Key-Based Input Transformation Defense Against Adversarial Examples | 0 | 0.34 | 2021 |
An intuitionistic fuzzy projection-based approach and application to software quality evaluation | 1 | 0.35 | 2020 |
Attention Please: Your Attention Check Questions in Survey Studies Can Be Automatically Answered | 0 | 0.34 | 2020 |
A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments. | 1 | 0.35 | 2020 |
A projection-based approach to software quality evaluation from the users’ perspectives | 1 | 0.35 | 2019 |
A normalized projection-based group decision-making method with heterogeneous decision information and application to software development effort assessment | 1 | 0.35 | 2019 |
Mining least privilege attribute based access control policies | 1 | 0.36 | 2019 |
Normalization of attribute values with interval information in group decision-making setting: with an application to software quality evaluation | 0 | 0.34 | 2019 |
Projection-based approach to group decision-making with hybrid information representations and application to software quality evaluation | 1 | 0.35 | 2019 |
An interval-valued intuitionistic fuzzy projection-based approach and application to evaluating knowledge transfer effectiveness | 1 | 0.35 | 2019 |
Sensor-Based Mobile Web Cross-Site Input Inference Attacks and Defenses. | 0 | 0.34 | 2019 |
Minimizing Privilege Assignment Errors in Cloud Services. | 1 | 0.37 | 2018 |
A novel approach to interval comparison and application to software quality evaluation. | 3 | 0.36 | 2018 |
Discover and Secure (DaS): An Automated Virtual Machine Security Management Framework | 0 | 0.34 | 2018 |
Normalized projection approach to group decision-making with hybrid decision information. | 6 | 0.39 | 2018 |
Two normalized projection models and application to group decision-making. | 5 | 0.38 | 2017 |
Entropy-based weights on decision makers in group decision-making setting with hybrid preference representations. | 11 | 0.47 | 2017 |
Cross-site Input Inference Attacks on Mobile Web Users. | 0 | 0.34 | 2017 |
Design and evaluation of the highly insidious extreme phishing attacks. | 1 | 0.36 | 2017 |
An Analysis Of Open Ports And Port Pairs In Ec2 Instances | 0 | 0.34 | 2017 |
Automated least privileges in cloud-based web services. | 0 | 0.34 | 2017 |
Sensor-Based Mobile Web Fingerprinting and Cross-Site Input Inference Attacks | 1 | 0.41 | 2016 |
Teaching Computer Science With Cybersecurity Education Built-in. | 1 | 0.36 | 2016 |
A geometric approach for ranking interval-valued intuitionistic fuzzy numbers with an application to group decision-making. | 3 | 0.39 | 2016 |
Automatic Detection of Information Leakage Vulnerabilities in Browser Extensions | 3 | 0.42 | 2015 |
SafeSky: A Secure Cloud Storage Middleware for End-User Applications | 3 | 0.65 | 2015 |
All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design | 14 | 0.74 | 2013 |
The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security. | 5 | 0.42 | 2013 |
A measurement study of insecure javascript practices on the web | 5 | 0.49 | 2013 |
Unveiling Privacy Setting Breaches in Online Social Networks. | 1 | 0.35 | 2013 |
A Security Analysis of Two Commercial Browser and Cloud Based Password Managers | 1 | 0.37 | 2013 |
Toward Secure and Convenient Browsing Data Management in the Cloud. | 1 | 0.36 | 2013 |
Preventing the revealing of online passwords to inappropriate websites with logininspector | 2 | 0.36 | 2012 |
A bidding strategy using genetic network programming with adjusting parameters for large-scale continuous double auction | 2 | 0.41 | 2012 |
Mitigating cross-site form history spamming attacks with domain-based ranking | 2 | 0.44 | 2011 |
Enhancing Bidding Strategy Using Genetic Network Programming In Agent-Based Multiple Round English Auction | 2 | 0.43 | 2011 |
No Time Limit And Time Limit Model Of Multiple Round Dutch Auction Based On Genetic Network Programming | 2 | 0.43 | 2011 |
BogusBiter: A transparent protection against phishing attacks | 29 | 1.14 | 2010 |
An automatic HTTP cookie management system | 6 | 0.53 | 2010 |
A bidding strategy of multiple round auctions based on Genetic Network Programming | 0 | 0.34 | 2010 |
Characterizing insecure javascript practices on the web | 56 | 2.60 | 2009 |
Secure passwords through enhanced hashing | 0 | 0.34 | 2009 |
Network intrusion detection using fuzzy class association rule mining based on genetic network programming | 1 | 0.40 | 2009 |
Profit-aware overload protection in E-commerce Web sites | 7 | 0.51 | 2009 |
SessionMagnifier: a simple approach to secure and convenient kiosk browsing | 5 | 0.44 | 2009 |
RCB: a simple and practical framework for real-time collaborative browsing | 2 | 0.42 | 2009 |
Anti-Phishing in Offense and Defense | 14 | 0.79 | 2008 |
Profit-aware Admission Control for Overload Protection in E-commerce Web Sites | 10 | 0.69 | 2007 |
Automatic Cookie Usage Setting with CookiePicker | 9 | 0.77 | 2007 |
Runtime and Programming Support for Memory Adaptation in Scientific Applications via Local Disk and Remote Memory | 4 | 0.49 | 2007 |