Sciweavers

3330 search results - page 586 / 666
» software 2010
Sort
View
USS
2010
15 years 1 months ago
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context
Reverse Turing tests, or CAPTCHAs, have become an ubiquitous defense used to protect open Web resources from being exploited at scale. An effective CAPTCHA resists existing mechan...
Marti Motoyama, Kirill Levchenko, Chris Kanich, Da...
151
Voted
USS
2010
15 years 1 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
137
Voted
USS
2010
15 years 1 months ago
Automatic Generation of Remediation Procedures for Malware Infections
Despite the widespread deployment of malwaredetection software, in many situations it is difficult to preemptively block a malicious program from infecting a system. Rather, signa...
Roberto Paleari, Lorenzo Martignoni, Emanuele Pass...
WEBI
2010
Springer
15 years 1 months ago
Agent-Based Online Quality Measurement Approach in Cloud Computing Environment
This paper studies online quality measurement in cloud computing environment. The paper analyzes concentration measure evaluation method of the current software quality evaluation...
Zhenyu Liu, Tiejiang Liu, Tun Lu, Lizhi Cai, Genxi...
133
Voted
WISEC
2010
ACM
15 years 1 months ago
Efficient code diversification for network reprogramming in sensor networks
As sensors in a network are mostly homogeneous in software and hardware, a captured sensor can easily expose its code and data to attackers and further threaten the whole network....
Qijun Gu