Sciweavers

761 search results - page 73 / 153
» Reverse engineering MAC
Sort
View
CSMR
2010
IEEE
13 years 3 months ago
Under and Over Approximation of State Models Recovered for Ajax Applications
Abstract--In contrast to conventional multi-page Web applications, an Ajax application is developed as a single-page application in which content and structure are changed at runti...
Alessandro Marchetto, Paolo Tonella, Filippo Ricca
ESSOS
2011
Springer
12 years 11 months ago
An Architecture-Centric Approach to Detecting Security Patterns in Software
Abstract. Today, software security is an issue with increasing importance. Developers, software designers, end users, and enterprises have their own needs w.r.t. software security....
Michaela Bunke, Karsten Sohr
KDD
2005
ACM
158views Data Mining» more  KDD 2005»
14 years 8 months ago
Adversarial learning
Many classification tasks, such as spam filtering, intrusion detection, and terrorism detection, are complicated by an adversary who wishes to avoid detection. Previous work on ad...
Daniel Lowd, Christopher Meek
HOST
2008
IEEE
14 years 2 months ago
IC Activation and User Authentication for Security-Sensitive Systems
—A number of applications depend on the protection of security-sensitive hardware, preventing unauthorized users from gaining access to the functionality of the integrated circui...
Jiawei Huang, John Lach
WSE
2003
IEEE
14 years 1 months ago
Using Keyword Extraction for Web Site Clustering
Reverse engineering techniques have the potential to support Web site understanding, by providing views that show the organization of a site and its navigational structure. Howeve...
Paolo Tonella, Filippo Ricca, Emanuele Pianta, Chr...