Sciweavers

137 search results - page 9 / 28
» enter 2006
Sort
View
CSREASAM
2006
13 years 9 months ago
Custom Plugin - A Solution to Phishing and Pharming Attacks
- This paper proposes a new method to detect, alert and protect the user from Internationalized Domain Names [1] (IDN) and Uniform Resource Locator (URL) spoofing, phishing, pharmi...
Omer Mahmood
CVIU
2006
76views more  CVIU 2006»
13 years 7 months ago
Homeostatic image perception: An artificial system
This paper describes how a visual system can automatically define features of interest from the observation of a large enough number of natural images. The principle complements t...
Thomas Feldman, Laurent Younes
IEPOL
2008
57views more  IEPOL 2008»
13 years 6 months ago
Interconnection and competition among asymmetric networks in the Internet backbone market
We examine the interrelation between interconnection and competition in the Internet backbone market. Networks that are asymmetric in size choose among different interconnection r...
Eric Jahn, Jens Prüfer
ITICSE
2006
ACM
14 years 1 months ago
Approaches to teaching the programming languages course: a potpourri
The release of Curriculum 2001 coupled with the increasing importance of the World Wide Web and the changes in pedagogy enabled by new technologies has made the choices about what...
Elizabeth S. Adams, Doug Baldwin, Judith Bishop, J...
IJDSN
2006
114views more  IJDSN 2006»
13 years 7 months ago
The Sleep Deprivation Attack in Sensor Networks: Analysis and Methods of Defense
The ability of sensor nodes to enter a low power sleep mode is very useful for extending network longevity. We show how adversary nodes can exploit clustering algorithms to ensure ...
Matthew Pirretti, Sencun Zhu, Narayanan Vijaykrish...