Sciweavers

1737 search results - page 187 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
NDSS
2007
IEEE
15 years 11 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...
CLUSTER
2003
IEEE
15 years 10 months ago
Compiler Optimized Remote Method Invocation
We further increase the efficiency of Java RMI programs. Where other optimizing re-implementations of RMI use pre-processors to create stubs and skeletons and to create class spe...
Ronald Veldema, Michael Philippsen
SECON
2007
IEEE
15 years 11 months ago
A Framework for Resilient Online Coverage in Sensor Networks
—We consider surveillance applications in which sensors are deployed in large numbers to improve coverage fidelity. Previous research has studied how to select active sensor cov...
Ossama Younis, Marwan Krunz, Srinivasan Ramasubram...
WISEC
2010
ACM
16 years 2 days ago
On the tradeoff between trust and privacy in wireless ad hoc networks
As privacy moves to the center of attention in networked systems, and the need for trust remains a necessity, an important question arises: How do we reconcile the two seemingly c...
Maxim Raya, Reza Shokri, Jean-Pierre Hubaux
CHI
2007
ACM
16 years 5 months ago
A minimal model for predicting visual search in human-computer interaction
Visual search is an important part of human-computer interaction. It is critical that we build theory about how people visually search displays in order to better support the user...
Tim Halverson, Anthony J. Hornof