Sciweavers

71 search results - page 13 / 15
» Reverse Social Engineering Attacks in Online Social Networks
Sort
View
FC
2006
Springer
129views Cryptology» more  FC 2006»
13 years 8 months ago
Phoolproof Phishing Prevention
Abstract. Phishing, or web spoofing, is a growing problem: the Anti-Phishing Working Group (APWG) received almost 14,000 unique phishing reports in August 2005, a 56% jump over the...
Bryan Parno, Cynthia Kuo, Adrian Perrig
ACSAC
2007
IEEE
13 years 11 months ago
HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks
Instant messaging (IM) has been one of most frequently used malware attack vectors due to its popularity. Distinct from other malware, it is straightforward for IM malware to fin...
Mengjun Xie, Zhenyu Wu, Haining Wang
IUI
2004
ACM
13 years 10 months ago
Choosing when to interact with learners
In this paper, we describe a method for pedagogical agents to choose when to interact with learners in interactive learning environments. This method is based on observations of h...
Lei Qu, Ning Wang, W. Lewis Johnson
ISSA
2004
13 years 6 months ago
A Unified Architecture For Automatic Software Updates
This paper attempts to address the issue of hardening the internal security of an organisation's network by easing its patch management. Traditionally security has been model...
Dominic White
IUI
2005
ACM
13 years 10 months ago
Interfaces for networked media exploration and collaborative annotation
In this paper, we present our efforts towards creating interfaces for networked media exploration and collaborative annotation. The problem is important since online social networ...
Preetha Appan, Bageshree Shevade, Hari Sundaram, D...