Sciweavers

2594 search results - page 495 / 519
» Stabilization of Systems with Changing Dynamics
Sort
View
SAC
2009
ACM
15 years 10 months ago
SQLProb: a proxy-based architecture towards preventing SQL injection attacks
SQL injection attacks (SQLIAs) consist of maliciously crafted SQL inputs, including control code, used against Databaseconnected Web applications. To curtail the attackers’ abil...
Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Sta...
MICRO
2009
IEEE
168views Hardware» more  MICRO 2009»
15 years 10 months ago
Ordering decoupled metadata accesses in multiprocessors
Hardware support for dynamic analysis can minimize the performance overhead of useful applications such as security checks, debugging, and profiling. To eliminate implementation ...
Hari Kannan
108
Voted
ESWS
2007
Springer
15 years 9 months ago
Real-World Reasoning with OWL
Abstract. This work is motivated by experiences in the course of developing an ontology-based application within a real-world setting. We found out that current benchmarks are not ...
Timo Weithöner, Thorsten Liebig, Marko Luther...
123
Voted
NDSS
2006
IEEE
15 years 9 months ago
Protocol-Independent Adaptive Replay of Application Dialog
For many applications—including recognizing malware variants, determining the range of system versions vulnerable to a given attack, testing defense mechanisms, and filtering m...
Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H...
131
Voted
RTAS
2003
IEEE
15 years 8 months ago
Modular Code Generation from Hybrid Automata based on Data Dependency
Model-based automatic code generation is a process of converting abstract models into concrete implementations in the form of a program written in a high-level programming languag...
Jesung Kim, Insup Lee