Sciweavers

1314 search results - page 19 / 263
» New Approaches for Virtual Private Network Design
Sort
View
ICDM
2010
IEEE
157views Data Mining» more  ICDM 2010»
14 years 11 months ago
Privacy Violations Using Microtargeted Ads: A Case Study
In this paper we propose a new class of attacks that exploit advertising systems offering microtargeting capabilities in order to breach user privacy. We study the advertising syst...
Aleksandra Korolova
COMPSEC
2006
110views more  COMPSEC 2006»
15 years 1 months ago
Uncovering identities: A study into VPN tunnel fingerprinting
Operating System fingerprinting is a reconnaissance method which can be used by attackers or forensic investigators. It identifies a system's identity by observing its respon...
Vafa D. Izadinia, Derrick G. Kourie, Jan H. P. Elo...
MBUI
2004
146views User Interface» more  MBUI 2004»
15 years 3 months ago
Model-Based Design and new user Interfaces: Current Practices and Opportunities
In conventional applications it is easy to find detailed and structured practices that make use of models in order to describe almost every aspect of the user interface. On the ot...
José Pascual Molina Massó, Pascual G...
SIGCOMM
2009
ACM
15 years 8 months ago
Modeling and understanding end-to-end class of service policies in operational networks
Business and economic considerations are driving the extensive use of service differentiation in Virtual Private Networks (VPNs) operated for business enterprises today. The resul...
Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G...
NETGAMES
2006
ACM
15 years 7 months ago
On the support for heterogeneity in networked virtual environment
This paper presents our ongoing research activity to design and implement a framework for an networked virtual environment (NVE) that efficiently supports both hardware and softwa...
Hiroshi Fujinoki