Sciweavers

3099 search results - page 136 / 620
» Generating Web Monitors
Sort
View
86
Voted
ISSRE
2008
IEEE
15 years 4 months ago
Automated Fix Generator for SQL Injection Attacks
A critical problem facing today’s internet community is the increasing number of attacks exploiting flaws found in Web applications. This paper specifically targets input valida...
Fred Dysart, Mark Sherriff
VIZSEC
2007
Springer
15 years 4 months ago
Visualization of Host Behavior for Network Security
Monitoring host behavior in a network is one of the most essential tasks in the fields of network monitoring and security since more and more malicious code in the wild internet c...
F. Mansman, L. Meier, Daniel A. Keim
HICSS
2006
IEEE
127views Biometrics» more  HICSS 2006»
15 years 4 months ago
Processing of Data Streams with Prediction Functions
Networks of sensors arise naturally in many different fields, from industrial applications (e.g., monitoring of environmental parameters in a chemical plant) to surveillance appl...
Sergio Ilarri, Ouri Wolfson, Eduardo Mena, Arantza...
JSCIC
2006
92views more  JSCIC 2006»
14 years 10 months ago
Moving Mesh Discontinuous Galerkin Method for Hyperbolic Conservation Laws
In this paper, a moving mesh discontinuous Galerkin (DG) method is developed to solve the nonlinear conservation laws. In the mesh adaptation part, two issues have received much a...
Ruo Li, Tao Tang
SAC
2011
ACM
14 years 28 days ago
Secure shared continuous query processing
Data stream management systems (DSMSs) process continuous queries over streaming data in real-time adhering to quality of service requirements. The data streams generated from sen...
Raman Adaikkalavan, Thomas Perez