Sciweavers

1943 search results - page 332 / 389
» Web application security engineering
Sort
View
140
Voted
ESE
2008
112views Database» more  ESE 2008»
15 years 3 months ago
"Cloning considered harmful" considered harmful: patterns of cloning in software
Literature on the topic of code cloning often asserts that duplicating code within a software system is a bad practice, that it causes harm to the system's design and should b...
Cory Kapser, Michael W. Godfrey
XPU
2010
Springer
15 years 1 months ago
Put It to the Test: Using Lightweight Experiments to Improve Team Processes
Experimentation is one way to gain insight into how processes perform for a team, but industry teams rarely do experiments, fearing that such educational excursions will incur extr...
Michael Keeling
CCR
2011
14 years 10 months ago
HTTP in the home: it is not just about PCs
HTTP (Hypertext Transport Protocol) was originally primarily used for human-initiated client-server communications launched from web browsers, traditional computers and laptops. H...
Jeffrey Erman, Alexandre Gerber, Subhabrata Sen
EUROSYS
2008
ACM
16 years 8 hour ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
EUROSYS
2008
ACM
16 years 9 hour ago
Itrustpage: a user-assisted anti-phishing tool
Despite the many solutions proposed by industry and the research community to address phishing attacks, this problem continues to cause enormous damage. Because of our inability t...
Troy Ronda, Stefan Saroiu, Alec Wolman