Drive-by download attacks are among the most common methods for spreading malware today. These attacks typically exploit memory corruption vulnerabilities in web browsers and brows...
Manuel Egele, Peter Wurzinger, Christopher Kruegel...
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
The quality of the search experience has been an enduring problem for the World Wide Web. One of the well-known diļ¬culties is the tendency of users to use short, under-speciļ¬ed...
Ahu Sieg, Bamshad Mobasher, Steven L. Lytinen, Rob...
Most databases contain āname constantsā like course numbers, personal names, and place names that correspond to entities in the real world. Previous work in integration of het...
ā When the node density in a network decreases below the level necessary to sustain ad-hoc and mesh networks, communication can succeed only by leveraging node mobility and trans...
Suman Srinivasan, Arezu Moghadam, Se Gi Hong, Henn...