Sciweavers

1975 search results - page 34 / 395
» Property analysis and design understanding
Sort
View
IPCCC
2007
IEEE
15 years 8 months ago
Understanding Localized-Scanning Worms
— Localized scanning is a simple technique used by attackers to search for vulnerable hosts. Localized scanning trades off between the local and the global search of vulnerable h...
Zesheng Chen, Chao Chen, Chuanyi Ji
100
Voted
ESEM
2007
ACM
15 years 5 months ago
An Empirical Study of the Effects of Gestalt Principles on Diagram Understandability
Comprehension errors in software design must be detected at their origin to avoid propagation into later portions of the software lifecycle and also the final system. This researc...
Krystle Lemon, Edward B. Allen, Jeffrey C. Carver,...
IJMMS
2006
94views more  IJMMS 2006»
15 years 1 months ago
A framework for understanding trust factors in web-based health advice
Trust is a key factor in consumer decisions about website engagement. Consumers will engage with sites they deem trustworthy and turn away from those they mistrust. In this paper ...
Elizabeth Sillence, Pamela Briggs, Peter Harris, L...
IMC
2009
ACM
15 years 8 months ago
Understanding slow BGP routing table transfers
Researchers and network operators often say that BGP table transfers are slow. Despite this common knowledge, the reasons for slow BGP transfers are not well understood. This pape...
Zied Ben-Houidi, Mickael Meulle, Renata Teixeira
CHIMIT
2007
ACM
15 years 5 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson