Sciweavers

8772 search results - page 1650 / 1755
» Business Services Networks
Sort
View
RAID
2007
Springer
14 years 4 months ago
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Marco Cova, Davide Balzarotti, Viktoria Felmetsger...
WEBI
2007
Springer
14 years 4 months ago
PSSF: A Novel Statistical Approach for Personalized Service-side Spam Filtering
The volume of spam e-mails has grown rapidly in the last two years resulting in increasing costs to users, network operators, and e-mail service providers (ESPs). E-mail users dem...
Khurum Nazir Junejo, Asim Karim
WEBI
2007
Springer
14 years 4 months ago
Flickr: Who is Looking?
This article presents a characterization of user behavior on Flickr, a popular on-line photo sharing service that allows users to store, search, sort and share their photos. Based...
Roelof van Zwol
ACSAC
2006
IEEE
14 years 4 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
CLUSTER
2006
IEEE
14 years 4 months ago
Cluster-based IP Router: Implementation and Evaluation
IP routers are now increasingly expected to do more than just traditional packet forwarding – they must be extensible as well as scalable. It is a challenge to design a router a...
Qinghua Ye, Mike H. MacGregor
« Prev « First page 1650 / 1755 Last » Next »