Sciweavers

175 search results - page 30 / 35
» Using reinforcement to strengthen users' secure behaviors
Sort
View
ITNG
2008
IEEE
14 years 2 months ago
A Framework for Agent-Based Trust Management in Online Auctions
Current electronic commerce applications such as online auction systems are not trustworthy due to a lack of effective trust management mechanisms. A trustworthy online auction sy...
Haiping Xu, Sol M. Shatz, Christopher K. Bates
ECLIPSE
2005
ACM
13 years 10 months ago
InsECTJ: a generic instrumentation framework for collecting dynamic information within Eclipse
The heterogeneity and dynamism of today’s software systems make it difficult to assess the performance, correctness, or security of a system outside the actual time and context ...
Arjan Seesing, Alessandro Orso
WWW
2006
ACM
14 years 8 months ago
Protecting browser state from web privacy attacks
Through a variety of means, including a range of browser cache methods and inspecting the color of a visited hyperlink, client-side browser state can be exploited to track users a...
Collin Jackson, Andrew Bortz, Dan Boneh, John C. M...
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 8 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 1 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna