-
1
-
-
84880352802
-
-
eSafe Proactive Content Security
-
Aladdin Knowledge Systems, eSafe Proactive Content Security, Available from:
-
Aladdin Knowledge Systems
-
-
-
2
-
-
18844415995
-
Mobile code stakes its claim
-
Cover Story, November
-
I. Armstrong, Mobile code stakes its claim, SC Magazine, Cover Story, November 2000
-
(2000)
SC Magazine
-
-
Armstrong, I.1
-
6
-
-
2642545485
-
Detecting malicious software by monitoring anomalous windows registry accesses
-
Zurich, Switzerland, October
-
F. Apap, A. Honig, S. Hershkop, E. Eskin, S. Stolfo, Detecting malicious software by monitoring anomalous windows registry accesses, in: Fifth International Symposium on Recent Advances in Intrusion Detection, Zurich, Switzerland, October 2002
-
(2002)
Fifth International Symposium on Recent Advances in Intrusion Detection
-
-
Apap, F.1
Honig, A.2
Hershkop, S.3
Eskin, E.4
Stolfo, S.5
-
8
-
-
15844408235
-
VeriWeb: Automatically testing dynamic web sites
-
Honolulu, Hawaii, May
-
M. Benedikt, J. Freire, P. Godefroid, VeriWeb: Automatically testing dynamic web sites, in: Proceedings of the 11th International Conference on the World Wide Web, Honolulu, Hawaii, May 2002
-
(2002)
Proceedings of the 11th International Conference on the World Wide Web
-
-
Benedikt, M.1
Freire, J.2
Godefroid, P.3
-
10
-
-
16244377358
-
Knowledge area description of software testing
-
Chapter 5, Software Engineering Coordinated Committee (Joint IEEE Computer Society-ACM Committee), April
-
A. Bertolino, Knowledge area description of software testing, in: Guide to the Software Engineering Body of Knowledge SWEBOK (v. 0.7), Chapter 5, Software Engineering Coordinated Committee (Joint IEEE Computer Society-ACM Committee), April, 2000. Available from: < http://www.swebok.org>
-
(2000)
Guide to the Software Engineering Body of Knowledge SWEBOK (V. 0.7)
-
-
Bertolino, A.1
-
11
-
-
0034447846
-
Operating system enhancements to prevent the misuse of system calls
-
Athens, Greece
-
M. Bernaschi, E. Gabrielli, L.V. Mancini, Operating system enhancements to prevent the misuse of system calls, in: Proceedings of the 7th ACM Conference on Computer and Communications Security, Athens, Greece, 2000
-
(2000)
Proceedings of the 7th ACM Conference on Computer and Communications Security
-
-
Bernaschi, M.1
Gabrielli, E.2
Mancini, L.V.3
-
12
-
-
16244394407
-
Bulletproof web security
-
TechTarget Storage Media May
-
M. Bobbitt, Bulletproof web security, Network Security Magazine, TechTarget Storage Media, May 2002. Available from: < http://infosecuritymag. techtarget.com/2002/may/bulletproof.shtml>
-
(2002)
Network Security Magazine
-
-
Bobbitt, M.1
-
13
-
-
0003514305
-
-
Department of Computer Science, University of Colorado Boulder
-
C.M. Bowman, P. Danzig, D. Hardy, U. Manber, M. Schwartz, and D. Wessels Harvest: a scalablecustomizable discovery and access system 1995 Department of Computer Science, University of Colorado Boulder
-
(1995)
Harvest: A Scalablecustomizable Discovery and Access System
-
-
Bowman, C.M.1
Danzig, P.2
Hardy, D.3
Manber, U.4
Schwartz, M.5
Wessels, D.6
-
14
-
-
18844425345
-
On preventing intrusions by process behavior monitoring
-
Washington, DC, August
-
T. Bowen, M. Segal, R. Sekar, On preventing intrusions by process behavior monitoring, in: Eighth USENIX Security Symposium, Washington, DC, August 1999
