Sciweavers

7596 search results - page 108 / 1520
» Challenges in forensic computing
Sort
View
IJCSA
2008
131views more  IJCSA 2008»
15 years 3 months ago
On Ubiquitous Integrated Computing
: Ubiquitous integrated computing makes possible new workflow processes and business models which can meet the challenges from the fast growing digital convergence. An integrated i...
Kari Anne Haaland Thorsen, Chunming Rong
SIGCOMM
2009
ACM
15 years 9 months ago
De-anonymizing the internet using unreliable IDs
Today’s Internet is open and anonymous. While it permits free traffic from any host, attackers that generate malicious traffic cannot typically be held accountable. In this pa...
Yinglian Xie, Fang Yu, Martín Abadi
87
Voted
HICSS
2008
IEEE
106views Biometrics» more  HICSS 2008»
15 years 9 months ago
Of Paper Trails and Voter Receipts
The Internet pervades virtually every aspect of our daily lives, and it seems there is no area that is immune from computing solutions. Computers can do things faster, with greate...
Alec Yasinsac, Matt Bishop
INFOSECCD
2006
ACM
15 years 9 months ago
Is attack better than defense?: teaching information security the right way
A recent trend in security education is towards teaching offensive techniques which were originally developed by hackers. This reflects tendencies in the professional world where ...
Martin Mink, Felix C. Freiling
112
Voted
WMTE
2002
IEEE
15 years 8 months ago
A Concept Mapping Tool for Pocket PC Computers
We describe the implementation and evaluation of a concept mapping tool for Pocket PC computers. The paper addresses challenges associated with developing a learning tool for hand...
Tony Chan, Mike Sharples