Sciweavers

6164 search results - page 1045 / 1233
» Teaching Computer Security
Sort
View
RAID
2009
Springer
15 years 10 months ago
Protecting a Moving Target: Addressing Web Application Concept Drift
Because of the ad hoc nature of web applications, intrusion detection systems that leverage machine learning techniques are particularly well-suited for protecting websites. The re...
Federico Maggi, William K. Robertson, Christopher ...
130
Voted
TLCA
2009
Springer
15 years 10 months ago
Lexicographic Path Induction
Abstract. Programming languages theory is full of problems that reduce to proving the consistency of a logic, such as the normalization of typed lambda-calculi, the decidability of...
Jeffrey Sarnat, Carsten Schürmann
DEBS
2009
ACM
15 years 10 months ago
PrivateFlow: decentralised information flow control in event based middleware
Complex middleware frameworks are made out of interacting components which may include bugs. These frameworks are often extended to provide additional features by thirdparty exten...
Ioannis Papagiannis, Matteo Migliavacca, Peter R. ...
110
Voted
SIGCOMM
2009
ACM
15 years 10 months ago
Diverter: a new approach to networking within virtualized infrastructures
As virtualized data-centres become the back-end platforms behind a new generation of utility and cloud computing infrastructures (such as AmazonAWS [1]) their multi-tenancy, scale...
Aled Edwards, Anna Fischer, Antonio Lain
APSCC
2008
IEEE
15 years 10 months ago
Design of MyServer: A Residential Server in Smart Home Systems
This paper addresses the design and implementtation of a residential gateway: MyServer, which is to provide services regarding home security, inventory tracking, facility manageme...
Wei-Chung Teng, Yu-Chun Pao, Sheng-Luen Chung
« Prev « First page 1045 / 1233 Last » Next »