Sciweavers

POLICY
2007
Springer
13 years 10 months ago
Adaptive Web Data Extraction Policies
Web data extraction is concerned, among other things, with routine data accessing and downloading from continuously-updated dynamic Web pages. There is a relevant trade-off between...
Giacomo Fiumara, Massimo Marchi, Alessandro Provet...
FC
2007
Springer
111views Cryptology» more  FC 2007»
13 years 10 months ago
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
ADBIS
2007
Springer
207views Database» more  ADBIS 2007»
13 years 10 months ago
Applying User Profile Ontology for Mining Web Site Adaptation Recommendations
The Internet consists of web sites that employ different kinds of structures as the backbone of their build-up. However, users are browsing the web according to its content, regard...
Tarmo Robal, Ahto Kalja
ADAPTIVE
2007
Springer
13 years 10 months ago
Adaptive 3D Web Sites
In recent years, technological developments have made it possible to build interactive 3D models of objects and 3D Virtual Environments that can be experienced through the Web, usi...
Luca Chittaro, Roberto Ranon
IEEEARES
2007
IEEE
13 years 10 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
UIST
2009
ACM
13 years 11 months ago
Mining web interactions to automatically create mash-ups
The deep web contains an order of magnitude more information than the surface web, but that information is hidden behind the web forms of a large number of web sites. Metasearch e...
Jeffrey P. Bigham, Ryan S. Kaminsky, Jeffrey Nicho...
SEMWEB
2009
Springer
13 years 11 months ago
Policy-Aware Content Reuse on the Web
The Web allows users to share their work very effectively leading to the rapid re-use and remixing of content on the Web including text, images, and videos. Scientific research d...
Oshani Seneviratne, Lalana Kagal, Tim Berners-Lee
ICC
2009
IEEE
122views Communications» more  ICC 2009»
13 years 11 months ago
Sensitive Data Requests: Do Sites Ask Correctly?
— To ensure the security of sensitive Web content, an organization must use TLS and do so correctly. However, little is known about how TLS is actually used on the Web. In this w...
Craig A. Shue, Minaxi Gupta
WWW
2002
ACM
14 years 5 months ago
Flash crowds and denial of service attacks: characterization and implications for CDNs and web sites
The paper studies two types of events that often overload Web sites to a point when their services are degraded or disrupted entirely - flash events (FEs) and denial of service at...
Jaeyeon Jung, Balachander Krishnamurthy, Michael R...
WWW
2004
ACM
14 years 5 months ago
Practical semantic analysis of web sites and documents
As Web sites are now ordinary products, it is necessary to explicit the notion of quality of a Web site. The quality of a site may be linked to the easiness of accessibility and a...
Thierry Despeyroux