Sciweavers

489 search results - page 68 / 98
» Effective techniques for automatic extraction of Web publica...
Sort
View
115
Voted
ACSAC
2008
IEEE
15 years 8 months ago
Anti-Phishing in Offense and Defense
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
Chuan Yue, Haining Wang
WWW
2005
ACM
16 years 2 months ago
Opinion observer: analyzing and comparing opinions on the Web
The Web has become an excellent source for gathering consumer opinions. There are now numerous Web sites containing such opinions, e.g., customer reviews of products, forums, disc...
Bing Liu, Minqing Hu, Junsheng Cheng
MTSR
2007
Springer
15 years 8 months ago
Creating and Querying an Integrated Ontology for Molecular and Phenotypic Cereals Data
In this paper we describe the development of an ontology of molecular and phenotypic cereals data, realized by integrating existing public web databases with the database developed...
Sonia Bergamaschi, Antonio Sala 0002
FC
2007
Springer
117views Cryptology» more  FC 2007»
15 years 8 months ago
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users’ financial accounts. Most existing or proposed solut...
Mohammad Mannan, Paul C. van Oorschot
BPM
2007
Springer
155views Business» more  BPM 2007»
15 years 6 months ago
Fuzzy Mining - Adaptive Process Simplification Based on Multi-perspective Metrics
Abstract. Process Mining is a technique for extracting process models from execution logs. This is particularly useful in situations where people have an idealized view of reality....
Christian W. Günther, Wil M. P. van der Aalst