Sciweavers

420 search results - page 39 / 84
» Using static analysis for Ajax intrusion detection
Sort
View
JDFP
2008
81views more  JDFP 2008»
13 years 7 months ago
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners
Digital investigators have an increasing need to examine data network logs and traffic, either as part of criminal or civil investigations or when responding to information securi...
Gary C. Kessler
WSC
2007
13 years 10 months ago
Cyber attack modeling and simulation for network security analysis
Cyber security methods are continually being developed. To test these methods many organizations utilize both virtual and physical networks which can be costly and time consuming....
Michael E. Kuhl, Jason Kistner, Kevin Costantini, ...
IPPS
2006
IEEE
14 years 1 months ago
A compiler-based communication analysis approach for multiprocessor systems
In this paper we describe a compiler framework which can identify communication patterns for MPIbased parallel applications. This has the potential of providing significant perfo...
Shuyi Shao, Alex K. Jones, Rami G. Melhem
DEXA
2003
Springer
113views Database» more  DEXA 2003»
14 years 25 days ago
Termination Analysis of Active Rules with Priorities
This paper presents an algorithm for termination static analysis of active rules with priorities. Active rules termination is an undecidable problem. Several recent works have sugg...
Alain Couchot
ACSAC
2007
IEEE
14 years 1 months ago
Database Isolation and Filtering against Data Corruption Attacks
Various attacks (e.g., SQL injections) may corrupt data items in the database systems, which decreases the integrity level of the database. Intrusion detections systems are becomi...
Meng Yu, Wanyu Zang, Peng Liu