Zobrazeno 1 - 10
of 14
pro vyhledávání: '"Ting-Fang Yen"'
Exploring Taiwanese Professors' English-Medium Instruction for Subject Courses Behavioral Intentions
Autor:
Ting-Fang Yen, 顏廷芳
104
Within the issues of SLA, the most controversial issue is that the subject courses using English- medium instruction (EMI). Does the students’ language proficiency meet their professional knowledge in practice? The purpose of this study we
Within the issues of SLA, the most controversial issue is that the subject courses using English- medium instruction (EMI). Does the students’ language proficiency meet their professional knowledge in practice? The purpose of this study we
Externí odkaz:
http://ndltd.ncl.edu.tw/handle/41053644209773354036
Publikováno v:
CCS
Android's fragmented ecosystem makes the delivery of security updates and OS upgrades cumbersome and complex. While Google initiated various projects such as Android One, Project Treble, and Project Mainline to address this problem, and other involve
Publikováno v:
eCrime
We demonstrate a vulnerability in existing content-based message filtering methods, showing how an attacker can use a simple obfuscator to modify any message to a homograph version of the same message, thereby avoiding digest and signature based dete
Autor:
Ting-Fang Yen, Markus Jakobsson
Publikováno v:
Understanding Social Engineering Based Scams ISBN: 9781493964550
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::564e5b477e919a640460ddb3cc786fd2
https://doi.org/10.1007/978-1-4939-6457-4_3
https://doi.org/10.1007/978-1-4939-6457-4_3
Publikováno v:
Understanding Social Engineering Based Scams ISBN: 9781493964550
Understanding Social Engineering Based Scams
Understanding Social Engineering Based Scams
In this chapter, we demonstrate a vulnerability in existing content-based message filtering methods, showing how an attacker can use a simple obfuscator to modify any message to a homograph version of the same message, thereby avoiding digest and sig
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::ebce45449f5edfd25c436dbfd59a4601
https://doi.org/10.1007/978-1-4939-6457-4_6
https://doi.org/10.1007/978-1-4939-6457-4_6
Publikováno v:
Computers & Security. 31:806-815
The ability to monetize domain names through resale or serving ad content has contributed to the rise of questionable practices in acquiring them, including domain-name speculation, tasting, and front running. In this paper, we perform one of the fir
Publikováno v:
DSN
Recent years have seen the rise of more sophisticated attacks including advanced persistent threats (APTs) which pose severe risks to organizations and governments by targeting confidential proprietary information. Additionally, new malware strains a
Publikováno v:
ACM Conference on Computer and Communications Security
We present an epidemiological study of malware encounters in a large, multi-national enterprise. Our data sets allow us to observe or infer not only malware presence on enterprise computers, but also malware entry points, network locations of the com
Autor:
William Robertson, Ari Juels, Alina Oprea, Kaan Onarlioglu, Ting-Fang Yen, Engin Kirda, Todd Leetham
Publikováno v:
ACSAC
As more and more Internet-based attacks arise, organizations are responding by deploying an assortment of security products that generate situational intelligence in the form of logs. These logs often contain high volumes of interesting and useful in
Autor:
Michael K. Reiter, Ting-Fang Yen
Publikováno v:
ICDCS
Peer-to-peer (P2P) substrates are now widely used for both file-sharing and botnet command-and-control. Despite the commonality of their substrates, we show that the different goals and circumstances of these applications give rise to behaviors that