Sciweavers

1629 search results - page 275 / 326
» Web Dynamics
Sort
View
84
Voted
ICSE
2009
IEEE-ACM
15 years 7 months ago
Automatic creation of SQL Injection and cross-site scripting attacks
We present a technique for finding security vulnerabilities in Web applications. SQL Injection (SQLI) and crosssite scripting (XSS) attacks are widespread forms of attack in whic...
Adam Kiezun, Philip J. Guo, Karthick Jayaraman, Mi...
87
Voted
CSE
2009
IEEE
15 years 7 months ago
Security and Trust through Electronic Social Network-Based Interactions
—The success of a Public Key Infrastructure such as the Web of Trust (WoT) heavily depends on its ability to ensure that public keys are used by their legitimate owners, thereby ...
Patrik Bichsel, Samuel Müller, Franz-Stefan P...
ICIW
2009
IEEE
15 years 7 months ago
Personalized News Search in WWW: Adapting on User's Behavior
— Personalized Web Search becomes nowadays a promising option in the field of Information Retrieval and search engines design by improving both output quality and user experience...
Christos Bouras, Vassilis Poulopoulos, Panagiotis ...
107
Voted
VW
2009
Springer
153views Virtual Reality» more  VW 2009»
15 years 7 months ago
A Content Management System for User-Driven Museums in Second life
—Over two decades, a great expectation on digital museums has been addressed but most of them have been implemented based on web technologies. Emerging Second Life, which support...
Kingkarn Sookhanaphibarn, Ruck Thawonmas
CIKM
2009
Springer
15 years 7 months ago
Automobile, car and BMW: horizontal and hierarchical approach in social tagging systems
Social tagging systems have recently emerged as an effective way for users to annotate and organize large collections of resources on the Web. Moreover, they also facilitate an e...
Tom Chao Zhou, Irwin King