Sciweavers

2403 search results - page 412 / 481
» Cyberinsurance in IT Security Management
Sort
View
WORM
2003
13 years 9 months ago
Experiences with worm propagation simulations
Fast Internet worms are a relatively new threat to Internet infrastructure and hosts. We discuss motivation and possibilities to study the behaviour of such worms and degrees of f...
Arno Wagner, Thomas Dübendorfer, Bernhard Pla...
WORM
2003
13 years 9 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
CCS
2010
ACM
13 years 8 months ago
An empirical study of privacy-violating information flows in JavaScript web applications
The dynamic nature of JavaScript web applications has given rise to the possibility of privacy violating information flows. We present an empirical study of the prevalence of such...
Dongseok Jang, Ranjit Jhala, Sorin Lerner, Hovav S...
CORR
2006
Springer
206views Education» more  CORR 2006»
13 years 8 months ago
ANAP: Anonymous Authentication Protocol in Mobile Ad hoc Networks
The pervasiveness of wireless communication recently gave mobile ad hoc networks (MANET) a significant researcher's attention, due to its innate capabilities of instant commu...
Tomasz Ciszkowski, Zbigniew Kotulski
DSS
2006
170views more  DSS 2006»
13 years 8 months ago
Adoption of internet banking: An empirical study in Hong Kong
This study investigates how customers perceive and adopt Internet Banking (IB) in Hong Kong. We developed a theoretical model based on the Technology Acceptance Model (TAM) with a...
T. C. Edwin Cheng, David Y. C. Lam, Andy C. L. Yeu...