Sciweavers

641 search results - page 29 / 129
» Implementation and use of the PLT scheme Web server
Sort
View
96
Voted
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
ESORICS
2006
Springer
15 years 1 months ago
SessionSafe: Implementing XSS Immune Session Handling
With the growing trend towards the use of web applications the danger posed by cross site scripting vulnerabilities gains severity. The most serious threats resulting from cross si...
Martin Johns
74
Voted
ICDE
2006
IEEE
133views Database» more  ICDE 2006»
15 years 3 months ago
A New Approach for Reactive Web Usage Data Processing
— Web usage mining exploits data mining techniques to discover valuable information from navigation behavior of World Wide Web (WWW) users. The required information is captured b...
Murat Ali Bayir, Ismail Hakki Toroslu, Ahmet Cosar
PDIS
1996
IEEE
15 years 1 months ago
Querying the World Wide Web
The World Wide Web is a large, heterogeneous, distributedcollectionof documents connected by hypertext links. The most common technologycurrently used for searching the Web depend...
Alberto O. Mendelzon, George A. Mihaila, Tova Milo
EUROPAR
2004
Springer
15 years 3 months ago
Accelerating Apache Farms Through Ad-HOC Distributed Scalable Object Repository
We present hoc: a fast, scalable object repository providing programmers with a general storage module. hoc may be used to implement DSMs as well as distributed cache subsystems. h...
Marco Aldinucci, Massimo Torquati