Sciweavers

405 search results - page 32 / 81
» Avatar-centric Risk Evaluation
Sort
View
SOUPS
2006
ACM
15 years 3 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
PSD
2004
Springer
126views Database» more  PSD 2004»
15 years 3 months ago
Outlier Protection in Continuous Microdata Masking
Abstract. Masking methods protect data sets against disclosure by perturbing the original values before publication. Masking causes some information loss (masked data are not exact...
Josep Maria Mateo-Sanz, Francesc Sebé, Jose...
DIM
2009
ACM
15 years 2 months ago
Using identity credential usage logs to detect anomalous service accesses
For e-commerce companies providing online services, fraudulent access resulting from theft of identity credentials is a serious concern. Such online service providers deploy a var...
Daisuke Mashima, Mustaque Ahamad
CSDA
2008
77views more  CSDA 2008»
14 years 9 months ago
Maximizing equity market sector predictability in a Bayesian time-varying parameter model
A large body of evidence has emerged in recent studies confirming that macroeconomic factors play an important role in determining investor risk premia and the ultimate path of eq...
Lorne D. Johnson, Georgios Sakoulis
ICTAI
2009
IEEE
15 years 4 months ago
Preventing Unwanted Social Inferences with Classification Tree Analysis
A serious threat to user privacy in new mobile and web2.0 applications stems from ‘social inferences’. These unwanted inferences are related to the users’ identity, current ...
Sara Motahari, Sotirios G. Ziavras, Quentin Jones