-
1
-
-
85024260157
-
Cloud computing
-
B. Hayes, "Cloud computing, " Commun. ACM, vol. 51, no. 7, pp. 9-11, 2008.
-
(2008)
Commun. ACM
, vol.51
, Issue.7
, pp. 9-11
-
-
Hayes, B.1
-
2
-
-
0003415244
-
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee, "Hypertext transfer protocol - http/1.1, " 1999.
-
(1999)
Hypertext Transfer Protocol - Http/1.1
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
5
-
-
26444620370
-
An introduction to arp spoofing
-
[Online Document], April
-
S. Whalen, "An introduction to arp spoofing, " Node 99 [Online Document], April, 2001.
-
(2001)
Node
, vol.99
-
-
Whalen, S.1
-
9
-
-
79960590319
-
Secure data processing framework for mobile cloud computing
-
april
-
D. Huang, Z. Zhou, L. Xu, T. Xing, and Y. Zhong, "Secure data processing framework for mobile cloud computing, " in Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on, april 2011, pp. 614 -618.
-
(2011)
Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on
, pp. 614-618
-
-
Huang, D.1
Zhou, Z.2
Xu, L.3
Xing, T.4
Zhong, Y.5
-
10
-
-
33846283646
-
Hardening web browsers against man-inthe- middle and eavesdropping attacks
-
ACM New York, NY, USA
-
H. Xia and J. Brustoloni, "Hardening web browsers against man-inthe- middle and eavesdropping attacks, " in Proceedings of the 14th international conference on World Wide Web. ACM New York, NY, USA, 2005, pp. 489-498.
-
(2005)
Proceedings of the 14th International Conference on World Wide Web
, pp. 489-498
-
-
Xia, H.1
Brustoloni, J.2
-
12
-
-
33846469356
-
Client-side defense against web-based identity theft
-
San Diego. Citeseer
-
N. Chou, R. Ledesma, Y. Teraguchi, D. Boneh, and J. Mitchell, "Client-side defense against web-based identity theft, " in Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS04), San Diego. Citeseer, 2005.
-
(2005)
Proceedings of the 11th Annual Network and Distributed System Security Symposium (NDSS04)
-
-
Chou, N.1
Ledesma, R.2
Teraguchi, Y.3
Boneh, D.4
Mitchell, J.5
-
13
-
-
33745816410
-
Why phishing works
-
ACM New York, NY, USA
-
R. Dhamija, J. Tygar, and M. Hearst, "Why phishing works, " in Proceedings of the SIGCHI conference on Human Factors in computing systems. ACM New York, NY, USA, 2006, pp. 581-590.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.2
Hearst, M.3
-
14
-
-
84898190494
-
Phinding phish: Evaluating anti-phishing tools
-
Citeseer
-
Y. Zhang, S. Egelman, L. Cranor, and J. Hong, "Phinding phish: Evaluating anti-phishing tools, " in Proceedings of the 14th Annual Network and Distributed System Security Symposium. Citeseer, 2007.
-
(2007)
Proceedings of the 14th Annual Network and Distributed System Security Symposium
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
-
15
-
-
35348905575
-
Cantina: A content-based approach to detecting phishing web sites
-
New York, NY, USA: ACM
-
Y. Zhang, J. I. Hong, and L. F. Cranor, "Cantina: a content-based approach to detecting phishing web sites, " in Proceedings of the 16th international conference on World Wide Web. New York, NY, USA: ACM, 2007, pp. 639-648.
-
(2007)
Proceedings of the 16th International Conference on World Wide Web
, pp. 639-648
-
-
Zhang, Y.1
Hong, J.I.2
Cranor, L.F.3
-
17
-
-
33751067472
-
A safety-oriented platform for web applications
-
may
-
R. Cox, J. Hansen, S. Gribble, and H. Levy, "A safety-oriented platform for web applications, " in Security and Privacy, 2006 IEEE Symposium on, may 2006, pp. 15 pp. -364.
-
(2006)
Security and Privacy, 2006 IEEE Symposium on
, pp. 15-364
-
-
Cox, R.1
Hansen, J.2
Gribble, S.3
Levy, H.4
-
18
-
-
57349143314
-
Flashproxy: Transparently enabling rich web content via remote execution
-
New York, NY, USA: ACM, [Online]. Available
-
A. Moshchuk, S. D. Gribble, and H. M. Levy, "Flashproxy: Transparently enabling rich web content via remote execution, " in Proceeding of the 6th international conference on Mobile systems, applications, and services, ser. MobiSys '08. New York, NY, USA: ACM, 2008, pp. 81-93. [Online]. Available: http://doi.acm.org/10.1145/1378600.1378611.
