Sciweavers

776 search results - page 122 / 156
» Securing user inputs for the web
Sort
View
TOG
2012
193views Communications» more  TOG 2012»
13 years 2 months ago
Selectively de-animating video
We present a semi-automated technique for selectively deanimating video to remove the large-scale motions of one or more objects so that other motions are easier to see. The user ...
Jiamin Bai, Aseem Agarwala, Maneesh Agrawala, Ravi...
98
Voted
MHCI
2009
Springer
15 years 7 months ago
Using handheld devices for mobile interaction with displays in home environments
An increasing number of households are equipped with a large number of TV sets and more and more of them are large highresolution displays. Furthermore, we see the integration of ...
Andreas Lorenz, Clara Fernandez De Castro, Enrico ...
99
Voted
ACSAC
2006
IEEE
15 years 6 months ago
NetSpy: Automatic Generation of Spyware Signatures for NIDS
We present NetSpy, a tool to automatically generate network-level signatures for spyware. NetSpy determines whether an untrusted program is spyware by correlating user input with ...
Hao Wang, Somesh Jha, Vinod Ganapathy
117
Voted
COMCOM
2008
91views more  COMCOM 2008»
15 years 18 days ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
102
Voted
SOUPS
2006
ACM
15 years 6 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...