Sciweavers

390 search results - page 17 / 78
» Case Study: Interactive Visualization for Internet Security
Sort
View
95
Voted
VISUALIZATION
1992
IEEE
15 years 6 months ago
The Microscopist's Workstation
This case study looks at the issues involved in operating a sophisticated scientific instrument as a computer peripheral accessible over a high-speed network. A custom interactive...
Philip J. Mercurio, T. Todd Elvins, Stephen J. You...
113
Voted
WWW
2006
ACM
16 years 3 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
145
Voted
INFOVIS
2003
IEEE
15 years 8 months ago
Interactive Hierarchical Dimension Ordering, Spacing and Filtering for Exploration of High Dimensional Datasets
Large numbers of dimensions not only cause clutter in multidimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension manage...
Jing Yang, Wei Peng, Matthew O. Ward, Elke A. Rund...
128
Voted
WWW
2009
ACM
16 years 3 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
140
Voted
DSN
2007
IEEE
15 years 6 months ago
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks
A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet ca...
Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Li...