Sciweavers

1291 search results - page 77 / 259
» Intrusion Detection for Distributed Applications
Sort
View
SAC
2009
ACM
14 years 4 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
DCOSS
2005
Springer
14 years 3 months ago
Design and Analysis of Wave Sensing Scheduling Protocols for Object-Tracking Applications
Abstract. Many sensor network applications demand tightly-bounded object detection quality. To meet such stringent requirements, we develop three sensing scheduling protocols to gu...
Shansi Ren, Qun Li, Haining Wang, Xiaodong Zhang
DAIS
2007
13 years 11 months ago
Situation Specification and Realization in Rule-Based Context-Aware Applications
Context-aware applications use and manipulate context information to detect high-level situations, which are used to adapt application behavior. This paper discusses the specificat...
Patricia Dockhorn Costa, João Paulo A. Alme...
IPSN
2007
Springer
14 years 3 months ago
MeshEye: a hybrid-resolution smart camera mote for applications in distributed intelligent surveillance
Surveillance is one of the promising applications to which smart camera motes forming a vision-enabled network can add increasing levels of intelligence. We see a high degree of i...
Stephan Hengstler, Daniel Prashanth, Sufen Fong, H...
KDD
2005
ACM
109views Data Mining» more  KDD 2005»
14 years 10 months ago
A new scheme on privacy-preserving data classification
We address privacy-preserving classification problem in a distributed system. Randomization has been the approach proposed to preserve privacy in such scenario. However, this appr...
Nan Zhang 0004, Shengquan Wang, Wei Zhao