Sciweavers

1943 search results - page 152 / 389
» Web application security engineering
Sort
View
104
Voted
WWW
2010
ACM
15 years 10 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
HASE
2002
IEEE
15 years 8 months ago
Coyote: An XML-Based Framework for Web Services Testing
Web services received significant attention recently and several important web service platforms such as .NET are now available. The testing and evaluation of web services are imp...
Wei-Tek Tsai, Raymond A. Paul, Weiwei Song, Zhibin...
110
Voted
IUI
2000
ACM
15 years 7 months ago
User interactions with everyday applications as context for just-in-time information access
Our central claim is that user interactions with everyday productivity applications (e.g., word processors, Web browsers, etc.) provide rich contextual information that can be lev...
Jay Budzik, Kristian J. Hammond
AVI
2006
15 years 4 months ago
Evaluating information visualization applications with focus groups: the CourseVis experience
This paper reports our experience of evaluating an application that uses visualization approaches to support instructors in Web based distance education. The evaluation took place...
Riccardo Mazza
CORR
2006
Springer
115views Education» more  CORR 2006»
15 years 3 months ago
New security and control protocol for VoIP based on steganography and digital watermarking
In this paper new, lightweight security and control protocol for Voice over Internet Protocol (VoIP) service is presented. It is the alternative for the IETF's (Internet Engi...
Wojciech Mazurczyk, Zbigniew Kotulski