Sciweavers

158 search results - page 19 / 32
» Information Leakage Detection in Distributed Systems using S...
Sort
View
CORR
2010
Springer
140views Education» more  CORR 2010»
14 years 12 months ago
Performance Evaluation of DCA and SRC on a Single Bot Detection
: Malicious users try to compromise systems using new techniques. One of the recent techniques used by the attacker is to perform complex distributed attacks such as denial of serv...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ECRIME
2007
15 years 3 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
ACMACE
2005
ACM
15 years 5 months ago
MonkeyBridge: autonomous agents in augmented reality games
MonkeyBridge is a collaborative Augmented Reality (AR) game employing autonomous animated agents embodied by lifelike, animated virtual characters and “smart” physical objects...
István Barakonyi, Markus Weilguny, Thomas P...
ICMI
2004
Springer
157views Biometrics» more  ICMI 2004»
15 years 5 months ago
Collaboration in parallel worlds
We present a novel paradigm for human to human asymmetric collaboration. There is a need for people at geographically separate locations to seamlessly collaborate in real time as ...
Ashutosh Morde, Jun Hou, S. Kicha Ganapathy, Carlo...
CN
2007
148views more  CN 2007»
14 years 11 months ago
Using taxonomies for content-based routing with ants
Although the ant metaphor has been successfully applied to routing of data packets both in wireless and fixed networks, little is known yet about its appropriateness for search i...
Elke Michlmayr, Arno Pany, Gerti Kappel