Sciweavers

425 search results - page 8 / 85
» GUI Evaluation Through Web
Sort
View
RAID
2005
Springer
15 years 5 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe
73
Voted
CN
1998
54views more  CN 1998»
14 years 11 months ago
Efficient Crawling Through URL Ordering
In this paper we study in what order a crawler should visit the URLs it has seen, in order to obtain more "important" pages first. Obtaining important pages rapidly can ...
Junghoo Cho, Hector Garcia-Molina, Lawrence Page
WWW
2005
ACM
16 years 11 days ago
Interactive web-wrapper construction for extracting relational information from web documents
In this paper, we propose a new user interface to interactively specify Web wrappers to extract relational information from Web documents. In this study, we focused on improving u...
Tsuyoshi Sugibuchi, Yuzuru Tanaka
COMPSAC
2004
IEEE
15 years 3 months ago
Web Application Bypass Testing
Input validation refers to checking user inputs to a program to ensure that they conform to expectations of the program. Input validation is used to check the format of numbers and...
Jeff Offutt, Ye Wu, Xiaochen Du, Hong Huang
AND
2010
14 years 9 months ago
Statement map: reducing web information credibility noise through opinion classification
On the Internet, users often encounter noise in the form of spelling errors or unknown words, however, dishonest, unreliable, or biased information also acts as noise that makes i...
Koji Murakami, Eric Nichols, Junta Mizuno, Yotaro ...