Sciweavers

5324 search results - page 770 / 1065
» Internet Security Protocols
Sort
View
CHI
2007
ACM
14 years 11 months ago
Protecting people from phishing: the design and evaluation of an embedded training email system
Phishing attacks, in which criminals lure Internet users to websites that impersonate legitimate sites, are occurring with increasing frequency and are causing considerable harm t...
Ponnurangam Kumaraguru, Yong Rhee, Alessandro Acqu...
CCS
2010
ACM
14 years 5 months ago
A game theoretic model for digital identity and trust in online communities
Digital identity and trust management mechanisms play an important role on the Internet. They help users make decisions on trustworthiness of digital identities in online communit...
Tansu Alpcan, Cengiz Örencik, Albert Levi, Er...
CCS
2009
ACM
14 years 5 months ago
Your botnet is my botnet: analysis of a botnet takeover
Botnets, networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security problems on the Internet. A particularly sophi...
Brett Stone-Gross, Marco Cova, Lorenzo Cavallaro, ...
ACSAC
2008
IEEE
14 years 5 months ago
PinUP: Pinning User Files to Known Applications
Users commonly download, patch, and use applications such as email clients, office applications, and media-players from the Internet. Such applications are run with the user’s ...
William Enck, Patrick Drew McDaniel, Trent Jaeger
HICSS
2008
IEEE
109views Biometrics» more  HICSS 2008»
14 years 5 months ago
Web-Based Service Exchange System for Agents and Humans Alike
Semantic Web research aims at bridging the gap between how humans and agents process information readily available on the Internet. One of the great challenges to this goal lies i...
Evens Jean, Machigar Ongtang, Ali R. Hurson