- Full text PDF available (11)
- This year (0)
- Last 5 years (0)
- Last 10 years (8)
Journals and Conferences
A striking result of Bouc gives the decomposition of the representation of the symmetric group on the homology of the matching complex into irreducibles that are self-conjugate. We show how the combinatorial Laplacian can be used to give an elegant proof of this result. We also show that the spectrum of the Laplacian is integral.
To protect users from phishing attacks system designers and security professionals need to understand how users interact with those attacks and be able to predict userspsila behaviours in a given situation. In this paper we introduce the first model to visualise user-phishing interaction. We present a method to accurately describe userspsila perceptions in… (More)
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach to detect phishing websites based on analysis of userspsila online behaviours - i.e., the websites users have visited, and the data users have submitted to those websites. Such user behaviours can not be… (More)
Phishing detection systems are principally based on the analysis of data moving from phishers to victims. In this paper we describe a novel approach for detecting phishing websites based on analysis of users’ online behaviours— i.e., the websites users have visited, and the data users have submitted to those websites. Such user behaviours can not be… (More)
Zaslavsky conjectures that the bounded complex of a simple hyperplane arrangement is homeomorphic to a ball. We prove this conjecture for the more general uniform affine oriented matroids.
An affine projection π : P p → Qq of convex polytopes induces an inclusion map of the face posets i : F(Q) → F(P ). We define an order-preserving map of posets h : F(P ) → Suspp−qF(Q) such that for any filter J of Suspp−qF(Q), the map h restricts to a homotopy equivalence between the order complexes of h−1(J) and J . As applications we prove (1) A… (More)
User authentication can be compromised both by subverting the system and by subverting the user; the threat modelling of the former is well studied, the latter less so. We propose a method to determine opportunities to subvert the user allowing vulnerabilities to be systematically identified. The method is applied to VeriSign’s OpenID authentication… (More)
It is well known that the time average or the center of mass for generic orbits of the standard tent map is 0.5. In this paper we show some interesting properties of the exceptional orbits, including periodic orbits, orbits without mass center, and orbits with mass centers different from 0.5. We prove that for any positive integer n, there exist n distinct… (More)