Sciweavers

32 search results - page 5 / 7
» scam 2008
Sort
View
SCAM
2008
IEEE
13 years 12 months ago
An Empirical Study of Function Overloading in C++
The usefulness and usability of programming tools (for example, languages, libraries, and frameworks) may greatly impact programmer productivity and software quality. Ideally, the...
Cheng Wang, Daqing Hou
SCAM
2008
IEEE
13 years 12 months ago
Automatic Determination of May/Must Set Usage in Data-Flow Analysis
Data-flow analysis is a common technique to gather program information for use in transformations such as register allocation, dead-code elimination, common subexpression elimina...
Andrew Stone, Michelle Strout, Shweta Behere
SCAM
2008
IEEE
13 years 12 months ago
Some Assembly Required - Program Analysis of Embedded System Code
Programming embedded system software typically involves more than one programming language. Normally, a high-level language such as C/C++ is used for application oriented tasks an...
Ansgar Fehnker, Ralf Huuck, Felix Rauch, Sean Seef...
DIMVA
2008
13 years 7 months ago
FluXOR: Detecting and Monitoring Fast-Flux Service Networks
Botnets are large groups of compromised machines (bots) used by miscreants for the most illegal activities (e.g., sending spam emails, denial-of-service attacks, phishing and other...
Emanuele Passerini, Roberto Paleari, Lorenzo Marti...
TOIT
2008
92views more  TOIT 2008»
13 years 5 months ago
Security and identification indicators for browsers against spoofing and phishing attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages...
Amir Herzberg, Ahmad Jbara