Sciweavers

1011 search results - page 109 / 203
» Exception Analysis for Java
Sort
View
115
Voted
DIMVA
2010
15 years 3 months ago
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners
Black-box web vulnerability scanners are a class of tools that can be used to identify security issues in web applications. These tools are often marketed as "point-and-click ...
Adam Doupé, Marco Cova, Giovanni Vigna
ECR
2006
107views more  ECR 2006»
15 years 2 months ago
Software watermarking via opaque predicates: Implementation, analysis, and attacks
Within the software industry software piracy is a great concern. In this article we address this issue through a prevention technique called software watermarking. Depending on ho...
Ginger Myles, Christian S. Collberg
JOT
2007
102views more  JOT 2007»
15 years 2 months ago
Type Access Analysis: Towards Informed Interface Design
Programs designed from scratch often start with just a set of classes. Classes can be instantiated and so deliver the objects that are the carriers of information and function. In...
Friedrich Steimann, Philip Mayer
SCAM
2007
IEEE
15 years 8 months ago
Extending Attribute Grammars with Collection Attributes--Evaluation and Applications
Collection attributes, as defined by Boyland, can be used as a mechanism for concisely specifying cross-referencelike properties such as callee sets, subclass sets, and sets of v...
Eva Magnusson, Torbjörn Ekman, Görel Hed...
SIAMAM
2002
102views more  SIAMAM 2002»
15 years 1 months ago
Relaxation Oscillations in a Class of Delay Differential Equations
We study a class of delay differential equations which have been used to model hematological stem cell regulation and dynamics. Under certain circumstances the model exhibits self-...
A. C. Fowler, Michael C. Mackey