. 40-50, 2004, ACM, 1-58113-771-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
filtering, mechanism design, spam, signaling, screening, uce, information asymmetry |
31 | Ruofan Hu, Dongyu Zhang, Dandan Tao, Huayi Zhang, Hao Feng, Elke A. Rundensteiner |
UCE-FID: Using Large Unlabeled, Medium Crowdsourced-Labeled, and Small Expert-Labeled Tweets for Foodborne Illness Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.01225, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Ruofan Hu, Dongyu Zhang, Dandan Tao, Huayi Zhang, Hao Feng, Elke A. Rundensteiner |
UCE-FID: Using Large Unlabeled, Medium Crowdsourced-Labeled, and Small Expert-Labeled Tweets for Foodborne Illness Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Big Data ![In: IEEE International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023, pp. 5250-5259, 2023, IEEE, 979-8-3503-2445-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Ryan Hagenson |
swsc: A sitewise UCE partitioner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Open Source Softw. ![In: J. Open Source Softw. 4(33), pp. 1146, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Daniel Jost 0001, Ueli Maurer |
Security Definitions for Hash Functions: Combining UCE and Indifferentiability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings, pp. 83-101, 2018, Springer, 978-3-319-98112-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Daniel Jost 0001, Ueli Maurer |
Context-Restricted Indifferentiability: Generalizing UCE and Implications on the Soundness of Hash-Function Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 461, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
31 | Mihir Bellare, Igors Stepanovs, Stefano Tessaro |
Contention in Cryptoland: Obfuscation, Leakage and UCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC (A2) ![In: Theory of Cryptography - 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II, pp. 542-564, 2016, Springer, 978-3-662-49098-3. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
31 | Mihir Bellare, Igors Stepanovs, Stefano Tessaro |
Contention in Cryptoland: Obfuscation, Leakage and UCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 487, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
31 | Natasha M. Costa Valentim, Jacilane Rabelo, Ana Carolina Oran, Tayana Conte, Sabrina Marczak |
A controlled experiment with Usability Inspection Techniques applied to Use Case Specifications: comparing the MIT 1 and the UCE techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS ![In: 18th ACM/IEEE International Conference on Model Driven Engineering Languages and Systems, MoDELS 2015, Ottawa, ON, Canada, September 30 - October 2, 2015, pp. 206-215, 2015, IEEE Computer Society, 978-1-4673-6908-4. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
31 | Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi |
Cryptography from Compression Functions: The UCE Bridge to the ROM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 518, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | Mihir Bellare, Viet Tung Hoang |
UCE+LTDFs: Efficient, Subversion-Resistant PKE in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2014, pp. 876, 2014. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP BibTeX RDF |
|
31 | Takahiro Matsuda 0002, Goichiro Hanaoka |
Chosen Ciphertext Security via UCE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings, pp. 56-76, 2014, Springer, 978-3-642-54630-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi |
Cryptography from Compression Functions: The UCE Bridge to the ROM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I, pp. 169-187, 2014, Springer, 978-3-662-44370-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
31 | Nunnapus Benjamas, Putchong Uthayopas |
Enhancing Parallel Data Mining Performance on a Large Cluster by Using UCE Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Next Gener. Inf. Technol. ![In: J. Next Gener. Inf. Technol. 2(4), pp. 69-77, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
31 | Emran Mohd Tamil, Mohd Yamani Idna Bin Idris, Chiew Ming Thong, Madihah Mohd Saudi, Mohd Zalisham Jali |
Needleman Wunsch Implementation for SPAM/UCE Inline Filter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INC ![In: Seventh International Network Conference (INC 2008), Plymouth, UK, July 8-10, 2008. Proceedings, pp. 141-147, 2008, University of Plymouth, 978-1-84102-188-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
