Sciweavers

69 search results - page 6 / 14
» Computational Vulnerability Analysis for Information Surviva...
Sort
View
NDSS
2007
IEEE
14 years 1 months ago
Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis
Cross-site scripting (XSS) is an attack against web applications in which scripting code is injected into the output of an application that is then sent to a user’s web browser....
Philipp Vogt, Florian Nentwich, Nenad Jovanovic, E...
ICPR
2008
IEEE
14 years 1 months ago
Image analysis approach for identification of renal transplant rejection
Acute renal rejection is the most common reason for graft (transplanted kidney) failure after kidney transplantation, and early detection is crucial to survival of function in the...
Ayman El-Baz, Georgy L. Gimel'farb, Mohamed Abou E...
BMCBI
2004
151views more  BMCBI 2004»
13 years 7 months ago
A computational approach for ordering signal transduction pathway components from genomics and proteomics Data
Background: Signal transduction is one of the most important biological processes by which cells convert an external signal into a response. Novel computational approaches to mapp...
Yin Liu, Hongyu Zhao
DAC
2005
ACM
14 years 8 months ago
Simulation models for side-channel information leaks
Small, embedded integrated circuits (ICs) such as smart cards are vulnerable to so-called side-channel attacks (SCAs). The attacker can gain information by monitoring the power co...
Kris Tiri, Ingrid Verbauwhede
ICPPW
2002
IEEE
14 years 12 days ago
A Structural Framework for Modeling Multi-Stage Network Attacks
Incidents such as Solar Sunrise and Nimda demonstrate the need to expressively model distributed and complex network attacks. To protect information systems, system administrators...
Kristopher Daley, Ryan Larson, Jerald Dawkins