Sciweavers

16 search results - page 3 / 4
» IT-Enabled Sophistication Banking
Sort
View
CCS
2009
ACM
14 years 16 days ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...
COMPSAC
2005
IEEE
13 years 11 months ago
Protecting Users Against Phishing Attacks with AntiPhish
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have b...
Engin Kirda, Christopher Krügel
ACISP
2010
Springer
13 years 7 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila
CCE
2008
13 years 5 months ago
Prediction of secondary structures of proteins using a two-stage method
Protein structure determination and prediction has been a focal research subject in life sciences due to the importance of protein structure in understanding the biological and ch...
Fadime Üney Yüksektepe, Özlem Yilma...
BMCBI
2008
154views more  BMCBI 2008»
13 years 5 months ago
Extension of the COG and arCOG databases by amino acid and nucleotide sequences
Background: The current versions of the COG and arCOG databases, both excellent frameworks for studies in comparative and functional genomics, do not contain the nucleotide sequen...
Florian Meereis, Michael Kaufmann