Sciweavers

4307 search results - page 430 / 862
» Dynamic Spyware Analysis
Sort
View
165
Voted
SENSYS
2004
ACM
15 years 10 months ago
An analysis of a large scale habitat monitoring application
Habitat and environmental monitoring is a driving application for wireless sensor networks. We present an analysis of data from a second generation sensor networks deployed during...
Robert Szewczyk, Alan M. Mainwaring, Joseph Polast...
155
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 6 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
BMCBI
2006
178views more  BMCBI 2006»
15 years 4 months ago
GOLEM: an interactive graph-based gene-ontology navigation and analysis tool
Background: The Gene Ontology has become an extremely useful tool for the analysis of genomic data and structuring of biological knowledge. Several excellent software tools for na...
Rachel S. G. Sealfon, Matthew A. Hibbs, Curtis Hut...
128
Voted
WWW
2006
ACM
16 years 5 months ago
Analysis of WWW traffic in Cambodia and Ghana
In this paper we present an analysis of HTTP traffic captured from Internet caf?es and kiosks from two different developing countries ? Cambodia and Ghana. This paper has two main...
Bowei Du, Michael J. Demmer, Eric A. Brewer
161
Voted
WWW
2010
ACM
15 years 11 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...