Sciweavers

2 search results - page 1 / 1
» FlowWatcher: Defending against Data Disclosure Vulnerabiliti...
Sort
View
USS
2010
13 years 2 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
CCS
2003
ACM
13 years 10 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna