Sciweavers

3003 search results - page 538 / 601
» Software Security: Building Security In
Sort
View
GLOBECOM
2007
IEEE
14 years 3 months ago
Discovering Topologies at Router Level: Part II
—Measurement and monitoring of network topologies are essential tasks in current network scenarios. Indeed, due to their utility in planning, management, security, and reliabilit...
Alessio Botta, Walter de Donato, Antonio Pescap&eg...
INFOCOM
2007
IEEE
14 years 3 months ago
An Open and Scalable Emulation Infrastructure for Large-Scale Real-Time Network Simulations
— We present a software infrastructure that embeds physical hosts in a simulated network. Aiming to create a largescale real-time virtual network testbed, our real-time interacti...
Jason Liu, Scott Mann, Nathanael Van Vorst, Keith ...
GPCE
2007
Springer
14 years 2 months ago
Preventing injection attacks with syntax embeddings
Software written in one language often needs to construct sentences in another language, such as SQL queries, XML output, or shell command invocations. This is almost always done ...
Martin Bravenboer, Eelco Dolstra, Eelco Visser
ICICS
2007
Springer
14 years 2 months ago
Drive-By Pharming
Inexpensive broadband routers are a popular way for people to create an internal, and sometimes wireless, network in their homes. By purchasing such a router and plugging it in, t...
Sid Stamm, Zulfikar Ramzan, Markus Jakobsson
ICSOC
2007
Springer
14 years 2 months ago
Negotiation of Service Level Agreements: An Architecture and a Search-Based Approach
Software systems built by composing existing services are more and more capturing the interest of researchers and practitioners. The envisaged long term scenario is that services, ...
Elisabetta Di Nitto, Massimiliano Di Penta, Alessi...