119
Voted
ESORICS
16 years 1 months ago
2009 Springer
Cross-site scripting (XSS) vulnerabilities make it possible for worms to spread quickly to a broad range of users on popular Web sites. To date, the detection of XSS worms has been...
142
click to vote
CCS
16 years 1 months ago
2009 ACM
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
101
click to vote
CCS
16 years 1 months ago
2009 ACM
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
100
click to vote
ESORICS
16 years 1 months ago
2009 Springer
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
|