Sciweavers

635 search results - page 63 / 127
» Social Aspects of Information Security
Sort
View
CSCW
2004
ACM
15 years 5 months ago
List making in the home
This paper presents research on the use of household lists. Drawing on an ethnographic study of mothers’ work, it focuses on the centrality of paper lists in home- and child-car...
Alex S. Taylor, Laurel Swan
INFOCOM
2009
IEEE
15 years 6 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
CN
2011
129views more  CN 2011»
14 years 6 months ago
Decapitation of networks with and without weights and direction: The economics of iterated attack and defense
Vulnerability of networks against one-shot decapitation attacks has been addressed several times in the literature. A first study on how a network can best defend itself by reple...
Josep Domingo-Ferrer, Úrsula Gonzále...
GLOBECOM
2010
IEEE
14 years 9 months ago
Constructing Secure Localization Systems with Adjustable Granularity Using Commodity Hardware
Proof of a user's identity is not always a sufficient means for making an authorization decision. In an increasing set of circumstances, knowledge of physical location provide...
Patrick Traynor, Joshua Schiffman, Thomas F. La Po...
ECSCW
2003
15 years 1 months ago
Applying Cyber-Archaeology
Online spaces that enable public shared inter-personal communications are of significant social and economic importance. This paper outlines a theoretical model and methodology, la...
Quentin Jones