Sciweavers

3451 search results - page 122 / 691
» Collaborative attack modeling
Sort
View
HICSS
2006
IEEE
107views Biometrics» more  HICSS 2006»
15 years 8 months ago
Mobilizing Intellectual Bandwidth in a Distributed Virtual Organization: The Missing Links
The rise of distributed collaborative environments has brought about new opportunities for bringing together the experience and skills of geographically dispersed employees toward...
Sajda Qureshi, Arthur de Leeuw
WWW
2007
ACM
16 years 3 months ago
Detectives: detecting coalition hit inflation attacks in advertising networks streams
Click fraud is jeopardizing the industry of Internet advertising. Internet advertising is crucial for the thriving of the entire Internet, since it allows producers to advertise t...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi
CCS
2010
ACM
15 years 1 months ago
Protecting location privacy against inference attacks
GPS-enabled mobile devices are a quickly growing market and users are starting to share their location information with each other through services such as Google Latitude. Locati...
Kazuhiro Minami, Nikita Borisov
RAID
2010
Springer
15 years 25 days ago
A Data-Centric Approach to Insider Attack Detection in Database Systems
The insider threat against database management systems is a dangerous security problem. Authorized users may abuse legitimate privileges to masquerade as other users or to maliciou...
Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Sh...
INFOCOM
2011
IEEE
14 years 6 months ago
A dynamic game solution to malware attack
—Given the flexibility that software-based operation provides, it is unreasonable to expect that new malware will demonstrate a fixed behavior over time. Instead, malware can d...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman