Sciweavers

103 search results - page 20 / 21
» enter 2010
Sort
View
JCS
2010
135views more  JCS 2010»
15 years 1 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
TCOM
2010
91views more  TCOM 2010»
15 years 1 months ago
Slot-wise maximum likelihood estimation of the tag population size in FSA protocols
Abstract—Framed Slotted Aloha (FSA) is a popular anticollision technique in state-of-the-art RF-ID systems, as in ISO/IEC CD 18000-6 for 900MHz or the EPCglobal HF Gen 2 draft fo...
Bastian Knerr, Martin Holzer 0002, Christoph Anger...
VLC
2010
91views more  VLC 2010»
15 years 1 months ago
A model-based recognition engine for sketched diagrams
Many of today’s recognition approaches for hand-drawn sketches are feature-based, which is conceptually similar to the recognition of hand-written text. While very suitable for ...
Florian Brieler, Mark Minas
ACSAC
2010
IEEE
15 years 1 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
ACSAC
2010
IEEE
15 years 20 days ago
Detecting spammers on social networks
Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms (such as Facebook, M...
Gianluca Stringhini, Christopher Kruegel, Giovanni...