Sciweavers

381 search results - page 40 / 77
» Timing attacks on Web privacy
Sort
View
AINA
2007
IEEE
14 years 2 months ago
Intrusion Detection for Encrypted Web Accesses
As various services are provided as web applications, attacks against web applications constitute a serious problem. Intrusion Detection Systems (IDSes) are one solution, however,...
Akira Yamada, Yutaka Miyake, Keisuke Takemori, Ahr...
PET
2010
Springer
13 years 11 months ago
How Unique Is Your Web Browser?
We investigate the degree to which modern web browsers are subject to “device fingerprinting” via the version and configuration information that they will transmit to website...
Peter Eckersley
MUE
2009
IEEE
252views Multimedia» more  MUE 2009»
14 years 2 months ago
DDoS Detection and Traceback with Decision Tree and Grey Relational Analysis
As modern life becomes increasingly closely bound to the Internet, network security becomes increasingly important. Like it or not, we all live under the shadow of network threats...
Yi-Chi Wu, Huei-Ru Tseng, Wuu Yang, Rong-Hong Jan
CIKM
2009
Springer
14 years 2 months ago
Online anonymity for personalized web services
To receive personalized web services, the user has to provide personal information and preferences, in addition to the query itself, to the web service. However, detailed personal...
Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu
CCS
2011
ACM
12 years 7 months ago
Fear the EAR: discovering and mitigating execution after redirect vulnerabilities
The complexity of modern web applications makes it difficult for developers to fully understand the security implications of their code. Attackers exploit the resulting security v...
Adam Doupé, Bryce Boe, Christopher Kruegel,...