Sciweavers

524 search results - page 5 / 105
» Why phishing works
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 10 days ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
ESEC
1999
Springer
14 years 21 days ago
Yesterday, My Program Worked. Today, It Does Not. Why?
Imagine some program and a number of changes. If none of these changes is applied (“yesterday”), the program works. If all changes are applied (“today”), the program does n...
Andreas Zeller
CSCW
2010
ACM
14 years 5 months ago
Why the plan doesn't hold: a study of situated planning, articulation and coordination work in a surgical ward
Most studies of plans and situated work have applied ethnographic methods and and thus fail to provide any quantitative insight into the extent of this phenomenon. We present a st...
Jakob E. Bardram, Thomas Riisgaard Hansen
WSC
1994
13 years 9 months ago
Inside simulation software: how it works and why it matters
ABSTRACT This paper provides beginning and intermediate simulation practitioners and interested simulation consumers with a grounding in how discrete-event simulation software work...
Thomas J. Schriber, Daniel T. Brunner
JOS
2011
59views more  JOS 2011»
13 years 3 months ago
The problem of the initial transient (again), or why MSER works
In a comprehensive study of methods for dealing with the problem of the initial transient, Hoad et al. (2008) determined that the MSER (White, 1997) was an efficient and effective...
K. P. White Jr., S. Robinson