-
(1999)
Eighth USENIX Security Symposium
-
-
Bowen, T.1
Segal, M.2
Sekar, R.3
-
17
-
-
67649866504
-
Parallel crawlers
-
Honolulu, Hawaii, May
-
J. Cho, H. Garcia-Molina, Parallel crawlers, in: Proceedings of the 11th International Conference on the World Wide Web, Honolulu, Hawaii, May 2002, pp. 124-135
-
(2002)
Proceedings of the 11th International Conference on the World Wide Web
, pp. 124-135
-
-
Cho, J.1
Garcia-Molina, H.2
-
18
-
-
21044452266
-
A guide to building secure Web applications
-
September
-
M. Curphey, D. Endler, W. Hau, S. Taylor, T. Smith, A. Russell, G. McKenna, R. Parke, K. McLaughlin, N. Tranter, A. Klien, D. Groves, I. By-Gad, S. Huseby, M. Eizner, R. McNamara, A guide to building secure Web applications, The Open Web Application Security Project v.1.1.1, September 2002
-
(2002)
The Open Web Application Security Project v.1.1.1
-
-
Curphey, M.1
Endler, D.2
Hau, W.3
Taylor, S.4
Smith, T.5
Russell, A.6
McKenna, G.7
Parke, R.8
McLaughlin, K.9
Tranter, N.10
Klien, A.11
Groves, D.12
By-Gad, I.13
Huseby, S.14
Eizner, M.15
McNamara, R.16
-
19
-
-
18844398744
-
-
DHTML Central, HierMenus. Available from: < http://www.webreference. com/dhtml/hiermenus/>
-
-
-
-
20
-
-
0034780666
-
An approach for reverse engineering of Web-based applications
-
Stuttgart, Germany, October
-
Di Lucca, G.A. Di Penta, M. Antoniol, G. Casazza, An approach for reverse engineering of Web-based applications, in: Proceedings of the Eighth Working Conference on Reverse Engineering, Stuttgart, Germany, October 2001, pp. 231-240
-
(2001)
Proceedings of the Eighth Working Conference on Reverse Engineering
, pp. 231-240
-
-
Lucca, D.1
Di Penta, G.A.2
Antoniol, M.3
Casazza, G.4
-
21
-
-
84884724887
-
WARE: A tool for the reverse engineering of web applications
-
Budapest, Hungary, March
-
G.A. Di Lucca, A.R. Fasolino, F. Pace, P. Tramontana, U. De Carlini, WARE: A tool for the reverse engineering of web applications, in: Proceedings of the Sixth European Conference on Software Maintenance and Reengineering, Budapest, Hungary, March 2002, pp. 241-250
-
(2002)
Proceedings of the Sixth European Conference on Software Maintenance and Reengineering
, pp. 241-250
-
-
Di Lucca, G.A.1
Fasolino, A.R.2
Pace, F.3
Tramontana, P.4
De Carlini, U.5
-
23
-
-
18844420132
-
-
HttpUnit
-
R. Gold, HttpUnit. Available from: < http://httpunit.sourceforge.net/ >
-
-
-
Gold, R.1
-
24
-
-
19944365247
-
Securing Web application code by static analysis and runtime protection
-
New York, May 17-22
-
Y.W. Huang, S.K. Huang, T.P. Lin, C.H. Tsai, Securing Web application code by static analysis and runtime protection, in: Proceedings of the 13th International World Wide Web Conference, New York, May 17-22, 2004
-
(2004)
Proceedings of the 13th International World Wide Web Conference
-
-
Huang, Y.W.1
Huang, S.K.2
Lin, T.P.3
Tsai, C.H.4
-
25
-
-
4544358830
-
Verifying Web applications using bounded model checking
-
Florence, Italy, June 28-July 1
-
Y.W. Huang, F. Yu, C. Hang, C.H. Tsai, D.T. Lee, S.Y. Kuo, Verifying Web applications using bounded model checking, in: Proceedings of the 2004 International Conference Dependable Systems and Networks (DSN2004), Florence, Italy, June 28-July 1, 2004
-
(2004)
Proceedings of the 2004 International Conference Dependable Systems and Networks (DSN2004)
-
-
