Sciweavers

420 search results - page 42 / 84
» Using static analysis for Ajax intrusion detection
Sort
View
DIMVA
2006
13 years 9 months ago
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs
Incomplete or improper input validation is one of the major sources of security bugs in programs. While traditional approaches often focus on detecting string related buffer overfl...
Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Kar...
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
14 years 26 days ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
SIMULATION
2010
178views more  SIMULATION 2010»
13 years 2 months ago
Application-level Simulation for Network Security
We introduce and describe a novel network simulation tool called NeSSi (Network Security Simulator). NeSSi incorporates a variety of features relevant to network security distingu...
Stephan Schmidt, Rainer Bye, Joël Chinnow, Ka...
CVPR
2005
IEEE
14 years 9 months ago
Robust and Efficient Foreground Analysis for Real-Time Video Surveillance
We present a new method to robustly and efficiently analyze foreground when we detect background for a fixed camera view by using mixture of Gaussians models and multiple cues. Th...
Ying-li Tian, Max Lu, Arun Hampapur
DSS
2000
107views more  DSS 2000»
13 years 7 months ago
MarketNet: protecting access to information systems through financial market controls
This paper describes novel market-based technologies that uniquely establish quantifiable and adjustable limits on the power of attackers, enable verifiable accountability for mal...
Yechiam Yemini, Apostolos Dailianas, Danilo Floris...