31 | Wilfried N. Gansterer, Michael Ilger |
Towards Self-Learning and Fully Transparent UCE Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sicherheit ![In: Sicherheit 2008: Sicherheit, Schutz und Zuverlässigkeit. Konferenzband der 4. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 2.-4. April 2008 im Saarbrücker Schloss., pp. 277-290, 2008, GI, 978-3-88579-222-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
31 | Kasper Hornbæk, Rune Thaarup Høegh, Michael Bach Pedersen, Jan Stage |
Use Case Evaluation (UCE): A Method for Early Usability Evaluation in Software Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTERACT (1) ![In: Human-Computer Interaction - INTERACT 2007, 11th IFIP TC 13 International Conference, Rio de Janeiro, Brazil, September 10-14, 2007, Proceedings, Part I, pp. 578-591, 2007, Springer, 978-3-540-74794-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
software development, Usability evaluation, use cases |
23 | I. Cid, L. R. Janeiro, José Ramón Méndez 0001, Daniel Glez-Peña, Florentino Fdez-Riverola |
The Impact of Noise in Spam Filtering: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDM ![In: Advances in Data Mining. Medical Applications, E-Commerce, Marketing, and Theoretical Aspects, 8th Industrial Conference, ICDM 2008, Leipzig, Germany, July 16-18, 2008, Proceedings, pp. 228-241, 2008, Springer, 978-3-540-70717-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Francesco Gargiulo 0001, Antonio Penta, Antonio Picariello, Carlo Sansone |
Using Heterogeneous Features for Anti-spam Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 670-674, 2008, IEEE Computer Society, 978-0-7695-3299-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
lsa application, spam fusion classifier, image spam |
23 | Ángela Blanco, Alba María Ricket, Manuel Martín-Merino |
Combining SVM Classifiers for Email Anti-spam Filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWANN ![In: Computational and Ambient Intelligence, 9th International Work-Conference on Artificial Neural Networks, IWANN 2007, San Sebastián, Spain, June 20-22, 2007, Proceedings, pp. 903-910, 2007, Springer, 978-3-540-73006-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Nathan Denny, Theodore Elhourani, Jaime Denny, Scott Bissmeyer, David Irby |
SpamCooker: A Method for Deterring Unsolicited Electronic Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Third International Conference on Information Technology: New Generations (ITNG 2006), 10-12 April 2006, Las Vegas, Nevada, USA, pp. 590-591, 2006, IEEE Computer Society, 0-7695-2497-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ching-Tung Wu, Kwang-Ting Cheng, Qiang Zhu 0006, Yi-Leh Wu |
Using visual features for anti-spam filtering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP (3) ![In: Proceedings of the 2005 International Conference on Image Processing, ICIP 2005, Genoa, Italy, September 11-14, 2005, pp. 509-512, 2005, IEEE, 0-7803-9134-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Hung Chim |
To Build a Blocklist Based on the Cost of Spam. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings, pp. 510-519, 2005, Springer, 3-540-30900-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Feng Tian 0002, Renhou Li, M. D. Abdulrahman, Jincheng Zhang |
A Multi-agent Based Method for Handling Exceptions in Computer Supported Cooperative Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected papers) ![In: Computer Supported Cooperative Work in Design I, 8th International Conference, CSCWD 2004, Xiamen, China, May 26-28, 2004, Revised Selected Papers, pp. 156-164, 2004, Springer, 3-540-29400-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Tom Fawcett |
"In vivo" spam filtering: a challenge problem for KDD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGKDD Explor. ![In: SIGKDD Explor. 5(2), pp. 140-148, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
challenge problems, class skew, data streams, text classification, spam, cost-sensitive learning, concept drift, imbalanced data |
23 | Markus Jakobsson, Ari Juels |
X-Cash: Executable Digital Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Second International Conference, FC'98, Anguilla, British West Indies, February 23-25, 1998, Proceedings, pp. 16-27, 1998, Springer, 3-540-64951-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #29 of 29 (100 per page; Change: )
|
|