Sciweavers

518 search results - page 46 / 104
» Abstract Interpretation-Based Protection
Sort
View
120
Voted
CCS
2010
ACM
15 years 1 months ago
TAPS: automatically preparing safe SQL queries
We present the first sound program transformation approach for automatically transforming the code of a legacy web application to employ PREPARE statements in place of unsafe SQL...
Prithvi Bisht, A. Prasad Sistla, V. N. Venkatakris...
131
Voted
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
15 years 16 days ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
106
Voted
IJBIS
2010
94views more  IJBIS 2010»
14 years 11 months ago
A framework towards a multi-modal fingerprinting scheme for multimedia assets
Fingerprinting is a well known approach for identifying multimedia data without having the original data present but what amounts to its essence or "DNA". Current approa...
Atta Badii, Daniel Thiemert
SIGADA
2005
Springer
15 years 8 months ago
The implementation of ada 2005 synchronized interfaces in the GNAT compiler
One of the most important object-oriented features of the new revision of the Ada Programming Language is the introof Abstract Interfaces to provide a form of multiple nce. Ada 20...
Javier Miranda, Edmond Schonberg, Hristian Kirtche...
122
Voted
ACSAC
2000
IEEE
15 years 7 months ago
Virtual Enterprise Networks: The Next Generation of Secure Enterprise Networking
We present a vision of computing environments in which enterprise networks are built using untrusted public infrastructures. The vision allows for networks to dynamically change d...
Germano Caronni, S. Kumar, Christoph L. Schuba, Gl...