Sciweavers

132 search results - page 25 / 27
» Symbolic security analysis of ruby-on-rails web applications
Sort
View
IMC
2006
ACM
14 years 1 months ago
Unexpected means of protocol inference
Network managers are inevitably called upon to associate network traffic with particular applications. Indeed, this operation is critical for a wide range of management functions...
Justin Ma, Kirill Levchenko, Christian Kreibich, S...
ASWEC
2006
IEEE
14 years 1 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...
MM
2010
ACM
252views Multimedia» more  MM 2010»
13 years 7 months ago
Real-time detection of unusual regions in image streams
Automatic and real-time identification of unusual incidents is important for event detection and alarm systems. In today's camera surveillance solutions video streams are dis...
Rene Schuster, Roland Mörzinger, Werner Haas,...
CGO
2006
IEEE
14 years 1 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
CONEXT
2009
ACM
13 years 8 months ago
StarClique: guaranteeing user privacy in social networks against intersection attacks
Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...