Sciweavers

12 search results - page 3 / 3
» Protecting IT Systems from Cyber Crime
Sort
View
SSDBM
2007
IEEE
165views Database» more  SSDBM 2007»
13 years 11 months ago
Processing Spatial-Keyword (SK) Queries in Geographic Information Retrieval (GIR) Systems
Location-based information contained in publicly available GIS databases is invaluable for many applications such as disaster response, national infrastructure protection, crime a...
Ramaswamy Hariharan, Bijit Hore, Chen Li, Sharad M...
ECRIME
2007
13 years 9 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley