Sciweavers

635 search results - page 84 / 127
» Automatic Discovery of Network Applications: A Hybrid Approa...
Sort
View
MIDDLEWARE
2007
Springer
14 years 1 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
ESANN
2006
13 years 9 months ago
Margin based Active Learning for LVQ Networks
In this article, we extend a local prototype-based learning model by active learning, which gives the learner the capability to select training samples during the model adaptation...
Frank-Michael Schleif, Barbara Hammer, Thomas Vill...
DSN
2004
IEEE
13 years 11 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
ICDCSW
2005
IEEE
14 years 1 months ago
A Distributed Alerting Service for Open Digital Library Software
Alerting for Digital Libraries (DL) is an important and useful feature for the library users. To date, two independent services and a few publisher-hosted proprietary services hav...
Annika Hinze, George Buchanan
ISN
1994
Springer
121views Communications» more  ISN 1994»
13 years 11 months ago
Management of Optical Networks: SNMP Agents Enabling TMN
: With the advent of Optical Networks, an important opportunity for the application of Telecommunication Management Network (TMN) framework emerges. At present, most such networks ...
Abilio Carvalho, Fausto de Carvalho, George Pavlou