Sciweavers

175 search results - page 3 / 35
» Password policy simulation and analysis
Sort
View
CCS
2007
ACM
14 years 1 months ago
Dynamic pharming attacks and locked same-origin policies for web browsers
We describe a new attack against web authentication, which we call dynamic pharming. Dynamic pharming works by hijacking DNS and sending the victim’s browser malicious Javascrip...
Chris Karlof, Umesh Shankar, J. Doug Tygar, David ...
WSC
2000
13 years 8 months ago
Cost/benefit analysis of interval jumping in power-control simulation
Computation of power control calculations is one of the most time-consuming aspects of simulating wireless communication systems. These calculations are critical to understanding ...
David M. Nicol, L. Felipe Perrone
EUC
2004
Springer
14 years 11 days ago
Construction of Distributed Object Group Framework and Its Execution Analysis Using Distributed Application Simulation
The Distributed Object Group Framework(DOGF) we constructed supports the grouping of distributed objects that are required for distributed application. From the DOGF, we manage dis...
Chang-Sun Shin, Chang-Won Jeong, Su-Chong Joo
GI
2003
Springer
14 years 5 days ago
Strategic Simulation Games to foster Policy Development for Critical Infrastructure Protection
: Strategic Simulation Games have become an important element of policy development in the context of Critical Infrastructure Protection (CIP). They foster the network between all ...
Matthias Holenstein, Daniel Bircher
SOPR
2002
106views more  SOPR 2002»
13 years 6 months ago
A discrete simulation model for assessing software project scheduling policies
Good project scheduling is an essential, but extremely hard task in software management practice. In a software project, the time needed to complete some development activity is d...
Frank Padberg