Sciweavers

1685 search results - page 55 / 337
» Guidance in Web Applications Design
Sort
View
WWW
2011
ACM
14 years 11 months ago
Heat-seeking honeypots: design and experience
Many malicious activities on the Web today make use of compromised Web servers, because these servers often have high pageranks and provide free resources. Attackers are therefore...
John P. John, Fang Yu, Yinglian Xie, Arvind Krishn...
MIDDLEWARE
2007
Springer
15 years 10 months ago
Dynamic multi-process information flow tracking for web application security
Although there is a large body of research on detection and prevention of such memory corruption attacks as buffer overflow, integer overflow, and format string attacks, the web...
Susanta Nanda, Lap-Chung Lam, Tzi-cker Chiueh
WEBNET
2000
15 years 5 months ago
Developing Web Browser Recording Tools Using Server-Side Programming Technology
: It is always a challenge to present Web applications at a facility with no Internet connection. Traditional presentation methods such as transparencies or slides are inadequate f...
Chris J. Lu, Anantha Bangalore, Tony Tse
EICS
2010
ACM
15 years 9 months ago
Using ensembles of decision trees to automate repetitive tasks in web applications
Web applications such as web-based email, spreadsheets and form filling applications have become ubiquitous. However, many of the tasks that users try to accomplish with such web ...
Zachary Bray, Per Ola Kristensson
SAC
2000
ACM
15 years 9 months ago
Supporting Compositional Reuse in Component-Based Web Engineering
: The World Wide Web’s anticipated scope as an environment for knowledge exchange has changed dramatically. Without major modifications to its primary mechanisms the Web has turn...
Martin Gaedke, Jörn Rehse