Sciweavers

832 search results - page 7 / 167
» Effect of Malicious Synchronization
Sort
View
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 10 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen
WWW
2010
ACM
14 years 4 months ago
Malicious interface design: exploiting the user
In an ideal world, interface design is the art and science of helping users accomplish tasks in a timely, efficient, and pleasurable manner. This paper studies the inverse situati...
Gregory J. Conti, Edward Sobiesk
WWW
2011
ACM
13 years 4 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...
SIGSOFT
2007
ACM
14 years 10 months ago
Mining specifications of malicious behavior
Malware detectors require a specification of malicious behavior. Typically, these specifications are manually constructed by investigating known malware. We present an automatic t...
Mihai Christodorescu, Somesh Jha, Christopher Krue...
CSCW
2002
ACM
13 years 9 months ago
Explaining effects of eye gaze on mediated group conversations: : amount or synchronization?
We present an experiment examining effects of gaze on speech during three-person conversations. Understanding such effects is crucial for the design of teleconferencing systems an...
Roel Vertegaal, Yaping Ding