Sciweavers

5119 search results - page 95 / 1024
» Security Privacy
Sort
View
100
Voted
NORDSEC
2009
Springer
15 years 10 months ago
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic
Ejaz Ahmed, Andrew Clark, George M. Mohay
106
Voted
NORDSEC
2009
Springer
15 years 10 months ago
Blunting Differential Attacks on PIN Processing APIs
Riccardo Focardi, Flaminia L. Luccio, Graham Steel
OOPSLA
2009
Springer
15 years 10 months ago
The 9th OOPSLA workshop on domain-specific modeling
Juha-Pekka Tolvanen, Jeff Gray, Matti Rossi, Jonat...
92
Voted
SOUPS
2009
ACM
15 years 10 months ago
Designing for different levels of social inference risk
Sara Motahari, Sotirios G. Ziavras, Quentin Jones
SOUPS
2009
ACM
15 years 10 months ago
BayeShield: conversational anti-phishing user interface
Peter Likarish, Don Dunbar, Juan Pablo Hourcade, E...