Sciweavers

2237 search results - page 321 / 448
» On the Security of Random Sources
Sort
View
OOPSLA
1997
Springer
15 years 2 months ago
Parasitic Methods: An Implementation of Multi-Methods for Java
In an object-oriented programming language, method selection is (usually) done at run-time using the class of the receiver. Some object-orientedlanguages(such as CLOS) have multi-...
John Boyland, Giuseppe Castagna
ICDCS
2010
IEEE
15 years 1 months ago
ESCUDO: A Fine-Grained Protection Model for Web Browsers
Web applications are no longer simple hyperlinked documents. They have progressively evolved to become highly complex—web pages combine content from several sources (with varyin...
Karthick Jayaraman, Wenliang Du, Balamurugan Rajag...
ACSAC
2004
IEEE
15 years 1 months ago
Worm Detection, Early Warning and Response Based on Local Victim Information
Worm detection systems have traditionally focused on global strategies. In the absence of a global worm detection system, we examine the effectiveness of local worm detection and ...
Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David D...
ACSAC
2004
IEEE
15 years 1 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
ACSAC
2001
IEEE
15 years 1 months ago
Genoa TIE, Advanced Boundary Controller Experiment
This document describes experimentation performed as part of the Genoa Technology Integration Experiment (TIE). Achieved in two phases, the overarching assertion of the Genoa TIE ...
Eric Monteith