Sciweavers

140 search results - page 4 / 28
» TAJ: effective taint analysis of web applications
Sort
View
TSC
2008
209views more  TSC 2008»
13 years 6 months ago
Effective Web Service Composition in Diverse and Large-Scale Service Networks
Web services are considered to be a potential silver bullet for the envisioned Service Oriented Architecture, in which loosely coupled software components are published, located, a...
Seog-Chan Oh, Dongwon Lee, Soundar R. T. Kumara
USENIX
2008
13 years 9 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
CHI
2010
ACM
13 years 4 months ago
The tower of Babel meets web 2.0: user-generated content and its applications in a multilingual context
This study explores language's fragmenting effect on usergenerated content by examining the diversity of knowledge representations across 25 different Wikipedia language edit...
Brent Hecht, Darren Gergle
SYNASC
2005
IEEE
130views Algorithms» more  SYNASC 2005»
14 years 5 days ago
Natural Computation for Business Intelligence from Web Usage Mining
Web usage mining attempts to discover useful knowledge from the secondary data obtained from the interactions of the users with the Web. Web usage mining has become very critical ...
Ajith Abraham
SP
2006
IEEE
234views Security Privacy» more  SP 2006»
14 years 18 days ago
Pixy: A Static Analysis Tool for Detecting Web Application Vulnerabilities (Short Paper)
The number and the importance of Web applications have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such applica...
Nenad Jovanovic, Christopher Krügel, Engin Ki...