-
2
-
-
51849112140
-
-
at Bank, of America
-
"SiteKey at Bank, of America," http://www.bankofamerica.com/ privacy/sitekey
-
SiteKey
-
-
-
3
-
-
34548786769
-
The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies,
-
in The
-
Stuart E. Schechter et al., "The Emperor's New Security Indicators An evaluation of website authentication and the effect of role playing on usability studies, " in The IEEE Symp. on Security and Privacy, 2007
-
(2007)
IEEE Symp. on Security and Privacy
-
-
Schechter, S.E.1
-
4
-
-
84871400671
-
Symantec Internet Security Threat Report Volume XH
-
Sep
-
"Symantec Internet Security Threat Report Volume XH," http://www.symantec.cam/business, Sep. 2007.
-
(2007)
-
-
-
6
-
-
0042421807
-
Statistical fraud detection: A review
-
R. J. Bolton and D. J. Hand., "Statistical fraud detection: A review," in Statistical Science, 17(3), 2002.
-
(2002)
Statistical Science
, vol.17
, Issue.3
-
-
Bolton, R.J.1
Hand, D.J.2
-
7
-
-
0002688690
-
-
Proc. of KDD-99
-
Rosset, S., Murad, U., Neumann, E., Idan,Y., and Pinkas, G, "Discovery of fraud rules for telecommunications-challenges and solutions," in Proc. of KDD-99, 1999
-
(1999)
Discovery of fraud rules for telecommunications-challenges and solutions
-
-
Rosset, S.1
Murad, U.2
Neumann, E.3
Idan, Y.4
Pinkas, G.5
-
13
-
-
51849159364
-
-
"Bharosa Tracker," http://www.bharosa.com
-
-
-
-
15
-
-
47949107361
-
-
Tewfiq El Maliki et al., A Survey of User-centric Identity Management Technologies, in SECUREWARE 2007, 2007.
-
Tewfiq El Maliki et al., "A Survey of User-centric Identity Management Technologies," in SECUREWARE 2007, 2007.
-
-
-
-
16
-
-
51849092362
-
-
GUIDE-ME: Georgia Tech User-Centric Identity Management Environment, isis.poly.edu/disw07/presentations/Ahamad%20Poly%20Talk.ppt
-
"GUIDE-ME: Georgia Tech User-Centric Identity Management Environment," isis.poly.edu/disw07/presentations/Ahamad%20Poly%20Talk.ppt
-
-
-
-
18
-
-
10444262112
-
p0f: Passive OS Fingerprinting tool
-
M. Zalewski, "p0f: Passive OS Fingerprinting tool." http://lcammf.coredump.cx/p0f.shtml.
-
-
-
Zalewski, M.1
-
21
-
-
51849140256
-
-
MaxMind, "GeoIP," http://www.maxmind.com
-
GeoIP
-
-
-
23
-
-
51849091256
-
Geolocalization on the Internet through Constraint Satisfection
-
Bernard Wong, et al., "Geolocalization on the Internet through Constraint Satisfection," in Proc of WORLDS, 2006.
-
(2006)
Proc of WORLDS
-
-
Wong, B.1
-
24
-
-
0036095845
-
Enhancing Profiles for Anomaly Detection Using Time Granularities
-
Y. Li, N. Wu, S. Jajodia, and X. S. Wang, "Enhancing Profiles for Anomaly Detection Using Time Granularities," in Journal of Computer Security, 10(2), 2002.
-
(2002)
Journal of Computer Security
, vol.10
, Issue.2
-
-
Li, Y.1
Wu, N.2
Jajodia, S.3
Wang, X.S.4
-
27
-
-
3042823619
-
Email-Based Identification and Authentication: An Alternative to PKT?
-
Simson L Garfinkel, "Email-Based Identification and Authentication: An Alternative to PKT?" in IEEE Security & Privacy, 1(6), 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
-
-
Garfinkel, S.L.1
|