Sciweavers

282 search results - page 27 / 57
» Collaborative Intrusion Prevention
Sort
View
CSCW
2008
ACM
13 years 9 months ago
Collaboration and interference: awareness with mice or touch input
Multi-touch surfaces are becoming increasingly popular. An assumed benefit is that they can facilitate collaborative interactions in co-located groups. In particular, being able t...
Eva Hornecker, Paul Marshall, Nick Sheep Dalton, Y...
MKWI
2008
150views Business» more  MKWI 2008»
13 years 9 months ago
A Reference Model for Seamless Cross-Organizational Collaboration in the Public Sector
: Today, electronic cross-company collaboration is about to gain significant momentum, but still shows weaknesses with respect to productivity, flexibility and quality: A lack of s...
Christoph Schroth
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
RAID
2005
Springer
14 years 1 months ago
Sequence Number-Based MAC Address Spoof Detection
Abstract. The exponential growth in the deployment of IEEE 802.11based wireless LAN (WLAN) in enterprises and homes makes WLAN an attractive target for attackers. Attacks that expl...
Fanglu Guo, Tzi-cker Chiueh
DRM
2006
Springer
13 years 11 months ago
Vicarious infringement creates a privacy ceiling
In high-tech businesses ranging from Internet service providers to e-commerce websites and music stores like Apple iTunes, there is considerable potential for collecting personal ...
Janice Y. Tsai, Lorrie Faith Cranor, Scott Craver