Sciweavers

325 search results - page 9 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
ATAL
2004
Springer
14 years 29 days ago
Temptation and Contribution in C2C Transactions: Implications for Designing Reputation Management Systems
: A reputation management system can promote trust in transactions in an online consumer-to-consumer (C2C) market. We model a C2C market by employing an agent-based approach. To di...
Hitoshi Yamamoto, Kazunari Ishida, Toshizumi Ohta
SIGIR
1996
ACM
13 years 11 months ago
Evaluating User Interfaces to Information Retrieval Systems: A Case Study on User Support
Designing good user interfaces to information retrieval systems is a complex activity. The design space is large and evaluation methodologies that go beyond the classical precisio...
Giorgio Brajnik, Stefano Mizzaro, Carlo Tasso
IWC
2007
134views more  IWC 2007»
13 years 7 months ago
Disrupting digital library development with scenario informed design
In recent years, there has been great interest in scenario-based design and other forms of user-centred design. However, there are many design processes that, often for good reaso...
Ann Blandford, Suzette Keith, Richard Butterworth,...
CN
2007
137views more  CN 2007»
13 years 7 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
IPCCC
2006
IEEE
14 years 1 months ago
Incorruptible system self-cleansing for intrusion tolerance
 Despite the increased focus on security, critical information systems remain vulnerable to cyber attacks. The problem stems in large part from the constant innovation and evolu...
Yih Huang, David Arsenault, Arun Sood