Sciweavers

4812 search results - page 832 / 963
» Superimposed Information for the Internet
Sort
View
IEEEARES
2007
IEEE
15 years 8 months ago
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing
Identity theft through phishing attacks has become a major concern for Internet users. Typically, phishing attacks aim at luring the user to a faked web site to disclose personal ...
Sebastian Gajek, Ahmad-Reza Sadeghi, Christian St&...
IEEESCC
2007
IEEE
15 years 8 months ago
Composing Integrated Systems Using GUI-Based Applications And Web Services
— Integrated systems are composed of components that exchange information (i.e., interoperate [5]). These components include Graphical User Interface (GUI) APplications (GAPs) an...
Mark Grechanik, Kevin M. Conroy
INFOCOM
2007
IEEE
15 years 8 months ago
Measuring Network-Aware Worm Spreading Ability
— This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent worms that exploit such a vuln...
Zesheng Chen, Chuanyi Ji
MMM
2007
Springer
128views Multimedia» more  MMM 2007»
15 years 8 months ago
Video Histogram: A Novel Video Signature for Efficient Web Video Duplicate Detection
The explosive growth of information technology and digital content industry stimulates various video applications over the Internet. Since it is quite easy to copy, reformat, modif...
Lu Liu, Wei Lai, Xian-Sheng Hua, Shi-Qiang Yang
MSS
2007
IEEE
109views Hardware» more  MSS 2007»
15 years 8 months ago
Performance Evaluation of Multiple TCP connections in iSCSI
Scaling data storage is a significant concern in enterprise systems and Storage Area Networks (SANs) are deployed as a means to scale enterprise storage. SANs based on Fibre Chan...
Bhargava K. Kancherla, Ganesh M. Narayan, K. Gopin...