Sciweavers

2809 search results - page 561 / 562
» Applications of Expert Systems to the Design of Telecommunic...
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
13 years 9 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
INFOVIS
1995
IEEE
13 years 9 months ago
The information mural: a technique for displaying and navigating large information spaces
Visualizations which depict entire information spaces provide context for navigation and browsing tasks; however, the limited size of the display screen makes creating effective g...
Dean F. Jerding, John T. Stasko
CCS
2008
ACM
13 years 7 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
IMC
2007
ACM
13 years 7 months ago
On optimal probing for delay and loss measurement
Packet delay and loss are two fundamental measures of performance. Using active probing to measure delay and loss typically involves sending Poisson probes, on the basis of the PA...
François Baccelli, Sridhar Machiraju, Darry...
HUC
2010
Springer
13 years 6 months ago
Ubiquitous computing for sustainable energy (UCSE2010)
Providing sustainable energy is one of the fundamental challenges for mankind. With energy usage being a part of everyday activities and with the increasingly diversity of energy ...
Albrecht Schmidt, Adrian Friday, Hans-Werner Gelle...