Sciweavers

381 search results - page 63 / 77
» Timing attacks on Web privacy
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Practical Automated Filter Generation to Explicitly Enforce Implicit Input Assumptions
Vulnerabilities in distributed applications are being uncovered and exploited faster than software engineers can patch the security holes. All too often these weaknesses result fr...
Valentin Razmov, Daniel R. Simon
CCS
1999
ACM
13 years 12 months ago
A High-Performance Network Intrusion Detection System
In this paper we present a new approach for network intrusion detection based on concise speciļ¬cations that characterize normal and abnormal network packet sequences. Our speciļ...
R. Sekar, Y. Guang, S. Verma, T. Shanbhag
CCS
2006
ACM
13 years 11 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
NOSSDAV
2009
Springer
14 years 2 months ago
Web 2.0 traffic measurement: analysis on online map applications
In recent years, web based online map applications have been getting more and more popular, such as Google Maps, Yahoo Maps. Many new Web 2.0 techniques such as mash-up and AJAX w...
Song Lin, Zhiguo Gao, Ke Xu
ISI
2007
Springer
14 years 1 months ago
Visualization of Events in a Spatially and Multimedia Enriched Virtual Environment
ā€”Semantic Event Tracker (SET) is a highly interactive visualization tool for tracking and associating activities (events) in a spatially and Multimedia Enriched Virtual Environme...
Leonidas Deligiannidis, Farshad Hakimpour, Amit P....