Sciweavers

15379 search results - page 150 / 3076
» Protecting users from
Sort
View
CORR
2011
Springer
180views Education» more  CORR 2011»
12 years 11 months ago
A Survey of User-Centric Data Warehouses: From Personalization to Recommendation
Eya Ben Ahmed, Ahlem Nabli, Faïez Gargouri
AIED
2011
Springer
12 years 11 months ago
Causal Modeling of User Data from a Math Learning Environment with Game-Like Elements
We have created a math learning environment with game-like elements such as narrative, visual feedback, personalization, collection, etc. We made a study with four different versio...
Dovan Rai, Joseph E. Beck
WISEC
2010
ACM
13 years 5 months ago
Preventing multi-query attack in location-based services
Despite increasing popularity, Location-based Services (LBS) (e.g., searching nearby points-of-interest on map) on mobile handheld devices have been subject to major privacy conce...
Nilothpal Talukder, Sheikh Iqbal Ahamed
COMCOM
2008
104views more  COMCOM 2008»
13 years 7 months ago
A network-assisted mobile VPN for securing users data in UMTS
This paper proposes a network-assisted mobile Virtual Private Network (mVPN) security scheme that provides secure remote access to corporate resources over the Universal Mobile Te...
Christos Xenakis, Christoforos Ntantogian, Ioannis...
RAID
2005
Springer
14 years 1 months ago
FLIPS: Hybrid Adaptive Intrusion Prevention
Intrusion detection systems are fundamentally passive and fail–open. Because their primary task is classification, they do nothing to prevent an attack from succeeding. An intru...
Michael E. Locasto, Ke Wang, Angelos D. Keromytis,...