Sciweavers

5948 search results - page 290 / 1190
» Computing Robust Counter-Strategies
Sort
View
CCS
2008
ACM
15 years 6 months ago
Robust defenses for cross-site request forgery
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges...
Adam Barth, Collin Jackson, John C. Mitchell
ATAL
2010
Springer
15 years 5 months ago
ALIVE: an agent-based framework for dynamic and robust service-oriented applications
Service-oriented systems are becoming more and more nodes in a digital, dynamic ecosystem requiring the identification and establishment of flexible, spontaneous collaboration act...
Javier Vázquez-Salceda, Wamberto Weber Vasc...
SMA
2010
ACM
231views Solid Modeling» more  SMA 2010»
15 years 4 months ago
Fast and robust retrieval of Minkowski sums of rotating convex polyhedra in 3-space
We present a novel method for fast retrieval of exact Minkowski sums of pairs of convex polytopes in R3 , where one of the polytopes keeps rotating. The algorithm is based on pre-...
Naama Mayer, Efi Fogel, Dan Halperin
ESORICS
2010
Springer
15 years 4 months ago
D(e|i)aling with VoIP: Robust Prevention of DIAL Attacks
We carry out attacks using Internet services that aim to keep telephone devices busy, hindering legitimate callers from gaining access. We use the term DIAL (Digitally Initiated A...
Alexandros Kapravelos, Iasonas Polakis, Elias Atha...
PR
2008
141views more  PR 2008»
15 years 4 months ago
Robust and efficient multiclass SVM models for phrase pattern recognition
Phrase pattern recognition (phrase chunking) refers to automatic approaches for identifying predefined phrase structures in a stream of text. Support vector machines (SVMs)-based ...
Yu-Chieh Wu, Yue-Shi Lee, Jie-Chi Yang