Sciweavers

4193 search results - page 127 / 839
» Measurable Categories
Sort
View
WWW
2006
ACM
16 years 4 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
CHI
2004
ACM
16 years 4 months ago
What's my method?: a game show on games
What's My Method? is the game show that asks the question, "How do you user-test games?" The goal of this session is to highlight important differences between user...
Nicole Lazzaro, Kevin Keeker
SIGMOD
2009
ACM
177views Database» more  SIGMOD 2009»
16 years 4 months ago
ORDEN: outlier region detection and exploration in sensor networks
Sensor networks play a central role in applications that monitor variables in geographic areas such as the traffic volume on roads or the temperature in the environment. A key fea...
Conny Franke, Michael Gertz
ICSE
2008
IEEE-ACM
16 years 4 months ago
Continuous software quality supervision using SourceInventory and Columbus
Several tools and methods for source code quality assurance based on static analysis finally reached a state when they are applicable in practice and recognized by the industry. H...
Árpád Beszédes, Rudolf Ferenc...
WISEC
2010
ACM
15 years 11 months ago
On the reliability of wireless fingerprinting using clock skews
Determining whether a client station should trust an access point is a known problem in wireless security. Traditional approaches to solving this problem resort to cryptography. B...
Chrisil Arackaparambil, Sergey Bratus, Anna Shubin...