Sciweavers

26 search results - page 5 / 6
» Toward Automated Detection of Logic Vulnerabilities in Web A...
Sort
View
USS
2008
13 years 7 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
DBSEC
2008
188views Database» more  DBSEC 2008»
13 years 6 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
CGF
2004
118views more  CGF 2004»
13 years 4 months ago
Cultural Heritage Preservation Using Constructive Shape Modeling
Issues of digital preservation of shapes and internal structures of historical cultural objects are discussed. An overview of existing approaches to digital preservation related t...
Carl Vilbrandt, Galina Pasko, Alexander A. Pasko, ...
CBMS
2006
IEEE
13 years 11 months ago
Technology for Medical Education, Research, and Disease Screening by Exploitation of Biomarkers in a Large Collection of Uterine
The Communications Engineering Branch of the National Library of Medicine is collaborating with the National Cancer Institute (NCI) in developing applications for medical educatio...
L. Rodney Long, Sameer Antani, Jose Jeronimo, Mark...
TIME
2008
IEEE
13 years 11 months ago
Time Aware Mining of Itemsets
Frequent behavioural pattern mining is a very important topic of knowledge discovery, intended to extract correlations between items recorded in large databases or Web acces logs....
Bashar Saleh, Florent Masseglia