Sciweavers

1403 search results - page 164 / 281
» Security Model for XML Data
Sort
View
WWW
2009
ACM
14 years 4 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
EDOC
2003
IEEE
14 years 3 months ago
A Software Architecture for Industrial Automation
The Aspect Integrator Platform (AIP) from ABB was designed to build the next generation of industrial automation applications. This platform is part of a set of products that prov...
Rodrigo García García, Esther Gelle,...
ACSAC
2006
IEEE
14 years 4 months ago
Bluetooth Worms: Models, Dynamics, and Defense Implications
Recent occurrences of mobile worms like Cabir, Mabir and CommWarrior have created growing concerns over the security of data stored on mobile devices such as cell phones and PDAs....
Guanhua Yan, Stephan Eidenbenz
LCPC
2005
Springer
14 years 3 months ago
Code Transformations for One-Pass Analysis
With the growing popularity of streaming data model, processing queries over streaming data has become an important topic. Streaming data has received attention in a number of comm...
Xiaogang Li, Gagan Agrawal
CCS
2007
ACM
14 years 4 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...