Sciweavers

2006 search results - page 297 / 402
» Instrumenting the Dynamic Web
Sort
View
TISSEC
2008
100views more  TISSEC 2008»
15 years 4 months ago
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification
Overlay multicast networks are used by service providers to distribute contents such as web pages, streaming multimedia data, or security updates to a large number of users. Howeve...
Liang Xie, Sencun Zhu
CCS
2009
ACM
16 years 5 months ago
Lightweight self-protecting JavaScript
This paper introduces a method to control JavaScript execution. The aim is to prevent or modify inappropriate behaviour caused by e.g. malicious injected scripts or poorly designe...
Phu H. Phung, David Sands, Andrey Chudnov

Lab
1058views
16 years 1 months ago
UP Electrical and Electronics Engineering Institute
The Institute's mission is to produce excellent, innovative and nationalistic engineers and to advance the field of electrical and electronics engineering. The undergr...
160
Voted
TMA
2010
Springer
314views Management» more  TMA 2010»
15 years 11 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
IPPS
2008
IEEE
15 years 11 months ago
A modeling approach for estimating execution time of long-running scientific applications
In a Grid computing environment, resources are shared among a large number of applications. Brokers and schedulers find matching resources and schedule the execution of the applic...
Seyed Masoud Sadjadi, Shu Shimizu, Javier Figueroa...