Sciweavers

3451 search results - page 142 / 691
» Collaborative attack modeling
Sort
View
115
Voted
AINA
2011
IEEE
14 years 6 months ago
Identity Support in a Security and Trust Service for Ad Hoc M-commerce Trading Systems
– Ad hoc m-commerce is an emerging way of conducting online trading wirelessly within dynamic network communities. However, participants in such systems are vulnerable to attacks...
Husna Osman, Hamish Taylor
120
Voted
IFIP
2009
Springer
15 years 9 months ago
Static Detection of Logic Flaws in Service-Oriented Applications
Application or business logic, used in the development of services, has to do with the operations that define the application functionalities and not with the platform ones. Often...
Chiara Bodei, Linda Brodo, Roberto Bruni
112
Voted
TDHMS
2008
15 years 29 days ago
Oracle Channels
In this paper, well-known attacks named oracle attacks are formulated within a realistic network communication model where they reveal to use suitable covert channels, we name orac...
Ilaria Venturini
TKDD
2010
121views more  TKDD 2010»
15 years 27 days ago
Factor in the neighbors: Scalable and accurate collaborative filtering
Recommender systems provide users with personalized suggestions for products or services. These systems often rely on Collaborating Filtering (CF), where past transactions are ana...
Yehuda Koren
111
Voted
ICALT
2008
IEEE
15 years 9 months ago
NUCLEO: Adaptive Computer Supported Collaborative Learning in a Role Game Based Scenario
This paper presents the adaptation model used in NUCLEO, a pilot e-learning environment that is currently being developed at the Complutense University of Madrid. The NUCLEO syste...
Pilar Sancho, Rubén Fuentes-Fernánde...