Sciweavers

55 search results - page 3 / 11
» Computer security impaired by legitimate users
Sort
View
CORR
2010
Springer
136views Education» more  CORR 2010»
13 years 4 months ago
NgViz: Detecting DNS Tunnels through N-Gram Visualization and Quantitative Analysis
This paper introduced NgViz, a tool that examines DNS traffic and shows anomalies in n-gram frequencies. This is accomplished by comparing input files against a fingerprint of leg...
Kenton Born, David Gustafson
CHI
2006
ACM
14 years 6 months ago
Do security toolbars actually prevent phishing attacks?
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, th...
Min Wu, Robert C. Miller, Simson L. Garfinkel
PERCOM
2005
ACM
14 years 5 months ago
Expose or Not? A Progressive Exposure Approach for Service Discovery in Pervasive Computing Environments
In pervasive computing environments, service discovery facilitates users to access network services by automating tedious manual configurations. When network services becomes perv...
Feng Zhu, Wei Zhu, Matt W. Mutka, Lionel M. Ni
INFOCOM
1996
IEEE
13 years 10 months ago
Network Security via Reverse Engineering of TCP Code: Vulnerability Analysis and Proposed Solutions
The Transmission Control Protocol Internet Protocol TCP IP 1 suite is a very widely used technique that is employed to interconnect computing facilities in modern network environm...
Biswaroop Guha, Biswanath Mukherjee
OSDI
2004
ACM
14 years 6 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...