Big Data: 8 facts and 8 fictions
Influence propagation in large graphs - theorems, algorithms, and case studies Christos Faloutsos CMU.
CMU SCS Identifying on-line Fraudsters: Anomaly Detection Using Network Effects Christos Faloutsos CMU.
Anti Anti-Forensics: Correlation Tony Rodrigues, CISSP, CFCP inv.forense (at) gmail (dot) com.
From creeper to stuxnet
Mastering informatica log files
How to Deliver Real-Time Concept Design with PTC Creo 2.0
Influence propagation in large graphs - theorems, algorithms, and case studies
Anomaly Detection and Virus Propagation in Large Graphs