Sciweavers

35419 search results - page 85 / 7084
» How are we doing
Sort
View
117
Voted
SOUPS
2010
ACM
15 years 7 months ago
Where do security policies come from?
We examine the password policies of 75 different websites. Our goal is understand the enormous diversity of requirements: some will accept simple six-character passwords, while o...
Dinei A. F. Florêncio, Cormac Herley
SAC
2006
ACM
15 years 9 months ago
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures
Denial-of-Service (DoS) attacks are a major concern for modern distributed applications. They exploit weakness in the software in order to make it unavailable to well-behaved user...
Valerio Schiavoni, Vivien Quéma
114
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
A Chain Reaction DoS Attack on 3G Networks: Analysis and Defenses
Abstract—The IP Multimedia Subsystem (IMS) is being deployed in the Third Generation (3G) networks since it supports many kinds of multimedia services. However, the security of I...
Bo Zhao, Caixia Chi, Wei Gao, Sencun Zhu, Guohong ...
136
Voted
WICSA
2007
15 years 4 months ago
Do Architecture Design Methods Meet Architects' Needs?
Several Software Architecture Design Methods (SADM) have been published, reviewed, and compared. But these surveys and comparisons are mostly centered on intrinsic elements of the...
Davide Falessi, Giovanni Cantone, Philippe Kruchte...

Book
410views
17 years 1 months ago
Action Arcade Adventure Set
"Have you ever played a side-scrolling action arcade game on your PC and wondered what it takes to program one? How do the programmers scroll their backgrounds so fast and mak...
Diana Gruber