Sciweavers

1499 search results - page 24 / 300
» Case Study: An Implementation of a Secure Steganographic Sys...
Sort
View
90
Voted
ICDM
2010
IEEE
157views Data Mining» more  ICDM 2010»
14 years 7 months ago
Privacy Violations Using Microtargeted Ads: A Case Study
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Aleksandra Korolova
ECBS
2009
IEEE
119views Hardware» more  ECBS 2009»
15 years 4 months ago
Software Architectural Design Meets Security Engineering
Security requirements strongly influence the architectural design of complex IT systems in a similar way as other non-functional requirements. Both security engineering as well a...
Stephan Bode, Anja Fischer, Winfried E. Kühnh...
IJMMS
2006
84views more  IJMMS 2006»
14 years 9 months ago
Identity and role - A qualitative case study of cooperative scenario building
In this study, we argue that users participating in the design process will form the participation as a function of their professional role, but also as a function of their identi...
David Dinka, Jonas Lundberg
COMPSAC
2005
IEEE
15 years 3 months ago
Reasoning About Software Architecture-Based Regression Testing Through a Case Study
Two main issues need to be covered when dealing with the dependability of component-based systems: quality assurance of reusable software components and quality assurance of the a...
Henry Muccini, Marcio S. Dias, Debra J. Richardson
JTAER
2006
100views more  JTAER 2006»
14 years 9 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane