Page
%P
-
Chapter and Conference Paper
Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach
Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense of those detectors. We call t...
-
Chapter and Conference Paper
An Efficient Time-Based Checkpointing Protocol for Mobile Computing Systems over Wide Area Networks
In this paper, an efficient time-based coordinated checkpointing protocol for mobile computing systems is proposed. The main difference from traditional time-based protocols is that our protocol tries to reduc...