Sciweavers

63 search results - page 5 / 13
» Detecting and Removing Web Application Vulnerabilities with ...
Sort
View
CAISE
2006
Springer
13 years 10 months ago
Data Conceptualisation for Web-Based Data-Centred Application Design
The paper describes the conceptualisation process in the ReQuest approach, a wide-spectrum methodology for web-based information systems analysis and development. This methodology ...
Julien Vilz, Anne-France Brogneaux, Ravi Ramdoyal,...
SIGMOD
2006
ACM
148views Database» more  SIGMOD 2006»
14 years 6 months ago
Research issues in data stream association rule mining
There exist emerging applications of data streams that require association rule mining, such as network traffic monitoring and web click streams analysis. Different from data in t...
Nan Jiang, Le Gruenwald
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
14 years 23 days ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
ACSAC
2010
IEEE
13 years 4 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ICC
2009
IEEE
125views Communications» more  ICC 2009»
13 years 4 months ago
HMM-Web: A Framework for the Detection of Attacks Against Web Applications
Nowadays, the web-based architecture is the most frequently used for a wide range of internet services, as it allows to easily access and manage information and software on remote ...
Igino Corona, Davide Ariu, Giorgio Giacinto