The defense in-depth approach to the protection for browsing users against drive-by cache attacks.
Yeu-Pong LaiWei-Feng WuPublished in: Secur. Commun. Networks (2015)
Keyphrases
- user interaction
- query formulation
- malicious users
- user interface
- recommender systems
- helping users
- end users
- multiple users
- faceted search
- countermeasures
- user profiles
- web browsing
- web searching
- visual interface
- protection scheme
- information leakage
- injection attacks
- browsing experience
- social networks
- security risks
- data access
- information security
- main memory
- intrusion detection
- collaborative filtering
- social media
- website