Sciweavers

27 search results - page 1 / 6
» Monitoring and Diagnosing Malicious Attacks with Autonomic S...
Sort
View
ER
2009
Springer
106views Database» more  ER 2009»
13 years 11 months ago
Monitoring and Diagnosing Malicious Attacks with Autonomic Software
Vítor Estêvão Silva Souza, Joh...
ESSOS
2010
Springer
14 years 1 months ago
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests
Protecting users in the ubiquitous online world is becoming more and more important, as shown by web application security – or the lack thereof – making the mainstream news. On...
Philippe De Ryck, Lieven Desmet, Thomas Heyman, Fr...
HICSS
2009
IEEE
120views Biometrics» more  HICSS 2009»
13 years 11 months ago
Trapping Malicious Insiders in the SPDR Web
The insider threat has assumed increasing importance as our dependence on critical cyber information infrastructure has increased. In this paper we describe an approach for thwart...
J. Thomas Haigh, Steven A. Harp, Richard C. O'Brie...
TVLSI
2010
12 years 11 months ago
Architectural Enhancement and System Software Support for Program Code Integrity Monitoring in Application-Specific Instruction-
Program code in a computer system can be altered either by malicious security attacks or by various faults in microprocessors. At the instruction level, all code modifications are ...
Hai Lin, Yunsi Fei, Xuan Guan, Zhijie Jerry Shi
KBSE
2005
IEEE
13 years 10 months ago
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks
The use of web applications has become increasingly popular in our routine activities, such as reading the news, paying bills, and shopping on-line. As the availability of these s...
William G. J. Halfond, Alessandro Orso