Sciweavers

602 search results - page 109 / 121
» A Web Site Navigation Engine
Sort
View
WWW
2010
ACM
14 years 5 months ago
Regular expressions considered harmful in client-side XSS filters
Cross-site scripting flaws have now surpassed buffer overflows as the world’s most common publicly-reported security vulnerability. In recent years, browser vendors and resea...
Daniel Bates, Adam Barth, Collin Jackson
CMS
2006
158views Communications» more  CMS 2006»
14 years 9 days ago
On the Privacy Risks of Publishing Anonymized IP Network Traces
Networking researchers and engineers rely on network packet traces for understanding network behavior, developing models, and evaluating network performance. Although the bulk of p...
D. Koukis, Spyros Antonatos, Kostas G. Anagnostaki...
DIMVA
2009
13 years 12 months ago
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks
Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
APSEC
2005
IEEE
14 years 4 months ago
CoxR: Open Source Development History Search System
In typical open source software development, developers use revision control systems for product management, mailing list systems for human communications, and bug tracking system...
Makoto Matsushita, Kei Sasaki, Katsuro Inoue
EKAW
2004
Springer
14 years 4 months ago
Managing Patient Record Instances Using DL-Enabled Formal Concept Analysis
Abstract In this paper we describe a general logic-enabled Formal Concept Analysis (FCA) approach to manage patient record instances. In particular, the conceptual model of the dom...
Bo Hu, Srinandan Dasmahapatra, David Dupplaw, Paul...