Sciweavers

289 search results - page 29 / 58
» A document-based approach to the generation of web applicati...
Sort
View
NDSS
2006
IEEE
15 years 5 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
DIMVA
2006
15 years 1 months ago
Using Static Program Analysis to Aid Intrusion Detection
Abstract. The Internet, and in particular the world-wide web, have become part of the everyday life of millions of people. With the growth of the web, the demand for on-line servic...
Manuel Egele, Martin Szydlowski, Engin Kirda, Chri...
GIS
2008
ACM
16 years 24 days ago
Mapping geographic coverage of the web
In this paper, we describe a methodology to estimate the geographic coverage of the web without the need for secondary knowledge or complex geo-tagging. This is achieved by random...
Robert Pasley, Paul Clough, Ross S. Purves, Floria...
IJCAT
2010
132views more  IJCAT 2010»
14 years 10 months ago
Using weaving models to automate model-driven web engineering proposals
The impact of Model-Driven Software Development in Web Engineering has given raise to the advent of Model-Driven Web Engineering, a new approach for Web Information Systems develop...
Juan M. Vara, Valeria de Castro, Marcos Didonet De...
EDBT
2009
ACM
144views Database» more  EDBT 2009»
15 years 3 months ago
Efficient maintenance techniques for views over active documents
Many Web applications are based on dynamic interactions between Web components exchanging flows of information. Such a situation arises for instance in mashup systems or when moni...
Serge Abiteboul, Pierre Bourhis, Bogdan Marinoiu