Sciweavers

Share
8 search results - page 1 / 2
» How to Automatically and Accurately Sandbox Microsoft IIS
Sort
View
ACSAC
2006
IEEE
12 years 5 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
SIGMOD
2008
ACM
159views Database» more  SIGMOD 2008»
12 years 11 months ago
Bootstrapping pay-as-you-go data integration systems
Data integration systems offer a uniform interface to a set of data sources. Despite recent progress, setting up and maintaining a data integration application still requires sign...
Anish Das Sarma, Xin Dong, Alon Y. Halevy
GIS
2009
ACM
13 years 19 days ago
Spatio-Textual Spreadsheets: Geotagging via Spatial Coherence
The spatio-textual spreadsheet is a conventional spreadsheet where spatial attribute values are specified textually. Techniques are presented to automatically find the textually-s...
Hanan Samet, Jagan Sankaranarayanan, Jon Sperling,...
VLDB
2004
ACM
137views Database» more  VLDB 2004»
12 years 4 months ago
Schema-Free XQuery
The widespread adoption of XML holds out the promise that document structure can be exploited to specify precise database queries. However, the user may have only a limited knowle...
Yunyao Li, Cong Yu, H. V. Jagadish
SIGCOMM
2010
ACM
11 years 11 months ago
NetShield: massive semantics-based vulnerability signature matching for high-speed networks
Accuracy and speed are the two most important metrics for Network Intrusion Detection/Prevention Systems (NIDS/NIPSes). Due to emerging polymorphic attacks and the fact that in ma...
Zhichun Li, Gao Xia, Hongyu Gao, Yi Tang, Yan Chen...
books