Sciweavers

6651 search results - page 1199 / 1331
» Translating Web Data
Sort
View
ICSE
2009
IEEE-ACM
15 years 10 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
MCS
2009
Springer
15 years 10 months ago
True Path Rule Hierarchical Ensembles
Abstract. Hierarchical classification problems gained increasing attention within the machine learning community, and several methods for hierarchically structured taxonomies have...
Giorgio Valentini
128
Voted
CSE
2009
IEEE
15 years 10 months ago
Social Inference Risk Modeling in Mobile and Social Applications
— The emphasis of emerging mobile and Web 2.0 applications on collaboration and communication increases threats to user privacy. A serious, yet under-researched privacy risk resu...
Sara Motahari, Sotirios G. Ziavras, Mor Naaman, Mo...
WETICE
2009
IEEE
15 years 10 months ago
A Gossip-Based Distributed Social Networking System
—Social networking web sites, which allow users to create identities and link them to friends who have also created identities, are highly popular. Systems such as Facebook and M...
S. M. A. Abbas, Johan A. Pouwelse, Dick H. J. Epem...
WMCSA
2009
IEEE
15 years 10 months ago
LiveCompare: grocery bargain hunting through participatory sensing
Many consumers are misled into paying high prices due to the search costs associated with attaining price information [16]. The popularity of bargain-hunting web sites like Slickd...
Linda Deng, Landon P. Cox
« Prev « First page 1199 / 1331 Last » Next »