Sciweavers

449 search results - page 71 / 90
» Protecting the Hosted Application Server
Sort
View
COMCOM
2006
151views more  COMCOM 2006»
13 years 8 months ago
Characteristic analysis of internet traffic from the perspective of flows
The necessity of network traffic monitoring and analysis is growing dramatically with increasing network usage demands from individual users as well as business communities. Most ...
Myung-Sup Kim, Young J. Won, James W. Hong
KAIS
2008
112views more  KAIS 2008»
13 years 7 months ago
A hybrid aggregation and compression technique for road network databases
Abstract Vector data and in particular road networks are being queried, hosted and processed in many application domains such as in mobile computing. Many client systems such as PD...
Ali Khoshgozaran, Ali Khodaei, Mehdi Sharifzadeh, ...
ACSAC
2005
IEEE
14 years 1 months ago
A Nitpicker's guide to a minimal-complexity secure GUI
Malware such as Trojan Horses and spyware remain to be persistent security threats that exploit the overly complex graphical user interfaces of today’s commodity operating syste...
Norman Feske, Christian Helmuth
SELMAS
2004
Springer
14 years 1 months ago
Adaptive Access Control in Coordination-Based Mobile Agent Systems
The increased pervasiveness of mobile devices like cell phones, PDAs, and laptops draws attention to the need for coordination among these networked devices. The very nature of the...
Christine Julien, Jamie Payton, Gruia-Catalin Roma...
IPPS
2003
IEEE
14 years 1 months ago
Are E-Commerce Users Defenceless?
We are interested in new ways of threats and attack on the e-commerce. The server side of e-commerce platform is usually very well protected and secured. Unfortunately, this is no...
Matej Trampus, Mojca Ciglaric, Matjaz Pancur, Tone...