Search Results

You are looking at 1 - 5 of 5 items for :

  • Computer Sciences x
Clear All
Open access

Yousra Javed and Mohamed Shehab

References [1] Do you need mobile antivirus software? http://www.androidauthority.com/do-you-need-mobile-antivirus-software-663034/ . [2] The eye tribe tracker. https://theeyetribe.com . [3] Facebook security issue: Facebook color scam, back again. https://developers.facebook.com/docs/facebook-login/login-flow-for-web/v2.2 . [4] The ‘most used words’ facebook quiz app accused of data stealing. http://www.forbes.com/sites/amitchowdhry/2015/11/29/the-most-used-words-facebook-quiz-app/#73c615c14bb6 . [5] Facebook login flow. http

Open access

Oleksii Starov, Phillipa Gill and Nick Nikiforakis

, Mar. 2014. Springer. [7] P. Eckersley. How Unique Is Your Browser? In Proceedings of the Privacy Enhancing Technologies Symposium (PETS), pages 1-17, 2010. [8] W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2):5, 2014. [9] S. Englehardt, D. Reisman, C. Eubank, P. Zimmerman, J. Mayer, A. Narayanan, and E. W. Felten

Open access

Yu Pu and Jens Grossklags

. McDaniel, and A. Sheth. TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems, 32(2):5:1-5:29, 2014. [33] A. Felt and D. Evans. Privacy protection for social networking APIs. In Proceedings of the 2008 Workshop on Web 2.0 Security and Privacy (W2SP), 2008. [34] A. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner. Android permissions: User attention, comprehension, and behavior. In Proceedings of the 7th Symposium On Usable Privacy and Security (SOUPS

Open access

Cihan Altuntas

. Paragios N. "Computer Vision – ECCV 2010 778–792 Springer Chen, B., Chen, Z., Deng, L., Duan, Y., and Zhou, J. (2016). Building change detection with RGB-D map generated from UAV images. Neurocomputing 208:350–364, 10.1016/j.neucom.2015.11.118 Chen B. Chen Z. Deng L. Duan Y. Zhou J. 2016 Building change detection with RGB-D map generated from UAV images Neurocomputing 208 350 364 10.1016/j.neucom.2015.11.118 Cooper, M. A. R. and Robson, S. (1990). High precision photogrammetric monitoring of the deformation of a steel bridge

Open access

Tolga Yuret

entirely of single-word keywords. There are not many technical terminologies that are unfamiliar to the layperson. The list is not dominated words used in life science fields. Therefore, this list has exactly the reverse properties as the best performing keywords. Table 5 Worst 30 performing words in terms of YK. spaces; sheep; dogs; Brazil; existence; cattle; law; injuries; cultivars; steel; equations; yield; education; Turkey; constituents; trauma; geometry; convergence; ceramics; waves; students; politics; alloys; fish; leaves; flows; spain; gender