Sciweavers

1612 search results - page 251 / 323
» About models of security protocols
Sort
View
OOPSLA
2005
Springer
15 years 3 months ago
Using dependency models to manage complex software architecture
An approach to managing the architecture of large software systems is presented. Dependencies are extracted from the code by a conventional static analysis, and shown in a tabular...
Neeraj Sangal, Ev Jordan, Vineet Sinha, Daniel Jac...
CEAS
2008
Springer
14 years 12 months ago
Improved Phishing Detection using Model-Based Features
Phishing emails are a real threat to internet communication and web economy. Criminals are trying to convince unsuspecting online users to reveal passwords, account numbers, socia...
André Bergholz, Jeong Ho Chang, Gerhard Paa...
CORR
2007
Springer
138views Education» more  CORR 2007»
14 years 9 months ago
On the Performance Evaluation of Encounter-based Worm Interactions Based on Node Characteristics
An encounter-based network is a frequently-disconnected wireless ad-hoc network requiring nearby neighbors to store and forward data utilizing mobility and encounters over time. U...
Sapon Tanachaiwiwat, Ahmed Helmy
POLICY
2007
Springer
15 years 4 months ago
A Socio-cognitive Approach to Modeling Policies in Open Environments
The richness of today’s electronic communications mirrors physical world: activities such as shopping, business and scientific collaboration are conducted online. Current intera...
Tatyana Ryutov
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
15 years 3 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu