Sciweavers

627 search results - page 116 / 126
» Performance Monitoring of N-tier Client Server Systems
Sort
View
SAC
2009
ACM
15 years 6 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
NDSS
2005
IEEE
15 years 5 months ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...
101
Voted
TISSEC
2010
119views more  TISSEC 2010»
14 years 6 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
MOBIHOC
2003
ACM
15 years 11 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra
ICIP
1998
IEEE
16 years 1 months ago
Reversing Motion Vector Fields
With the popular use of digital video (VCD, DVD, video conferencing, digital broadcasting system, digital TV and video editing), video streaming technology becomes much more impor...
Susie J. Wee