Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Counteracting Phishing Page Polymorphism: An Image Layout Analysis Approach

    Many visual similarity-based phishing page detectors have been developed to detect phishing webpages, however, scammers now create polymorphic phishing pages to breach the defense of those detectors. We call t...

    Ieng-Fat Lam, Wei-Cheng **ao, Szu-Chi Wang in Advances in Information Security and Assur… (2009)

  2. Chapter and Conference Paper

    An Efficient Time-Based Checkpointing Protocol for Mobile Computing Systems over Wide Area Networks

    In this paper, an efficient time-based coordinated checkpointing protocol for mobile computing systems is proposed. The main difference from traditional time-based protocols is that our protocol tries to reduc...

    Chi-Yi Lin, Szu-Chi Wang, Sy-Yen Kuo in Euro-Par 2002 Parallel Processing (2002)