Sciweavers

8 search results - page 1 / 2
» A Principled Approach for ROP Defense
Sort
View
JETAI
2008
116views more  JETAI 2008»
13 years 4 months ago
SAL: an explicitly pluralistic cognitive architecture
gle level of abstraction cannot capture the required richness of behavior. In this paper, we offer a brief principled defense of epistemological pluralism in cognitive science and ...
David J. Jilk, Christian Lebiere, Randall C. O'Rei...
NDSS
2009
IEEE
13 years 11 months ago
Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense
Cross-site scripting (or XSS) has been the most dominant class of web vulnerabilities in 2007. The main underlying reason for XSS vulnerabilities is that web markup and client-sid...
Yacin Nadji, Prateek Saxena, Dawn Song
ESORICS
2004
Springer
13 years 9 months ago
Redundancy and Diversity in Security
Redundancy and diversity are commonly applied principles for fault tolerance against accidental faults. Their use in security, which is attracting increasing interest, is less gene...
Bev Littlewood, Lorenzo Strigini
COMSIS
2006
141views more  COMSIS 2006»
13 years 4 months ago
Common Web Application Attack Types and Security Using ASP.NET
Web applications security is one of the most daunting tasks today, because of security shift from lower levels of ISO OSI model to application level, and because of current situati...
Bojan Jovicic, Dejan Simic
ICIP
2006
IEEE
14 years 6 months ago
Phase Distortion Correction for See-Through-The-Wall Imaging Radar
See Through The Wall (STTW) applications have become of high importance to law enforcement, homeland security and defense needs. In this work surface penetrating radar is simulate...
Jay A. Marble, Alfred O. Hero