Sciweavers

1863 search results - page 293 / 373
» Level-Based Link Analysis
Sort
View
CHIMIT
2007
ACM
15 years 6 months ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
92
Voted
FC
2010
Springer
160views Cryptology» more  FC 2010»
15 years 6 months ago
Measuring the Perpetrators and Funders of Typosquatting
We describe a method for identifying “typosquatting”, the intentional registration of misspellings of popular website addresses. We estimate that at least 938 000 typosquatting...
Tyler Moore, Benjamin Edelman
118
Voted
ICASSP
2009
IEEE
15 years 6 months ago
What happens when cognitive terminals compete for a relaying node?
We introduce a new channel, which consists of an interference channel (IC) in parallel with an interference relay channel (IRC), to analyze the interaction between two selfish and...
Elena Veronica Belmega, Brice Djeumou, Samson Lasa...
AMT
2006
Springer
107views Multimedia» more  AMT 2006»
15 years 6 months ago
An Intelligent Process Monitoring System in Complex Manufacturing Environment
In high-tech industries, most manufacturing processes are complexly intertwined, in that manufacturers or engineers can hardly control a whole set of processes. They are only capa...
Sung Ho Ha, Boo-Sik Kang
DSN
2004
IEEE
15 years 6 months ago
Impact of Path Diversity on Multi-homed and Overlay Networks
Multi-homed and overlay networks are two widely studied approaches aimed at leveraging the inherent redundancy of the Internet's underlying routing infrastructure to enhance ...
Junghee Han, Farnam Jahanian