Huang, Y.W.1
Yu, F.2
Hang, C.3
Tsai, C.H.4
Lee, D.T.5
Kuo, S.Y.6
-
27
-
-
2442626107
-
Distributed search over the hidden Web: Hierarchical database sampling and selection
-
Hong Kong, China, August
-
P. Ipeirotis, L. Gravano, Distributed search over the hidden Web: hierarchical database sampling and selection, in: The 28th International Conference on Very Large Databases, Hong Kong, China, August 2002, pp. 394-405
-
(2002)
The 28th International Conference on Very Large Databases
, pp. 394-405
-
-
Ipeirotis, P.1
Gravano, L.2
-
28
-
-
0000206310
-
Security models for Web-based applications
-
J. Joshi, W. Aref, A. Ghafoor, and E. Spafford Security models for Web-based applications Communications of the ACM 44 2 2001 38 44
-
(2001)
Communications of the ACM
, vol.44
, Issue.2
, pp. 38-44
-
-
Joshi, J.1
Aref, W.2
Ghafoor, A.3
Spafford, E.4
-
29
-
-
4944265414
-
Specifying runtime environments and functionalities of downloadable components under the sandbox model
-
Kanazawa, Japan, November
-
H. Kaiya, K. Kaijiri, Specifying runtime environments and functionalities of downloadable components under the sandbox model, in: Proceedings of the International Symposium on Principles of Software Evolution, Kanazawa, Japan, November 2000, pp. 138-142
-
(2000)
Proceedings of the International Symposium on Principles of Software Evolution
, pp. 138-142
-
-
Kaiya, H.1
Kaijiri, K.2
-
30
-
-
19944389350
-
InterDo version 3.0
-
Kavado, Inc., InterDo Version 3.0., Kavado Whitepaper, 2003
-
(2003)
Kavado Whitepaper
-
-
-
31
-
-
85084160041
-
Detecting and countering system intrusions using software wrappers
-
Denver, Colorado, August
-
C. Ko, T. Fraser, L. Badger, D. Kilpatrick, Detecting and countering system intrusions using software wrappers, in: Proceedings of the 9th USENIX Security Symposium, Denver, Colorado, August 2000
-
(2000)
Proceedings of the 9th USENIX Security Symposium
-
-
Ko, C.1
Fraser, T.2
Badger, L.3
Kilpatrick, D.4
-
33
-
-
1842861284
-
Extracting data behind web forms
-
Tampere, Finland, October
-
S. Liddle, D. Embley, D. Scott, S.H. Yau, Extracting data behind web forms, in: Proceedings of the Workshop on Conceptual Modeling Approaches for e-Business, Tampere, Finland, October 2002
-
(2002)
Proceedings of the Workshop on Conceptual Modeling Approaches for E-Business
-
-
Liddle, S.1
Embley, D.2
Scott, D.3
Yau, S.H.4
-
34
-
-
0034538764
-
Structural testing of Web applications
-
October 8-11
-
C.H. Liu, D.C. Kung, P. Hsia, C.T. Hsu, Structural testing of Web applications, in: Proceedings of the 11th International Symposium Software Reliability Engineering (ISSRE2000), October 8-11, 2000, pp. 84-96
-
(2000)
Proceedings of the 11th International Symposium Software Reliability Engineering (ISSRE2000)
, pp. 84-96
-
-
Liu, C.H.1
Kung, D.C.2
Hsia, P.3
Hsu, C.T.4
-
35
-
-
84960478058
-
Object-based data flow testing of Web applications
-
Hong Kong, China, October 30-31
-
C.H. Liu, D.C. Kung, P. Hsia, C.T. Hsu, Object-based data flow testing of Web applications, in: Proceedings of the 1st Asia-Pacific Conference on Quality Software (APAQS'00), Hong Kong, China, October 30-31, 2000
-
(2000)
Proceedings of the 1st Asia-Pacific Conference on Quality Software (APAQS'00)
-
-
Liu, C.H.1
Kung, D.C.2
Hsia, P.3
Hsu, C.T.4
-
36
-
-
85084162041
-
WebGlimpse - Combining browsing and searching
