Sciweavers

87 search results - page 11 / 18
» Publicly Detectable Techniques for the Protection of Virtual...
Sort
View
WWW
2010
ACM
15 years 4 months ago
Detection and analysis of drive-by-download attacks and malicious JavaScript code
JavaScript is a browser scripting language that allows developers to create sophisticated client-side interfaces for web applications. However, JavaScript code is also used to car...
Marco Cova, Christopher Krügel, Giovanni Vign...
MICCAI
2001
Springer
15 years 2 months ago
A Microsurgery Simulation System
Computer systems for surgical planning and training are poised to greatly impact the traditional versions of these tasks. These systems provide an opportunity to learn surgical tec...
Joel Brown, Kevin Montgomery, Jean-Claude Latombe,...
TOG
2008
92views more  TOG 2008»
14 years 9 months ago
Non-homogeneous resizing of complex models
Resizing of 3D models can be very useful when creating new models or placing models inside different scenes. However, uniform scaling is limited in its applicability while straigh...
Vladislav Kraevoy, Alla Sheffer, Ariel Shamir, Dan...
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 3 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
CCS
2009
ACM
15 years 4 months ago
Behavior based software theft detection
Along with the burst of open source projects, software theft (or plagiarism) has become a very serious threat to the healthiness of software industry. Software birthmark, which re...
Xinran Wang, Yoon-chan Jhi, Sencun Zhu, Peng Liu