Sciweavers

48 search results - page 9 / 10
» Application layer intrusion detection for SQL injection
Sort
View
SOSP
2009
ACM
14 years 2 months ago
Improving application security with data flow assertions
RESIN is a new language runtime that helps prevent security vulnerabilities, by allowing programmers to specify application-level data flow assertions. RESIN provides policy obje...
Alexander Yip, Xi Wang, Nickolai Zeldovich, M. Fra...
CNSR
2008
IEEE
189views Communications» more  CNSR 2008»
13 years 11 months ago
Secure Health Monitoring Network against Denial-Of-Service Attacks Using Cognitive Intelligence
Secure and energy efficient transmission is a main concern in many wireless sensor network applications. In this paper, two types of denial-of-service attacks that affect the rout...
Rajani Muraleedharan, Lisa Ann Osadciw
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 9 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ICNS
2009
IEEE
13 years 12 months ago
Advanced Hash Algorithms with Key Bits Duplication for IP Address Lookup
Hashing technique have been widely adopted for various computer network applications such as IP address lookup and intrusion detection, among which XOR-hashing is one of most popu...
Christopher J. Martinez, Wei-Ming Lin
ICIC
2009
Springer
13 years 11 months ago
Ontology-Based Decision Support for Security Management in Heterogeneous Networks
Abstract. In this paper our original methodology of applying ontologybased logic into decision support system for security management in heterogeneous networks is presented. Such d...
Michal Choras, Rafal Kozik, Adam Flizikowski, Rafa...