Sciweavers

6844 search results - page 1224 / 1369
» Web Service Security
Sort
View
ACSAC
2008
IEEE
15 years 10 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh
136
Voted
NDSS
2006
IEEE
15 years 9 months ago
Software Self-Healing Using Collaborative Application Communities
Software monocultures are usually considered dangerous because their size and uniformity represent the potential for costly and widespread damage. The emerging concept of collabor...
Michael E. Locasto, Stelios Sidiroglou, Angelos D....
127
Voted
SOUPS
2006
ACM
15 years 9 months ago
Power strips, prophylactics, and privacy, oh my!
While Internet users claim to be concerned about online privacy, their behavior rarely reflects those concerns. In this paper we investigate whether the availability of compariso...
Julia Gideon, Lorrie Faith Cranor, Serge Egelman, ...
144
Voted
AGENTS
1999
Springer
15 years 8 months ago
A Personal News Agent That Talks, Learns and Explains
Most work on intelligent information agents has thus far focused on systems that are accessible through the World Wide Web. As demanding schedules prohibit people from continuous ...
Daniel Billsus, Michael J. Pazzani
156
Voted
ICPIA
1992
15 years 7 months ago
Intelligent Pattern Recognition and Applications
:: This talk deals with fundamental aspects of Intelligent Pattern Recognition (IPR) and applications. It basically includes the following: Overview of 3D Biometric Technology and ...
Patrick Shen-Pei Wang
« Prev « First page 1224 / 1369 Last » Next »