Empowering users against sidejacking attacks.
Ryan D. RileyNada Mohammed AliKholoud Saleh Al-SenaidiAisha Lahdan Al-KuwariPublished in: SIGCOMM (2010)
Keyphrases
- malicious users
- user interaction
- end users
- security risks
- user generated content
- injection attacks
- information sources
- user profiles
- user satisfaction
- user interface
- user experience
- recommendation systems
- information overload
- user requirements
- security protocols
- novice users
- anomaly detection
- social media
- recommender systems