Sciweavers

2363 search results - page 463 / 473
» How Secure is RFID
Sort
View
IADIS
2004
15 years 5 months ago
End to End Defence Against DDoS Atacks
Denial of Service (DoS) attacks and Distributed Denial of Service (DDoS) attacks accounted for more losses than Internet financial fraud and viruses combined (CSI/FBI 2003). The I...
Anastasia Gemona, Ishbel Duncan, Colin Allison, Al...
NSDI
2004
15 years 5 months ago
Measurement and Analysis of Spyware in a University Environment
Over the past few years, a relatively new computing phenomenon has gained momentum: the spread of "spyware." Though most people are aware of spyware, the research commun...
Stefan Saroiu, Steven D. Gribble, Henry M. Levy
LISA
2003
15 years 5 months ago
Three Practical Ways to Improve Your Network
This paper presents three simple techniques for improving network service using relatively unknown features of many existing networks. The resulting system provides greater reliab...
Kevin Miller
ECIS
2000
15 years 5 months ago
Trust in Electronic Learning and Teaching Relationships: The Case of WINFO-Line
Electronic relationships in the context of electronic commerce and especially in the context of electronic learning and teaching are on the rise. However, besides the well known te...
Harald F. O. von Kortzfleisch, Udo Winand
ATAL
2010
Springer
15 years 5 months ago
Path disruption games
We propose Path Disruption Games (PDGs), which consider collaboration between agents attempting stop an adversary from travelling from a source node to a target node in a graph. P...
Yoram Bachrach, Ely Porat