Sciweavers

784 search results - page 6 / 157
» Web-Site Boundary Detection
Sort
View
WWW
2008
ACM
14 years 8 months ago
As we may perceive: finding the boundaries of compound documents on the web
This paper considers the problem of identifying on the Web compound documents (cDocs) ? groups of web pages that in aggregate constitute semantically coherent information entities...
Pavel Dmitriev
SAC
2006
ACM
14 years 1 months ago
An anomaly-driven reverse proxy for web applications
Careless development of web-based applications results in vulnerable code being deployed and made available to the whole Internet, creating easily-exploitable entry points for the...
Fredrik Valeur, Giovanni Vigna, Christopher Kr&uum...
WSE
2003
IEEE
14 years 23 days ago
Evaluation Methods for Web Application Clustering
ing Business UML Diagrams from Web Applications G. Di Lucca, University of Sannio, Italy; A. Fasolino, P. Tramontana, U. De Carlini, University of Naples, Italy (25 min) Developmen...
Paolo Tonella, Filippo Ricca, Emanuele Pianta, Chr...
WCRE
1999
IEEE
13 years 11 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...
DIM
2008
ACM
13 years 8 months ago
Anti-phishing based on automated individual white-list
In phishing and pharming, users could be easily tricked into submitting their username/passwords into fraudulent web sites whose appearances look similar as the genuine ones. The ...
Ye Cao, Weili Han, Yueran Le