Sciweavers

390 search results - page 17 / 78
» Case Study: Interactive Visualization for Internet Security
Sort
View
VISUALIZATION
1992
IEEE
13 years 11 months ago
The Microscopist's Workstation
This case study looks at the issues involved in operating a sophisticated scientific instrument as a computer peripheral accessible over a high-speed network. A custom interactive...
Philip J. Mercurio, T. Todd Elvins, Stephen J. You...
WWW
2006
ACM
14 years 8 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
INFOVIS
2003
IEEE
14 years 27 days ago
Interactive Hierarchical Dimension Ordering, Spacing and Filtering for Exploration of High Dimensional Datasets
Large numbers of dimensions not only cause clutter in multidimensional visualizations, but also make it difficult for users to navigate the data space. Effective dimension manage...
Jing Yang, Wei Peng, Matthew O. Ward, Elke A. Rund...
WWW
2009
ACM
14 years 8 months ago
Characterizing insecure javascript practices on the web
JavaScript is an interpreted programming language most often used for enhancing webpage interactivity and functionality. It has powerful capabilities to interact with webpage docu...
Chuan Yue, Haining Wang
DSN
2007
IEEE
13 years 11 months ago
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks
A prefix hijack attack involves an attacker announcing victim networks' IP prefixes into the global routing system. As a result, data traffic from portions of the Internet ca...
Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Li...