Sciweavers

47 search results - page 8 / 10
» A weakest precondition approach to active attacks analysis
Sort
View
ATAL
2010
Springer
13 years 9 months ago
Robust Bayesian methods for Stackelberg security games
Recent work has applied game-theoretic models to real-world security problems at the Los Angeles International Airport (LAX) and Federal Air Marshals Service (FAMS). The analysis o...
Christopher Kiekintveld, Milind Tambe, Janusz Mare...
TIP
2010
166views more  TIP 2010»
13 years 3 months ago
Restoration of Poissonian Images Using Alternating Direction Optimization
Much research has been devoted to the problem of restoring Poissonian images, namely for medical and astronomical applications. However, the restoration of these images using state...
Mário A. T. Figueiredo, José M. Biou...
WSDM
2010
ACM
315views Data Mining» more  WSDM 2010»
14 years 6 months ago
SBotMiner: Large Scale Search Bot Detection
In this paper, we study search bot traffic from search engine query logs at a large scale. Although bots that generate search traffic aggressively can be easily detected, a large ...
Fang Yu, Yinglian Xie, Qifa Ke
ICSE
2008
IEEE-ACM
14 years 9 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
WWW
2011
ACM
13 years 3 months ago
Prophiler: a fast filter for the large-scale detection of malicious web pages
Malicious web pages that host drive-by-download exploits have become a popular means for compromising hosts on the Internet and, subsequently, for creating large-scale botnets. In...
Davide Canali, Marco Cova, Giovanni Vigna, Christo...