The emergence of P2P Inference Engines and domain-specific ontologies in Web 3.0 (aka Semantic Web) will present a major threat to the central “search” engine model. In Web 3.0 (aka Semantic Web) P2P Inference Engines running on millions of users’ P
We need solutions that can help the many people whose terms and vocabulary are left out of the taxonomy... The simple idea that people’s actions model meaning better than a directory (even a flexible directory) is a critical step forward in thinking ab
Hillis has bigger fish to fry than self-programming gadgets. In the past, he's expressed a desire to create machines that transcend what he sees as the limitations of human beings. "I guess I'm not overly perturbed by the prospect that there might be some
The Decentralized Information Group explores technical, institutional, and public policy questions necessary to advance the development of global, decentralized information environments. The Tabulator project is a generic Semantic Web data browser. Using
Diaspora lässt dich deine Kontakte in Gruppen einordnen. Deine Fotos, Geschichten und Witze werden durch diese Aspekte nur mit den Menschen geteilt, für die sie gedacht sind – einzigartig bei Diaspora.
Archive.org is testing a decentralized version, or DWeb version, of their web site that allows their content to be delivered over peer-to-peer connections with different hosts sharing portions of or the same content.
Promether marks the end of surveillance and brings about a new era of online privacy,security, and anonymity. By merging blockchain technology, decentralized networks, and state-of-the-art encryption, Promether gives power and control back to the users.
Narita. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue VI):
117-128(November 2019)1. Symantec, 2019 Internet Security Threat Report, Vol. 24, 2019. 2. Akamai, 2019 State of the Internet / Security: Media Under Assault, 2019. https://www.akamai.com 3. J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, “Effective Worm Detection for Various Scan Technique,” Journal of Computer Security, vol.14, no.4, pp.359–387, 2006. 4. W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An Invisible Localization Attack to Internet Threat Monitors,” IEEE Trans. Parallel and Distributed Systems, vol.20, no.11, pp.1611–1625, 2009. 5. M. Narita, K. Ogura, B.B. Bista, and T. Takata, “Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack,” Proc. 17th International Conference on Network-Based Information Systems (NBiS 2014), 2014. 6. M. Narita, B.B. Bista, and T. Takata, “A Practical Study on Noise-Tolerant PN Code-Based Localisation Attacks to Internet Threat Monitors,” Int. J. Space-Based and Situated Computing, vol.3, no.4, pp.215–226, December 2013. 7. W. Yu, S. Wei, G. Ma, X. Fu, and N. Zhang, “On Effective Localization Attacks Against Internet Threat Monitors,” Proc. 2013 IEEE International Conference on Communications (ICC), pp.2011–2015, 2013. 8. UCSD Network Telescope. https://www.caida.org/projects/network telescope/ 9. Guillot, R. Fontugne, P. Winter, P. Me´rindol, A. King, A. Dainotti, and C. Pelsser, “Chocolatine: Outage Detection for Internet Background Radiation,” 10. Proc. Network Traffic Measurement and Analysis Conference (TMA), June 2019. DShield. http://www.dshield.org/ 11. M. Eto, D. Inoue, J. Song, J. Nakazato, K. Ohtaka, and K. Nakao, “nicter: A Large-Scale Network Incident Analysis System: Case Studies for Understanding Threat Landscape,” Proc. 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.37–45, 2011. 12. D. Inoue, M. Eto, K. Suzuki, M. Suzuki, and K. Nakao, “DAEDALUS-VIZ: Novel Real-Time 3D Visualization for Darknet Monitoring-Based Alert System,” Proc. 9th International Symposium on Visualization for Cyber Security, pp.72–79, October 2012. 13. H. Kanehara, Y. Murakami, J. Shimamura, T. Takahashi, D. Inoue and N. Murata, “Real-time botnet detection using nonnegative tucker decomposition,” 14. Proc. the 34th ACM/SIGAPP Symposium on Applied Computing, pp.1337–1344, April 2019. 15. X. Fan, C. Li, and X. Dong, “ A Real-Time Network Security Visualization System Based on Incremental Learning (ChinaVis 2018),” J. Visualization, pp.1–15, October 2018. 16. Y. Shinoda, K. Ikai, and M. Itoh, “Vulnerabilities of Passive Internet Threat Monitors,” Proc. 14th USENIX Security Symposium, pp.209–224, 2005. 17. J. Bethencourt, J. Franklin, and M. Vernon, “Mapping Internet Sensors with Probe Response Attacks,” Proc. 14th USENIX Security Symposium, pp.193– 208, 2005. 18. S. Wei, D. Shen, L. Ge, W. Yu, E.P. Blasch, K.D. Pham, and G. Chen, “Secured Network Sensor-Based Defense System,” Proc. SPIE 9469, Sensors and Systems for Space Applications VIII, 2015. 19. W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures,” IEEE Trans. Computers, vol.59, no.12, pp.1655–1668, 2010. 20. ENISA, “Proactive Detection of Network Security Incidents, Report,” https://www.enisa.europa.eu/2011. 21. M. Kamizono et al., “anti Malware engineering WorkShop ~MWS Datasets 2015~,” MWS2015, 2015..
C. Trattner, P. Singer, D. Helic, und M. Strohmaier. Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies, Seite 14:1--14:8. New York, NY, USA, ACM, (2012)
F. Hermann, A. Schuller, S. Thiel, C. Knecht, und S. Scerri. Human-Computer Interaction. Users and Contexts of Use, Volume 8006 von Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)
M. Heupel, S. Scerri, M. Bourimi, und D. Kesdogan. Proceedings of the 4th International Workshop on Modeling Social Media, Seite 3:1--3:4. New York, NY, USA, ACM, (2013)
H. Nguyen, D. Bozhkov, Z. Ahmadi, N. Nguyen, und T. Doan. Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, ACM, (Juli 2022)
A. Shakya, H. Takeda, V. Wuwongse, und I. Ohmukai. Proceedings of the IADIS International Conference WWW/Internet 2007, 1, Seite 371-380. Vila Real, Portugal, International Association for Development of the Information Society, IADIS Press, (Oktober 2007)
C. Boris, G. Gutierrez, P. Roy, J. Thomson, und P. Trezentos. 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, IEEE International, (2010)
C. Trattner, D. Helic, P. Singer, und M. Strohmaier. Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies, Seite 14. ACM, (2012)
C. Trattner, D. Helic, P. Singer, und M. Strohmaier. Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies, Seite 14. ACM, (2012)
M. Steinke, S. Metzger, und W. Hommel. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, Seite 1829-1831. ACM, (2016)