October 8, 2014

WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream |FTJ1327

WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream : IEEE2013 Abstract—Twitter is prone to malicious tweets containing URLs for spam, phishing, and […]
October 8, 2014

SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems |FTJ1326

SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems : IEEE2013 Abstract—Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can […]
October 8, 2014

Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks |FTJ1325

Security Analysis of a Single Sign-On Mechanism for Distributed Computer Networks : IEEE2013 Abstract—Single sign-on (SSO) is a new authentication mech­anism that enables a legal user […]
October 8, 2014

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks |FTJ1448

Cooperative Caching for Efficient Data Access in Disruption Tolerant Networks : IEEE 2014 Abstract: Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable node […]
October 8, 2014

Securing Class Initialization in Java-like Languages |FTJ1324

Securing Class Initialization in Java-like Languages : IEEE2013 Abstract—Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although […]