Sciweavers

25 search results - page 5 / 5
» Protecting Financial Institutions from Brute-Force Attacks
Sort
View
ECRIME
2007
13 years 8 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
JCDL
2009
ACM
102views Education» more  JCDL 2009»
13 years 11 months ago
Unsupervised creation of small world networks for the preservation of digital objects
The prevailing model for digital preservation is that archives should be similar to a “fortress”: a large, protective infrastructure built to defend a relatively small collect...
Charles L. Cartledge, Michael L. Nelson
AMR
2006
Springer
119views Multimedia» more  AMR 2006»
13 years 6 months ago
The Potential of User Feedback Through the Iterative Refining of Queries in an Image Retrieval System
Inaccurate or ambiguous expressions in queries lead to poor results in information retrieval. We assume that iterative user feedback can improve the quality of queries. To this end...
Maher Ben Moussa, Marco Pasch, Djoerd Hiemstra, Pa...
SP
2007
IEEE
13 years 11 months ago
The Emperor's New Security Indicators
We evaluate website authentication measures that are designed to protect users from man-in-the-middle, ‘phishing’, and other site forgery attacks. We asked 67 bank customers t...
Stuart E. Schechter, Rachna Dhamija, Andy Ozment, ...
WORM
2004
13 years 6 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...