Sciweavers

427 search results - page 68 / 86
» Applying Aspect-Orientation in Designing Security Systems: A...
Sort
View
CSE
2009
IEEE
14 years 3 months ago
Usable Privacy Controls for Blogs
—Web 2.0 applications, including blogs, wikis and social networking sites, pose challenging privacy issues. Many users are unaware that search engines index personal information ...
Michael Hart, Claude Castille, Rob Johnson, Amanda...
ACSW
2006
13 years 10 months ago
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS
Intrusion detection systems (IDS) perform an important role in the provision of network security, providing real- time notification of attacks in progress. One promising category ...
David Duncombe, George M. Mohay, Andrew Clark
SAC
2005
ACM
14 years 2 months ago
Where web engineering tool support ends: building usable websites
In this paper, two of the currently available Web Engineering solutions (UWE and OO-H) are analysed with regard to the question whether websites created with them and their tools ...
Richard Atterer
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 7 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
GROUP
2005
ACM
14 years 2 months ago
VERN: facilitating democratic group decision making online
VERN is an online collaborative tool that coordinates and distributes the process of finding optimal meeting times across the members of a group. The system combines the underlyin...
Sarita Yardi, Benjamin Hill, Stephen Chan