127
click to vote
ESORICS
16 years 2 months ago
2009 Springer
Cross-site scripting (XSS) vulnerabilities make it possible for worms to spread quickly to a broad range of users on popular Web sites. To date, the detection of XSS worms has been...
153
click to vote
CCS
16 years 2 months ago
2009 ACM
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
115
click to vote
CCS
16 years 2 months ago
2009 ACM
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
110
click to vote
ESORICS
16 years 2 months ago
2009 Springer
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
|