Sciweavers

225 search results - page 42 / 45
» Spam, spam, spam, spam: how can we stop it
Sort
View
WWW
2008
ACM
14 years 8 months ago
Secure or insure?: a game-theoretic analysis of information security games
Despite general awareness of the importance of keeping one's system secure, and widespread availability of consumer security technologies, actual investment in security remai...
Jens Grossklags, Nicolas Christin, John Chuang
DLOG
2006
13 years 9 months ago
Towards Mobile Reasoning
Highly optimized reasoning support for Description Logics (DLs) has been developed during the past years. This paper presents our efforts to develop a reasoner suitable for mobile ...
Thomas Kleemann
SIGOPS
2011
210views Hardware» more  SIGOPS 2011»
13 years 2 months ago
Small trusted primitives for dependable systems
Secure, fault-tolerant distributed systems are difficult to build, to validate, and to operate. Conservative design for such systems dictates that their security and fault toleran...
Petros Maniatis, Byung-Gon Chun
CCS
2011
ACM
12 years 7 months ago
Cloak and dagger: dynamics of web search cloaking
Cloaking is a common “bait-and-switch” technique used to hide the true nature of a Web site by delivering blatantly different semantic content to different user segments. It i...
David Y. Wang, Stefan Savage, Geoffrey M. Voelker
DIMVA
2011
12 years 11 months ago
Reverse Social Engineering Attacks in Online Social Networks
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the second most visited site on the Internet, and has b...
Danesh Irani, Marco Balduzzi, Davide Balzarotti, E...