Sciweavers

1863 search results - page 358 / 373
» Security Architecture for Web Services
Sort
View
RAID
2010
Springer
13 years 5 months ago
Fast-Flux Bot Detection in Real Time
The fast-flux service network architecture has been widely adopted by bot herders to increase the productivity and extend the lifespan of botnets’ domain names. A fast-flux bot...
Ching-Hsiang Hsu, Chun-Ying Huang, Kuan-Ta Chen
ACSAC
2009
IEEE
14 years 2 months ago
FIRE: FInding Rogue nEtworks
For many years, online criminals have been able to conduct their illicit activities by masquerading behind disreputable Internet Service Providers (ISPs). For example, organizatio...
Brett Stone-Gross, Christopher Kruegel, Kevin C. A...
SP
2007
IEEE
157views Security Privacy» more  SP 2007»
14 years 1 months ago
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
Many proposed low-latency anonymous communication systems have used various flow transformations such as traffic padding, adding cover traffic (or bogus packets), packet droppi...
Xinyuan Wang, Shiping Chen, Sushil Jajodia
ASWEC
2006
IEEE
14 years 1 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
AOSD
2005
ACM
14 years 28 days ago
An expressive aspect language for system applications with Arachne
C applications, in particular those using operating system level services, frequently comprise multiple crosscutting concerns: network protocols and security are typical examples ...
Rémi Douence, Thomas Fritz, Nicolas Loriant...