Sciweavers

2084 search results - page 242 / 417
» Knowledge Exploitation from the Web
Sort
View
ESORICS
2006
Springer
15 years 4 months ago
SessionSafe: Implementing XSS Immune Session Handling
With the growing trend towards the use of web applications the danger posed by cross site scripting vulnerabilities gains severity. The most serious threats resulting from cross si...
Martin Johns
84
Voted
TOIT
2008
92views more  TOIT 2008»
15 years 15 days ago
Security and identification indicators for browsers against spoofing and phishing attacks
In spite of the use of standard web security measures (SSL/TLS), users enter sensitive information such as passwords into scam web sites. Such scam sites cause substantial damages...
Amir Herzberg, Ahmad Jbara
105
Voted
SEMWEB
2010
Springer
14 years 10 months ago
Summary Models for Routing Keywords to Linked Data Sources
The proliferation of linked data on the Web paves the way to a new generation of applications that exploit heterogeneous data from different sources. However, because this Web of d...
Thanh Tran, Lei Zhang, Rudi Studer
125
Voted
PET
2007
Springer
15 years 6 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
106
Voted
ECIR
2008
Springer
15 years 2 months ago
The Importance of Link Evidence in Wikipedia
Wikipedia is one of the most popular information sources on the Web. The free encyclopedia is densely linked. The link structure in Wikipedia differs from the Web at large: interna...
Jaap Kamps, Marijn Koolen