Internet bot

Results: 123



#Item
11CICADAS: Congesting the Internet with Coordinated And Decentralized Pulsating Attacks Yu-Ming ke Chih-Wei Chen

CICADAS: Congesting the Internet with Coordinated And Decentralized Pulsating Attacks Yu-Ming ke Chih-Wei Chen

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-03-15 05:57:03
12Balancing Usability and Security in a Video CAPTCHA Kurt Alfred Kluever Richard Zanibbi  Google, Inc.

Balancing Usability and Security in a Video CAPTCHA Kurt Alfred Kluever Richard Zanibbi Google, Inc.

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2009-05-29 13:18:18
13Who Moved My Reference Desk

Who Moved My Reference Desk

Add to Reading List

Source URL: lacuny.cuny.edu

Language: English - Date: 2015-09-29 10:24:23
14Studio Revenue Share Essentials ® Today, the majority of content providers participate in direct revenue sharing relationships with their largest rental

Studio Revenue Share Essentials ® Today, the majority of content providers participate in direct revenue sharing relationships with their largest rental

Add to Reading List

Source URL: www.rentrak.com

Language: English - Date: 2016-02-11 20:14:59
1514356c09.pgs:22 AM

14356c09.pgs:22 AM

Add to Reading List

Source URL: www.nickyee.com

Language: English - Date: 2013-09-22 02:49:20
16Light illuminates the way for bio-bots: Biological machine muscle actuator

Light illuminates the way for bio-bots: Biological machine muscle actuator

Add to Reading List

Source URL: techxplore.com

Language: English - Date: 2016-08-19 21:16:23
17Comparison of Human and AI Bots in StarCraft with Replay Data Mining Ho-Chul Cho Kyung-Joong Kim*

Comparison of Human and AI Bots in StarCraft with Replay Data Mining Ho-Chul Cho Kyung-Joong Kim*

Add to Reading List

Source URL: eldar.mathstat.uoguelph.ca

Language: English - Date: 2016-07-12 12:05:04
18Future Trends Working Group 	
   Future Trends Volume 11: Future Threats

Future Trends Working Group   Future Trends Volume 11: Future Threats

Add to Reading List

Source URL: www.iabuk.net

Language: English - Date: 2015-05-26 04:37:48
19The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks Oana Goga Giridhari Venkatadri

The Doppelgänger Bot Attack: Exploring Identity Impersonation in Online Social Networks Oana Goga Giridhari Venkatadri

Add to Reading List

Source URL: www.mpi-sws.org

Language: English - Date: 2015-09-11 04:02:46
20Why Whitelist? How Common Approaches to Beating Bot Traffic Fall Short Introduction Within the digital advertising industry, waste caused by non-human traffic is a well-documented problem. One 2014 study

Why Whitelist? How Common Approaches to Beating Bot Traffic Fall Short Introduction Within the digital advertising industry, waste caused by non-human traffic is a well-documented problem. One 2014 study

Add to Reading List

Source URL: www.areyouahuman.com

Language: English - Date: 2016-05-17 00:03:13