Sciweavers

4731 search results - page 166 / 947
» Securing Interactive Programs
Sort
View
HUC
2009
Springer
14 years 1 months ago
A spotlight on security and privacy risks with future household robots: attacks and lessons
Future homes will be populated with large numbers of robots with diverse functionalities, ranging from chore robots to elder care robots to entertainment robots. While household r...
Tamara Denning, Cynthia Matuszek, Karl Koscher, Jo...
ECOOP
2001
Springer
14 years 1 months ago
Feature Interactions Outside a Telecom Domain
Feature interactions in the original sense of the term (i.e. within a telecommunications domain), have now been the subject of significant research activity for over ten years. Thi...
Lynne Blair, Gordon S. Blair, Jianxiong Pang, Chri...
CHI
2006
ACM
14 years 9 months ago
Do security toolbars actually prevent phishing attacks?
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks. Because the toolbars are designed for humans to use, th...
Min Wu, Robert C. Miller, Simson L. Garfinkel
MHCI
2009
Springer
14 years 3 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
ICSM
2003
IEEE
14 years 2 months ago
Reverse Engineering of the Interaction Diagrams from C++ Code
In object oriented programming, the functionalities of a system result from the interactions (message exchanges) among the objects allocated by the system. While designing object ...
Paolo Tonella, Alessandra Potrich