Sciweavers

2904 search results - page 320 / 581
» Internet Infrastructure Security
Sort
View
174
Voted
ICHIT
2009
Springer
15 years 11 months ago
Using w3af to achieve automated penetration testing by live DVD/live USB
As the popularity of the Internet continues growing, there are more and more services appeared, security measures are expected to become all the most important on the Internet. Pe...
Jiun-Kai Ke, Chung-Huang Yang, Tae-Nam Ahn
HICSS
2005
IEEE
144views Biometrics» more  HICSS 2005»
15 years 10 months ago
Online Fundraising for Environmental Nonprofit Organizations
Although the Internet provides nonprofit organizations with unprecedented opportunities for fundraising, the volume of online donations has been miniscule. Since one reason for th...
Irene Pollach, Horst Treiblmaier, Arne Floh
AH
2000
Springer
15 years 9 months ago
Case-Based User Profiling for Content Personalisation
As it stands the Internet’s “one size fits all” approach to information retrieval presents the average user with a serious information overload problem. Adaptive hypermedia s...
Keith Bradley, Rachael Rafter, Barry Smyth
IICS
2010
Springer
15 years 8 months ago
Rearchitecting DNS
Abstract. The Domain Name System (DNS) has been the naming service of the Internet for more than 20 years. It is the foundation of virtually all other distributed service. The de...
Gert Pfeifer, Christof Fetzer, Martin Steuer
176
Voted
APNOMS
2006
Springer
15 years 8 months ago
IP Traceback Algorithm for DoS/DDoS Attack
Abstract. DoS(Denial of Service) / DDoS(Distributed Denial of Service) attacks threaten Internet security nowadays. However, the current Internet protocol and backbone network do n...
Hong-bin Yim, Jae-il Jung