Sciweavers

2904 search results - page 465 / 581
» Internet Infrastructure Security
Sort
View
NSPW
2006
ACM
14 years 4 months ago
Googling considered harmful
Virtually every Internet user on the planet uses the powerful free tools offered by a handful of information service providers in many aspects of their personal and professional l...
Gregory J. Conti
CCS
2006
ACM
14 years 22 days ago
Dynamic rule-ordering optimization for high-speed firewall filtering
Packet filtering plays a critical role in many of the current high speed network technologies such as firewalls and IPSec devices. The optimization of firewall policies is critica...
Hazem Hamed, Ehab Al-Shaer
WWW
2009
ACM
14 years 11 months ago
Using static analysis for Ajax intrusion detection
We present a static control-flow analysis for JavaScript programs running in a web browser. Our analysis tackles numerous challenges posed by modern web applications including asy...
Arjun Guha, Shriram Krishnamurthi, Trevor Jim
WWW
2008
ACM
14 years 11 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
WWW
2008
ACM
14 years 11 months ago
Web user de-identification in personalization
It is a kind of privacy infraction in personalized web service if the user profile submitted to one web site transferred to another site without user permission. That can cause th...
Jiaqian Zheng, Jing Yao, Junyu Niu