Sciweavers

6844 search results - page 1227 / 1369
» Web Service Security
Sort
View
RV
2007
Springer
151views Hardware» more  RV 2007»
15 years 10 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan
168
Voted
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
15 years 9 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
184
Voted
SIGGRAPH
2003
ACM
15 years 9 months ago
Forum: a new approach for the production of educational content
eLearning is developing at an ever increasing rate as universities and colleges recognize its vast potential to reach a deeper and fragmented student pool. For a while, eLearning ...
Christine Daviault, Marcelo Coelho
WWW
2001
ACM
16 years 4 months ago
Establishing Persistent Identity using the Handle System
In this paper, we propose that identity reference used over distributed communication should be defined independent from any attributes and/or the public keys associated with the ...
Sam X. Sun
140
Voted
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
16 years 20 days ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
« Prev « First page 1227 / 1369 Last » Next »