Sciweavers

495 search results - page 96 / 99
» MASC - Monitoring and Security of Containers
Sort
View
ESEC
1999
Springer
15 years 2 months ago
FACADE: A Typed Intermediate Language Dedicated to Smart Cards
The use of smart cards to run software modules on demand has become a major business concern for application issuers. Such downloadable executable content requires to be trusted by...
Gilles Grimaud, Jean-Louis Lanet, Jean-Jacques Van...
ECBS
1996
IEEE
127views Hardware» more  ECBS 1996»
15 years 2 months ago
Domain Engineering: The Challenge, Status, and Trends
Naval Surface Warfare Center Dahlgren Division; under joint sponsorship of the Office of Naval Research; the Naval Command, Control, and Ocean Surveillance Center; and the Naval S...
Stephanie White, Michael Edwards
SIGIR
2010
ACM
15 years 2 months ago
Uncovering social spammers: social honeypots + machine learning
Web-based social systems enable new community-based opportunities for participants to engage, share, and interact. This community value and related services like search and advert...
Kyumin Lee, James Caverlee, Steve Webb
DSN
2004
IEEE
15 years 1 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
DATE
2006
IEEE
95views Hardware» more  DATE 2006»
15 years 1 months ago
Satisfiability-based framework for enabling side-channel attacks on cryptographic software
- Many electronic systems contain implementations of cryptographic algorithms in order to provide security. It is well known that cryptographic algorithms, irrespective of their th...
Nachiketh R. Potlapally, Anand Raghunathan, Srivat...