This paper explores online learning approaches for detecting malicious Web sites (those involved in criminal scams) using lexical and host-based features of the associated URLs. W...
Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffr...
Cross-site Scripting (XSS) has emerged to one of the most prevalent type of security vulnerabilities. While the reason for the vulnerability primarily lies on the serverside, the ...
To reduce cloud system resource cost, application consolidation is a must. In this paper, we present a novel patterndriven application consolidation (PAC) system to achieve efficie...
The Home Network is a pervasive environment by nature. Its openness to dynamic distributed and heterogeneous devices brings great challenges in home application design. We present...
— In this paper, we present a design for a generic, open, application-oriented performance instrumentation of multitier applications. Measurements are performed through configur...
Markus Schmid, Marcus Thoss, Thomas Termin, Reinho...