Sciweavers

2180 search results - page 120 / 436
» Web Site Metadata
Sort
View
122
Voted
HT
2006
ACM
15 years 9 months ago
Web 2.0: hypertext by any other name?
Web 2.0 is the popular name of a new generation of Web applications, sites and companies that emphasis openness, community and interaction. Examples include technologies such as B...
David E. Millard, Martin Ross
92
Voted
USS
2008
15 years 6 months ago
Exploitable Redirects on the Web: Identification, Prevalence, and Defense
Web sites on the Internet often use redirection. Unfortunately, without additional security, many of the redirection links can be manipulated and abused to mask phishing attacks. ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta
ECIS
2003
15 years 5 months ago
A session-based empirical investigation of web usage
This paper reports the results of a study of Web usage of 139 users over a 8 month period of time. It uses a longitudinal Web log analysis of the URLs accessed during 33916 user-d...
Mario Christ, Steffan Baron, Ramayya Krishnan, Dan...
130
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Anti-Phishing in Offense and Defense
Many anti-phishing mechanisms currently focus on helping users verify whether a web site is genuine. However, usability studies have demonstrated that prevention-based approaches ...
Chuan Yue, Haining Wang
FC
2007
Springer
111views Cryptology» more  FC 2007»
15 years 10 months ago
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...