Sciweavers

381 search results - page 65 / 77
» Timing attacks on Web privacy
Sort
View
ACSAC
2006
IEEE
14 years 1 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
CSCW
2012
ACM
12 years 3 months ago
Friends, romans, countrymen: lend me your URLs. using social chatter to personalize web search
People often find useful content on the web via social media. However, it is difficult to manually aggregate the information and recommendations embedded in a torrent of social ...
Abhinay Nagpal, Sudheendra Hangal, Rifat Reza Joye...
JUCS
2006
225views more  JUCS 2006»
13 years 7 months ago
Restricting the View and Connecting the Dots - Dangers of a Web Search Engine Monopoly
: Everyone realizes how powerful the few big Web search engine companies have become, both in terms of financial resources due to soaring stock quotes and in terms of the still hid...
Narayanan Kulathuramaiyer, Wolf-Tilo Balke
PERCOM
2010
ACM
13 years 6 months ago
Sensor.Network: An open data exchange for the web of things
Abstract—Tiny, wireless, sensors embedded in a large number of Internet-capable devices–smart phones, cameras, cars, toys, medical instruments, home appliances and energy meter...
Vipul Gupta, Arshan Poursohi, Poornaprajna Udupi
ICC
2009
IEEE
118views Communications» more  ICC 2009»
14 years 2 months ago
A First Order Logic Security Verification Model for SIP
: It is well known that no security mechanism can provide full protection against a potential attack. There is always a possibility that a security incident may happen, mainly as a...
Dimitris Geneiatakis, Costas Lambrinoudakis, Georg...