Sciweavers

6574 search results - page 136 / 1315
» Current Signatures: Application
Sort
View
CCS
2003
ACM
15 years 10 months ago
Anomaly detection of web-based attacks
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect known web-based attacks, misuse detection systems are ...
Christopher Krügel, Giovanni Vigna
CONCUR
2010
Springer
15 years 6 months ago
A Theory of Design-by-Contract for Distributed Multiparty Interactions
Reliability is a critical issue in many multi-organizational distributed applications, be they web services, financial protocols, scientific computing infrastructure, and software ...
Laura Bocchi, Kohei Honda, Emilio Tuosto, Nobuko Y...
IJISEC
2006
106views more  IJISEC 2006»
15 years 5 months ago
Execution transactions for defending against software failures: use and evaluation
We examine the problem of containing buffer overflow attacks in a safe and efficient manner. Briefly, we automatically augment source code to dynamically catch stack and heap-based...
Stelios Sidiroglou, Angelos D. Keromytis
HPDC
2006
IEEE
15 years 11 months ago
Path Grammar Guided Trace Compression and Trace Approximation
Trace-driven simulation is an important technique used in the evaluation of computer architecture innovations. However using it for studying parallel computers and applications is...
Xiaofeng Gao, Allan Snavely, Larry Carter
CAISE
2006
Springer
15 years 8 months ago
An Architecture for a Semantic Portal
Abstract. Current Web applications provide their information and functionalities to human users only. To make Web applications also accessible for machines, the Semantic Web propos...
Gerald Reif, Harald Gall