Sciweavers

276 search results - page 1 / 56
» The Effectiveness of Whitelisting: a User-Study
Sort
View
CEAS
2008
Springer
13 years 6 months ago
The Effectiveness of Whitelisting: a User-Study
We believe this paper is the first extensive user-study of whitelisting email addresses. While whitelists are common in social networking and instant messaging (e.g., buddylists),...
David Erickson, Martin Casado, Nick McKeown
TVCG
2012
210views Hardware» more  TVCG 2012»
11 years 7 months ago
A 2D Flow Visualization User Study Using Explicit Flow Synthesis and Implicit Task Design
—This paper presents a 2D flow visualization user study that we conducted using new methodologies to increase the objectiveness. We evaluated grid-based variable-size arrows, eve...
Zhanping Liu, Shangshu Cai, J. Edward Swan II, Rob...
DIM
2008
ACM
13 years 5 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le
AINA
2008
IEEE
13 years 11 months ago
Annulling SYN Flooding Attacks with Whitelist
SYN flooding is one of classical Denial of Service (DoS) attacks abusing the TCP 3-way handshake process. This attack causes a server not to accept additional connection requests...
Tae Hyung Kim, Young-Sik Choi, Jong Kim, Sung Je H...
VIS
2009
IEEE
154views Visualization» more  VIS 2009»
14 years 5 months ago
A User Study to Compare Four Uncertainty Visualization Methods for 1D and 2D Datasets
Many techniques have been proposed to show uncertainty in data visualizations. However, very little is known about their effectiveness in conveying meaningful information. In this ...
Jibonananda Sanyal, Song Zhang, Gargi Bhattachar...