Sciweavers

47 search results - page 3 / 10
» On the vulnerability of face verification systems to hill-cl...
Sort
View
ICSE
2008
IEEE-ACM
15 years 10 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
WWW
2005
ACM
15 years 10 months ago
Hardening Web browsers against man-in-the-middle and eavesdropping attacks
Existing Web browsers handle security errors in a manner that often confuses users. In particular, when a user visits a secure site whose certificate the browser cannot verify, th...
José Carlos Brustoloni, Xia Brustoloni
JSW
2008
98views more  JSW 2008»
14 years 9 months ago
Towards a Collaborative and Systematic Approach to Alert Verification
With the menace of hackers increasing every day, even well administrated networks are vulnerable to attack. Therefore, securing network assets has become a significant issue for th...
Xuejiao Liu, Debao Xiao, Xi Peng
ICIAR
2009
Springer
14 years 7 months ago
Score Level Fusion of Ear and Face Local 3D Features for Fast and Expression-Invariant Human Recognition
Abstract. Increasing risks of spoof attacks and other common problems of unimodal biometric systems such as intra-class variations, nonuniversality and noisy data necessitate the u...
Syed M. S. Islam, Mohammed Bennamoun, Ajmal S. Mia...
67
Voted
ISSA
2004
14 years 11 months ago
Run-Time Protocol Conformance Verification In Firewalls
Today, business continuity depends significantly on the continuous availability of information systems. It is well-known that such systems must be protected against intrusion and ...
Ulrich Ultes-Nitsche