Sciweavers

1092 search results - page 96 / 219
» aime 2009
Sort
View
ESORICS
2009
Springer
15 years 10 months ago
Automatically Generating Models for Botnet Detection
A botnet is a network of compromised hosts that is under the control of a single, malicious entity, often called the botmaster. We present a system that aims to detect bots, indepe...
Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan G...
CCS
2009
ACM
15 years 10 months ago
Quantifying maximal loss of anonymity in protocols
There is a natural intuitive match between anonymity and information theory. In particular, the maximal anonymity loss in anonymity protocols can be matched to the information the...
Han Chen, Pasquale Malacaria
CCS
2009
ACM
15 years 10 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
CHI
2009
ACM
15 years 10 months ago
Audio or tactile feedback: which modality when?
When designing interfaces for mobile devices it is important to take into account the variety of contexts of use. We present a study that examines how changing noise and disturban...
Eve E. Hoggan, Andrew Crossan, Stephen A. Brewster...
CHI
2009
ACM
15 years 10 months ago
A mischief of mice: examining children's performance in single display groupware systems with 1 to 32 mice
Mischief is a system for classroom interaction that allows multiple children to use individual mice and cursors to interact with a single large display [20]. While the system can ...
Neema Moraveji, Kori Inkpen, Ed Cutrell, Ravin Bal...