-
Anaheim, California, January
-
U. Manber, M. Smith, B. Gopal, WebGlimpse - combining browsing and searching, in: Proceedings of the USENIX 1997 Annual Technical Conference, Anaheim, California, January 1997)
-
(1997)
Proceedings of the USENIX 1997 Annual Technical Conference
-
-
Manber, U.1
Smith, M.2
Gopal, B.3
-
37
-
-
18844406885
-
-
MSDN Library
-
Microsoft, Scriptlet Security, Getting Started with Scriptlets, MSDN Library, 1997. Available from: < http://msdn.microsoft.com/library/default. asp?url=/library/en-us/dnindhtm/html/instantdhtmlscriptlets.asp>
-
(1997)
Scriptlet Security, Getting Started with Scriptlets
-
-
-
38
-
-
0001414318
-
SPHinx: A framework for creating personal, site-specific Web crawlers
-
Brisbane, Australia, April
-
R.C. Miller, K. Bharat, SPHinx: a framework for creating personal, site-specific Web crawlers, in: Proceedings of the 7th International World Wide Web Conference, Brisbane, Australia, April 1998, pp. 119-130
-
(1998)
Proceedings of the 7th International World Wide Web Conference
, pp. 119-130
-
-
Miller, R.C.1
Bharat, K.2
-
39
-
-
84880449926
-
-
Mozilla.org, Mozilla Layout Engine. Available from: < http://www.mozilla.org/newlayout/>
-
Mozilla Layout Engine
-
-
-
40
-
-
16244404145
-
Risks to the public in computers and related systems
-
P.G. Neumann Risks to the public in computers and related systems ACM SIGSOFT Software Engineering Notes 25 3 2000 15 23
-
(2000)
ACM SIGSOFT Software Engineering Notes
, vol.25
, Issue.3
, pp. 15-23
-
-
Neumann, P.G.1
-
41
-
-
16244377958
-
-
Netscape, JavaScript Security in Communicator 4.x. Available from: < http://developer.netscape.com/docs/manuals/communicator/jssec/contents. htm#1023448>
-
JavaScript Security in Communicator 4.x
-
-
-
42
-
-
0036497184
-
Quality attributes of web software applications
-
J. Offutt Quality attributes of web software applications IEEE Software 19 2 2002 25 32
-
(2002)
IEEE Software
, vol.19
, Issue.2
, pp. 25-32
-
-
Offutt, J.1
-
43
-
-
14944385834
-
Open source software research activities in aist towards secure open systems
-
Tokyo, Japan, October 23-25
-
K. Ohmaki, Open source software research activities in aist towards secure open systems, in: Proceedings of the 7th IEEE International Symposium High Assurance Systems Engineering (HASE'02), Tokyo, Japan, October 23-25, 2002, p. 37
-
(2002)
Proceedings of the 7th IEEE International Symposium High Assurance Systems Engineering (HASE'02)
, pp. 37
-
-
Ohmaki, K.1
-
44
-
-
18844404268
-
-
OWASP, WebScarab Project. Available from: < http://www.owasp.org/ webscarab/>
-
-
-
-
45
-
-
18844405304
-
Active content security: Risks and solutions
-
Pelican Security Inc., Active content security: risks and solutions, Pelican Security Whitepaper, 1999
-
(1999)
Pelican Security Whitepaper
-
-
-
46
-
-
18844435309
-
Making the net safe for ebusiness: Solving the problem of malicious Internet mobile code
-
Philiadelphia, Pennsylvania, September
-
P. Privateer, Making the net safe for ebusiness: solving the problem of malicious Internet mobile code, in: Proceedings of the eSolutions World 2000 Conference, Philiadelphia, Pennsylvania, September 2000
-
(2000)
Proceedings of the ESolutions World 2000 Conference
-
-
Privateer, P.1
-
47
-
-
2942751146
-
Experiences with specification based intrusion detection system
