Sciweavers

181 search results - page 36 / 37
» Analyzing Regulatory Rules for Privacy and Security Requirem...
Sort
View
OOPSLA
2005
Springer
14 years 1 months ago
GOOAL: an educational object oriented analysis laboratory
Our goal is to enable rapid production of static and dynamic object models from natural language description of problems. Rapid modeling is achieved through automation of analysis...
Hector G. Pérez-González, Jugal K. K...
CHI
2002
ACM
14 years 7 months ago
What makes people trust online gambling sites?
A validated model of trust was used as a framework for an empirical study to identify on- and offline factors that influence gamblers' perception of an online casino's t...
Bhiru Shelat, Florian N. Egger
CEAS
2005
Springer
14 years 1 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
IJNSEC
2006
132views more  IJNSEC 2006»
13 years 7 months ago
Alert Correlation for Extracting Attack Strategies
Alert correlation is an important technique for managing large the volume of intrusion alerts that are raised by heterogenous Intrusion Detection Systems (IDSs). The recent trend ...
Bin Zhu, Ali A. Ghorbani
ER
2004
Springer
169views Database» more  ER 2004»
14 years 28 days ago
Intentional Modeling to Support Identity Management
Identity management has arisen as a major and urgent challenge for internet-based communications and information services. Internet services involve complex networks of relationshi...
Lin Liu, Eric S. K. Yu