Sciweavers

962 search results - page 121 / 193
» Input validation analysis and testing
Sort
View
TEC
2002
89views more  TEC 2002»
14 years 11 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
JORS
2011
62views more  JORS 2011»
14 years 2 months ago
Cost allocation in the establishment of a collaborative transportation agreement - an application in the furniture industry
: Transportation is an important part of the Canadian furniture industry supply chain. Even though there are often several manufacturers shipping in the same market region, coordin...
Jean-François Audy, Sophie D'Amours, L.-M. ...
ASWEC
2006
IEEE
15 years 6 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 5 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
WSC
2000
15 years 1 months ago
Tire model for simulations of vehicle motion on high and low friction road surfaces
An on-road analytical tire model has been developed to predict tire forces and moments at the tire/road interface. The model is computationally efficient and it only requires a li...
James Lacombe