Sciweavers

1629 search results - page 213 / 326
» Infeasible Code Detection
Sort
View
SAC
2009
ACM
15 years 8 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
CRYPTO
2000
Springer
133views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
Sequential Traitor Tracing
Traceability schemes allow detection of at least one traitor when a group of colluders attempt to construct a pirate decoder and gain illegal access to digital content. Fiat and Ta...
Reihaneh Safavi-Naini, Yejing Wang
BMCBI
2008
114views more  BMCBI 2008»
15 years 1 months ago
WSPMaker: a web tool for calculating selection pressure in proteins and domains using window-sliding
Background: In the study of adaptive evolution, it is important to detect the protein coding sites where natural selection is acting. In general, the ratio of the rate of non-syno...
Yong Seok Lee, Tae-Hyung Kim, Tae-Wook Kang, Won-H...
CORR
2010
Springer
79views Education» more  CORR 2010»
15 years 1 months ago
A Multi-hop Multi-source Algebraic Watchdog
In our previous work (`An Algebraic Watchdog for Wireless Network Coding'), we proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police th...
MinJi Kim, Muriel Médard, João Barro...
ICST
2010
IEEE
15 years 1 days ago
(Un-)Covering Equivalent Mutants
—Mutation testing measures the adequacy of a test suite by seeding artificial defects (mutations) into a program. If a test suite fails to detect a mutation, it may also fail to...
David Schuler, Andreas Zeller