Sciweavers

2209 search results - page 340 / 442
» Language Based Secure Communication
Sort
View
144
Voted
ER
2009
Springer
316views Database» more  ER 2009»
15 years 6 months ago
XMI2USE: A Tool for Transforming XMI to USE Specifications
Abstract. The UML-based Specification Environment (USE) tool supports the syntactic analysis, type checking, consistency checking, and dynamic validation of invariants and pre-/pos...
Wuliang Sun, Eunjee Song, Paul C. Grabow, Devon M....
133
Voted
APLAS
2008
ACM
15 years 4 months ago
JavaScript Instrumentation in Practice
JavaScript has been exploited to launch various browser-based attacks. Our previous work proposed a theoretical framework applying policy-based code instrumentation to JavaScript. ...
Haruka Kikuchi, Dachuan Yu, Ajay Chander, Hiroshi ...
126
Voted
AUSFORENSICS
2004
15 years 4 months ago
Generalising Event Forensics Across Multiple Domains
In cases involving computer related crime, event oriented evidence such as computer event logs, and telephone call records are coming under increased scrutiny. The amount of techn...
Bradley Schatz, George M. Mohay, Andrew Clark
151
Voted
ESSOS
2011
Springer
14 years 6 months ago
SessionShield: Lightweight Protection against Session Hijacking
The class of Cross-site Scripting (XSS) vulnerabilities is the most prevalent security problem in the field of Web applications. One of the main attack vectors used in connection ...
Nick Nikiforakis, Wannes Meert, Yves Younan, Marti...
147
Voted
TON
2012
13 years 5 months ago
Abnormally Malicious Autonomous Systems and Their Internet Connectivity
—While many attacks are distributed across botnets, investigators and network operators have recently identified malicious networks through high profile autonomous system (AS) ...
Craig A. Shue, Andrew J. Kalafut, Minaxi Gupta