Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
Online communities can help people form productive relationships. Unfortunately, this potential is not always fulfilled: many communities fail, and designers don't have a sol...
Pamela J. Ludford, Dan Cosley, Dan Frankowski, Lor...
Requirements elicitation for a software system is a key stage in a successful development. At the same time, it is one of the most challenging, because requirements have to conside...
In service-oriented environments, the fluidity of the marketplace introduces changes in service offerings and subsequent connection failures for users still bound to outdated serv...
M. Brian Blake, Amy Lynn Sliva, Michael zur Muehle...
This research introduces privacy issues related to the viewing of incidental information during co-located collaboration. Web browsers were the representative application used in ...