Sciweavers

347 search results - page 20 / 70
» Attacks on biometric systems: a case study in fingerprints
Sort
View
HICSS
2005
IEEE
169views Biometrics» more  HICSS 2005»
15 years 3 months ago
Developing E-Government Integrated Infrastructures: A Case Study
The Public Domain (PD) always serves as an agent to provide better and reliable services and information to citizens. Recent advancements in technology, citizen-demand and new pub...
Marinos Themistocleous, Zahir Irani, Peter E. D. L...
HICSS
2007
IEEE
133views Biometrics» more  HICSS 2007»
15 years 4 months ago
The Co-evolution of Design and User Requirements in Knowledge Management Systems: The Case of Patent Management Systems
Do the design requirements of a knowledge management system change over time? If so, how do these changes affect the users of the system? In this paper we explore the case of pate...
Tony Briggs, Bala Iyer, Paul Carlile
CORR
2010
Springer
352views Education» more  CORR 2010»
14 years 10 months ago
Case Study On Social Engineering Techniques for Persuasion
T There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working prin...
Mosin Hasan, Nilesh Prajapati, Safvan Vohara
SIGCOMM
2012
ACM
13 years 10 days ago
Measuring and fingerprinting click-spam in ad networks
Advertising plays a vital role in supporting free websites and smartphone apps. Click-spam, i.e., fraudulent or invalid clicks on online ads where the user has no actual interest ...
Vacha Dave, Saikat Guha, Yin Zhang
DSN
2007
IEEE
15 years 4 months ago
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks
Attacks exploiting race conditions have been considered rare and “low risk”. However, the increasing popularity of multiprocessors has changed this situation: instead of waiti...
Jinpeng Wei, Calton Pu