Sciweavers

776 search results - page 122 / 156
» Securing user inputs for the web
Sort
View
TOG
2012
193views Communications» more  TOG 2012»
11 years 11 months ago
Selectively de-animating video
We present a semi-automated technique for selectively deanimating video to remove the large-scale motions of one or more objects so that other motions are easier to see. The user ...
Jiamin Bai, Aseem Agarwala, Maneesh Agrawala, Ravi...
MHCI
2009
Springer
14 years 3 months ago
Using handheld devices for mobile interaction with displays in home environments
An increasing number of households are equipped with a large number of TV sets and more and more of them are large highresolution displays. Furthermore, we see the integration of ...
Andreas Lorenz, Clara Fernandez De Castro, Enrico ...
ACSAC
2006
IEEE
14 years 2 months ago
NetSpy: Automatic Generation of Spyware Signatures for NIDS
We present NetSpy, a tool to automatically generate network-level signatures for spyware. NetSpy determines whether an untrusted program is spyware by correlating user input with ...
Hao Wang, Somesh Jha, Vinod Ganapathy
COMCOM
2008
91views more  COMCOM 2008»
13 years 9 months ago
A WEP post-processing algorithm for a Robust 802.11 WLAN implementation
Wired Equivalent Privacy (WEP) protocol used within the IEEE 802.11 standard has "major security flaws" thus wireless local area networks (WLANs) using the protocol are ...
Taskin Koçak, Mohit Jagetia
SOUPS
2006
ACM
14 years 2 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...