Sciweavers

80 search results - page 16 / 16
» Static analysis of active XML systems
Sort
View
BIRTHDAY
2011
Springer
12 years 5 months ago
Algorithmic Aspects of Risk Management
Abstract. Risk analysis has been used to manage the security of systems for several decades. However, its use has been limited to offline risk computation and manual response. In c...
Ashish Gehani, Lee Zaniewski, K. Subramani
CMS
2010
150views Communications» more  CMS 2010»
13 years 5 months ago
Throwing a MonkeyWrench into Web Attackers Plans
Abstract. Client-based attacks on internet users with malicious web pages represent a serious and rising threat. Internet Browsers with enabled active content technologies such as ...
Armin Büscher, Michael Meier, Ralf Benzmü...
SIGSOFT
2005
ACM
14 years 6 months ago
Automatic generation of suggestions for program investigation
Before performing a modification task, a developer usually has to investigate the source code of a system to understand how to carry out the task. Discovering the code relevant to...
Martin P. Robillard
SIGSOFT
2003
ACM
14 years 6 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
CVIU
2007
137views more  CVIU 2007»
13 years 5 months ago
Visual learning of texture descriptors for facial expression recognition in thermal imagery
Facial expression recognition is an active research area that finds a potential application in human emotion analysis. This work presents an illumination independent approach for...
Benjamín Hernández, Gustavo Olague, ...