-
Davis, California, October
-
P. Uppuluri, R. Sekar, Experiences with specification based intrusion detection system, in: Fourth International Symposium on Recent Advances in Intrusion Detection, Davis, California, October 2001
-
(2001)
Fourth International Symposium on Recent Advances in Intrusion Detection
-
-
Uppuluri, P.1
Sekar, R.2
-
48
-
-
84944325093
-
Crawling the hidden web
-
Roma, Italy, September
-
S. Raghavan, H. Garcia-Molina, Crawling the hidden Web, in: Proceedings of the 27th VLDB Conference, Roma, Italy, September 2001, pp. 129-138
-
(2001)
Proceedings of the 27th VLDB Conference
, pp. 129-138
-
-
Raghavan, S.1
Garcia-Molina, H.2
-
49
-
-
4243561781
-
Crawling the hidden web
-
Database Group, Computer Science Department, Stanford, November
-
S. Raghavan, H. Garcia-Molina, Crawling the hidden Web, in: Technical Report 2000-36, Database Group, Computer Science Department, Stanford, November 2000
-
(2000)
Technical Report
, vol.2000
, Issue.36
-
-
Raghavan, S.1
Garcia-Molina, H.2
-
51
-
-
0035009417
-
Analysis and testing of web applications
-
Toronto, Ontario, Canada, May
-
F. Ricca, P. Tonella, Analysis and testing of Web applications, in: Proceedings of the 23rd IEEE International Conference on Software Engineering, Toronto, Ontario, Canada, May 2001, pp. 25-34
-
(2001)
Proceedings of the 23rd IEEE International Conference on Software Engineering
, pp. 25-34
-
-
Ricca, F.1
Tonella, P.2
-
53
-
-
0035306083
-
Understanding and restructuring Web sites with ReWeb
-
F. Ricca, and P. Tonella Understanding and restructuring Web sites with ReWeb IEEE Multimedia 8 2 2001 40 51
-
(2001)
IEEE Multimedia
, vol.8
, Issue.2
, pp. 40-51
-
-
Ricca, F.1
Tonella, P.2
-
54
-
-
77956619943
-
Web application slicing
-
Florence, Italy, November
-
F. Ricca, P. Tonella, Web application slicing, in: Proceedings of the IEEE International Conference on Software Maintenance, Florence, Italy, November 2001, pp. 148-157
-
(2001)
Proceedings of the IEEE International Conference on Software Maintenance
, pp. 148-157
-
-
Ricca, F.1
Tonella, P.2
-
55
-
-
0034511271
-
Web site analysis: Structure and evolution
-
San Jose, California, October
-
F. Ricca, P. Tonella, Web site analysis: structure and evolution, in: Proceedings of the IEEE International Conference on Software Maintenance, San Jose, California, October 2000, pp. 76-86
-
(2000)
Proceedings of the IEEE International Conference on Software Maintenance
, pp. 76-86
-
-
Ricca, F.1
Tonella, P.2
-
56
-
-
18844436602
-
-
Sanctum Inc., AppShield 4.0 Whitepaper, 2002. Available from: < http://www.sanctuminc.com>
-
(2002)
AppShield 4.0 Whitepaper
-
-
-
58
-
-
77953069969
-
Abstracting application-level web security
-
Honolulu, Hawaii, May
-
D. Scott, R. Sharp, Abstracting application-level Web security, in: The 11th International Conference on the World Wide Web, Honolulu, Hawaii, May 2002, pp. 396-407
-
(2002)
The 11th International Conference on the World Wide Web
, pp. 396-407
-
-
Scott, D.1
Sharp, R.2
-
59
-
-
0036870155
-
Developing secure Web applications
-
D. Scott, and R. Sharp Developing secure Web applications IEEE Internet Computing 6 6 2002 38 45
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 38-45
-
-
Scott, D.1
Sharp, R.2
-
60
-
-
85084163313
-
Synthesizing fast intrusion detection/prevention systems from high-level specifications
