Sciweavers

64 search results - page 11 / 13
» An Empirical Study of Denial of Service Mitigation Technique...
Sort
View
CCS
2009
ACM
14 years 9 months ago
Towards complete node enumeration in a peer-to-peer botnet
Modern advanced botnets may employ a decentralized peer-to-peer overlay network to bootstrap and maintain their command and control channels, making them more resilient to traditi...
Brent ByungHoon Kang, Eric Chan-Tin, Christopher P...
CHI
2007
ACM
14 years 9 months ago
Decision-making strategies in design meetings
This project aims to further our understanding of the practice of user-centered design (UCD) by observing the argumentation strategies used by designers in faceto-face meetings in...
Erin Friess
CIKM
2010
Springer
13 years 7 months ago
Preserving location and absence privacy in geo-social networks
Online social networks often involve very large numbers of users who share very large volumes of content. This content is increasingly being tagged with geo-spatial and temporal c...
Dario Freni, Carmen Ruiz Vicente, Sergio Mascetti,...
AUIC
2002
IEEE
14 years 1 months ago
An Evaluation of Mobile Phone Text Input Methods
The rapid growth of Short Message Service (SMS) text messaging is generating substantial commercial and research interest in fast and efficient text input methods for mobile devic...
Lee Butts, Andy Cockburn
EDO
2005
Springer
14 years 2 months ago
Using parse tree validation to prevent SQL injection attacks
An SQL injection attack targets interactive web applications that employ database services. Such applications accept user input, such as form fields, and then include this input ...
Gregory Buehrer, Bruce W. Weide, Paolo A. G. Sivil...