Sciweavers

26 search results - page 5 / 6
» Toward Automated Detection of Logic Vulnerabilities in Web A...
Sort
View
109
Voted
USS
2008
15 years 3 months ago
To Catch a Predator: A Natural Language Approach for Eliciting Malicious Payloads
We present an automated, scalable, method for crafting dynamic responses to real-time network requests. Specifically, we provide a flexible technique based on natural language pro...
Sam Small, Joshua Mason, Fabian Monrose, Niels Pro...
124
Voted
DBSEC
2008
188views Database» more  DBSEC 2008»
15 years 2 months ago
On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model
With the growing use of wireless networks and mobile devices, we are moving towards an era where spatial and temporal information will be necessary for access control. The use of s...
Manachai Toahchoodee, Indrakshi Ray
99
Voted
CGF
2004
118views more  CGF 2004»
15 years 28 days ago
Cultural Heritage Preservation Using Constructive Shape Modeling
Issues of digital preservation of shapes and internal structures of historical cultural objects are discussed. An overview of existing approaches to digital preservation related t...
Carl Vilbrandt, Galina Pasko, Alexander A. Pasko, ...
98
Voted
CBMS
2006
IEEE
15 years 7 months ago
Technology for Medical Education, Research, and Disease Screening by Exploitation of Biomarkers in a Large Collection of Uterine
The Communications Engineering Branch of the National Library of Medicine is collaborating with the National Cancer Institute (NCI) in developing applications for medical educatio...
L. Rodney Long, Sameer Antani, Jose Jeronimo, Mark...
115
Voted
TIME
2008
IEEE
15 years 7 months ago
Time Aware Mining of Itemsets
Frequent behavioural pattern mining is a very important topic of knowledge discovery, intended to extract correlations between items recorded in large databases or Web acces logs....
Bashar Saleh, Florent Masseglia