-
R. Sekar, P. Uppuluri, Synthesizing fast intrusion detection/prevention systems from high-level specifications, in: USENIX Security Symposium, 1999
-
(1999)
USENIX Security Symposium
-
-
Sekar, R.1
Uppuluri, P.2
-
61
-
-
18844378764
-
Larbin: A multi-purpose web crawler
-
Sebastien@ailleret.com, Larbin: A multi-purpose Web crawler. http://larbin.sourceforge.net/index-eng.html
-
Sebastien@ailleret.com
-
-
-
62
-
-
18844400981
-
-
SecurityGlobal.net April 2002-March
-
SecurityGlobal.net, Security Tracker Statistics, April 2002-March 2002. Available from: < http://securitytracker.com/learn/statistics.html>
-
(2002)
Security Tracker Statistics
-
-
-
63
-
-
0242357321
-
Detecting format string vulnerabilities with type qualifiers
-
Washington DC, August
-
U. Shankar, K. Talwar, J.S. Foster, D. Wagner, Detecting format string vulnerabilities with type qualifiers, in: Proceeding of the 10th USENIX Security Symposium (USENIX'02), Washington DC, August 2002, pp. 201-220
-
(2002)
Proceeding of the 10th USENIX Security Symposium (USENIX'02)
, pp. 201-220
-
-
Shankar, U.1
Talwar, K.2
Foster, J.S.3
Wagner, D.4
-
64
-
-
0036204395
-
Design and implementation of a high-performance distributed Web crawler
-
San Jose, California, Febraury
-
V. Shkapenyuk, T. Suel, Design and implementation of a high-performance distributed Web crawler, in: Proceedings of the 18th IEEE International Conference on Data Engineering, San Jose, California, Febraury 2002, pp. 357-368
-
(2002)
Proceedings of the 18th IEEE International Conference on Data Engineering
, pp. 357-368
-
-
Shkapenyuk, V.1
Suel, T.2
-
65
-
-
18744381159
-
Learning block importance models for web pages
-
New York, May 17-22
-
R. Song, H. Liu, J.R. Wen, W.Y. Ma, Learning block importance models for Web pages, in: Proceedings of the 13th International World Wide Web Conference, New York, May 17-22, 2004, pp. 203-211
-
(2004)
Proceedings of the 13th International World Wide Web Conference
, pp. 203-211
-
-
Song, R.1
Liu, H.2
Wen, J.R.3
Ma, W.Y.4
-
66
-
-
18844367044
-
Web application security assessment
-
SPI Dynamics, Web application security assessment, SPI Dynamics Whitepaper, 2003
-
(2003)
SPI Dynamics Whitepaper
-
-
-
67
-
-
16244412523
-
-
Tennyson Maxwell Information Systems, Inc., Teleport Webspiders. Available from: < http://www.tenmax.com/teleport/home.htm>
-
Teleport Webspiders
-
-
-
68
-
-
0035001147
-
Evaluating the reverse engineering capabilities of Web tools for understanding site content and structure: A case study
-
Toronto, Ontario, Canada, May
-
S. Tilley, S. Huang, Evaluating the reverse engineering capabilities of Web tools for understanding site content and structure: A case study, in: Proceedings of the 23rd IEEE International Conference on Software Engineering, Toronto, Ontario, Canada, May 2001, pp. 514-523
-
(2001)
Proceedings of the 23rd IEEE International Conference on Software Engineering
, pp. 514-523
-
-
Tilley, S.1
Huang, S.2
-
69
-
-
18844426908
-
-
United States Patent and Trademark Office. Available from: < http://www.uspto.gov/patft/>
-
-
-
-
71
-
-
18844398743
-
AV alternatives: Extending scanner range
-
February
-
R. Vibert, AV alternatives: extending scanner range, in: Information Security Magazine, February 2001
-
(2001)
Information Security Magazine
-
-
Vibert, R.1
|