Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense of those detectors. We call t...
-
Chapter and Conference Paper
An Efficient Time-Based Checkpointing Protocol for Mobile Computing Systems over Wide Area Networks
In this paper, an efficient time-based coordinated checkpointing protocol for mobile computing systems is proposed. The main difference from traditional time-based protocols is that our protocol tries to reduc...