Sciweavers

43 search results - page 6 / 9
» Password Strength: An Empirical Analysis
Sort
View
ICSE
2007
IEEE-ACM
14 years 10 months ago
Agile Methods: Crossing the Chasm
An armada of emerging agile methods of software development (with eXtreme Programming and Scrum being the most broadly used) is both gaining popularity and generating lots of cont...
Frank Maurer, Grigori Melnik
JCS
2010
135views more  JCS 2010»
13 years 8 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
ANSS
2005
IEEE
14 years 3 months ago
An Extensible Platform for Evaluating Security Protocols
We present a discrete-event network simulator, called Simnet, designed specifically for analyzing networksecurity protocols. The design and implementation is focused on simplicit...
Seny Kamara, Darren Davis, Lucas Ballard, Ryan Cau...
KR
2004
Springer
14 years 3 months ago
Towards a Quantitative, Platform-Independent Analysis of Knowledge Systems
The Halo Pilot, a six-month effort to evaluate the state-ofthe-art in applied Knowledge Representation and Reasoning (KRR) systems, collaboratively developed a taxonomy of failure...
Noah S. Friedland, Paul G. Allen, Michael J. Witbr...
IHI
2010
186views Healthcare» more  IHI 2010»
13 years 4 months ago
Analysis of an online health social network
With the continued advances of Web 2.0, health-centered Online Social Networks (OSNs) are emerging to provide knowledge and support for those interested in managing their own heal...
Xiaoxiao Ma, Guanling Chen, Juntao Xiao