Sciweavers

3086 search results - page 443 / 618
» Developing Secure Web Applications
Sort
View
IEEEARES
2009
IEEE
14 years 5 months ago
Investigating the Implications of Virtual Machine Introspection for Digital Forensics
— Researchers and practitioners in computer forensics currently must base their analysis on information that is either incomplete or produced by tools that may themselves be comp...
Kara L. Nance, Brian Hay, Matt Bishop
SP
2009
IEEE
144views Security Privacy» more  SP 2009»
14 years 5 months ago
De-anonymizing Social Networks
Operators of online social networks are increasingly sharing potentially sensitive information about users and their relationships with advertisers, application developers, and da...
Arvind Narayanan, Vitaly Shmatikov
AGENTS
2001
Springer
14 years 2 months ago
Automatically tracking and analyzing the behavior of live insect colonies
We introduce the study of live social insect colonies as a relevant and exciting domain for the development and application of multi-agent systems modeling tools. Social insects p...
Tucker R. Balch, Zia Khan, Manuela M. Veloso
ICDCS
2010
IEEE
14 years 2 months ago
Sifting through Network Data to Cull Activity Patterns with HEAPs
—Today’s large campus and enterprise networks are characterized by their complexity, i.e. containing thousands of hosts, and diversity, i.e. with various applications and usage...
Esam Sharafuddin, Yu Jin, Nan Jiang, Zhi-Li Zhang
ACSAC
2004
IEEE
14 years 2 months ago
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets
We have developed a mechanism which prevents abuse of trusted Java applets, such as digitally signed applets. A signed applet is usually permitted by a user to perform certain fun...
Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuj...