Sciweavers

615 search results - page 93 / 123
» Frameworks for Securing Limited-Device Applications
Sort
View
KBSE
2005
IEEE
15 years 4 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
SIGMOD
2008
ACM
210views Database» more  SIGMOD 2008»
15 years 11 months ago
Private queries in location based services: anonymizers are not necessary
Mobile devices equipped with positioning capabilities (e.g., GPS) can ask location-dependent queries to Location Based Services (LBS). To protect privacy, the user location must n...
Gabriel Ghinita, Panos Kalnis, Ali Khoshgozaran, C...
85
Voted
DIMVA
2008
15 years 9 days ago
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks
Abstract. This paper focuses on defense mechanisms for cross-site scripting attacks, the top threat on web applications today. It is believed that input validation (or filtering) c...
Prithvi Bisht, V. N. Venkatakrishnan
WWW
2010
ACM
15 years 5 months ago
The social honeypot project: protecting online communities from spammers
We present the conceptual framework of the Social Honeypot Project for uncovering social spammers who target online communities and initial empirical results from Twitter and MySp...
Kyumin Lee, James Caverlee, Steve Webb
107
Voted
AVSS
2007
IEEE
15 years 5 months ago
Improved one-class SVM classifier for sounds classification
This paper proposes to apply optimized One-Class Support Vector Machines (1-SVMs) as a discriminative framework in order to address a specific audio classification problem. Firs...
Asma Rabaoui, Manuel Davy, Stéphane Rossign...