Sciweavers

1176 search results - page 214 / 236
» Exploiting Online Games
Sort
View
ICSE
2008
IEEE-ACM
14 years 9 months ago
Static detection of cross-site scripting vulnerabilities
Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an...
Gary Wassermann, Zhendong Su
WWW
2004
ACM
14 years 9 months ago
CS AKTive space: representing computer science in the semantic web
We present a Semantic Web application that we call CS AKTive Space1 . The application exploits a wide range of semantically heterogeneous and distributed content relating to Compu...
Monica M. C. Schraefel, Nigel R. Shadbolt, Nichola...
ICCCN
2007
IEEE
14 years 2 months ago
Interplay of Security and Reliability using Non-uniform Checkpoints
Real time applications such as military aircraft flight control systems and online banking are critical with respect to security and reliability. In this paper we presented a way ...
Kiranmai Bellam, Raghava K. Vudata, Xiao Qin, Zili...
SEMWEB
2007
Springer
14 years 2 months ago
Solving Semantic Ambiguity to Improve Semantic Web based Ontology Matching
A new paradigm in Semantic Web research focuses on the development of a new generation of knowledge-based problem solvers, which can exploit the massive amounts of formally speciļ¬...
Jorge Gracia, Vanessa Lopez, Mathieu d'Aquin, Mart...
WWW
2010
ACM
14 years 1 months ago
Reining in the web with content security policy
The last three years have seen a dramatic increase in both awareness and exploitation of Web Application Vulnerabilities. 2008 and 2009 saw dozens of high-proļ¬le attacks against...
Sid Stamm, Brandon Sterne, Gervase Markham