-
(2008)
Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services, Ser. MobiSys '08
, pp. 81-93
-
-
Moshchuk, A.1
Gribble, S.D.2
Levy, H.M.3
-
19
-
-
85030494194
-
Webshield: Enabling various web defense techniques without client side modifications
-
Z. Li, Y. Tang, Y. Cao, V. Rastogi, Y. Chen, B. Liu, and C. Sbisa, "Webshield: Enabling various web defense techniques without client side modifications, " in NDSS, 2011.
-
(2011)
NDSS
-
-
Li, Z.1
Tang, Y.2
Cao, Y.3
Rastogi, V.4
Chen, Y.5
Liu, B.6
Sbisa, C.7
-
20
-
-
85076893377
-
Spyproxy: Execution-based detection of malicious web content
-
Berkeley, CA, USA: USENIX Association, [Online]. Available, 3:1-3:16
-
A. Moshchuk, T. Bragin, D. Deville, S. D. Gribble, and H. M. Levy, "Spyproxy: execution-based detection of malicious web content, " in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium. Berkeley, CA, USA: USENIX Association, 2007, pp. 3:1-3:16. [Online]. Available: http://dl.acm.org/citation.cfm?id=1362903.1362906.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
-
-
Moshchuk, A.1
Bragin, T.2
Deville, D.3
Gribble, S.D.4
Levy, H.M.5
-
21
-
-
70450045370
-
Ajaxscope: A platform for remotely monitoring the client-side behavior of web 2.0 applications
-
October
-
E. Kiciman and B. Livshits, "Ajaxscope: a platform for remotely monitoring the client-side behavior of web 2.0 applications, " SIGOPS Oper. Syst. Rev., vol. 41, pp. 17-30, October 2007.
-
(2007)
SIGOPS Oper. Syst. Rev.
, vol.41
, pp. 17-30
-
-
Kiciman, E.1
Livshits, B.2
-
22
-
-
84880890765
-
-
[Online]. Available
-
[Online]. Availablehttp://doi.acm.org/10.1145/1323293.1294264.
-
-
-
-
23
-
-
34848907433
-
Browsershield: Vulnerability-driven filtering of dynamic html
-
September, [Online]. Available
-
C. Reis, J. Dunagan, H. J. Wang, O. Dubrovsky, and S. Esmeir, "Browsershield: Vulnerability-driven filtering of dynamic html, " ACM Trans. Web, vol. 1, September 2007. [Online]. Available: http://doi.acm.org/10. 1145/1281480.1281481.
-
(2007)
ACM Trans. Web
, vol.1
-
-
Reis, C.1
Dunagan, J.2
Wang, H.J.3
Dubrovsky, O.4
Esmeir, S.5
-
24
-
-
84880858571
-
-
July, [Online]. Available
-
Zscaler Inc., "Zscaler cloud services overview, " July 2011. [Online]. Available: http://www.zscaler.com/cloudservicesoverview.html.
-
(2011)
Zscaler Cloud Services Overview
-
-
-
25
-
-
0038589165
-
The anatomy of a large-scale hypertextual web search engine
-
S. Brin and L. Page, "The anatomy of a large-scale hypertextual Web search engine, " Computer networks and ISDN systems, vol. 30, no. 1-7, pp. 107-117, 1998.
-
(1998)
Computer Networks and ISDN Systems
, vol.30
, Issue.1-7
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
27
-
-
79951675059
-
Mercator: A scalable, extensible web crawler
-
10.1023/A:1019213109274. [Online]. Available
-
A. Heydon and M. Najork, "Mercator: A scalable, extensible web crawler, " World Wide Web, vol. 2, pp. 219-229, 1999, 10.1023/A: 1019213109274. [Online]. Available: http://dx.doi.org/10.1023/A:1019213109274.
-
(1999)
World Wide Web
, vol.2
, pp. 219-229
-
-
Heydon, A.1
Najork, M.2
-
28
-
-
0037571539
-
Bayesian learning
-
T. Mitchell, "Bayesian learning, " Machine learning, pp. 154-200, 1997.
-
(1997)
Machine Learning
, pp. 154-200
-
-
Mitchell, T.1
-
29
-
-
0026992322
-
An analysis of bayesian classifiers
-
JOHN WILEY & SONS LTD
-
P. Langley, W. Iba, and K. Thompson, "An analysis of bayesian classifiers, " in Proceedings of the National Conference on Artificial Intelligence. JOHN WILEY & SONS LTD, 1992, pp. 223-223.
-
(1992)
Proceedings of the National Conference on Artificial Intelligence
, pp. 223-223
-
-
Langley, P.1
Iba, W.2
Thompson, K.3
-
31
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom, "Space/time trade-offs in hash coding with allowable errors, " Commun. ACM, vol. 13, no. 7, pp. 422-426, 1970.
-
(1970)
Commun. ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
32
-
-
0000890551
-
2Q: A low overhead high performance buffer management replacement algorithm
-
Morgan Kaufmann Publishers Inc. San Francisco, CA, USA
-
T. Johnson and D. Shasha, "2Q: A Low Overhead High Performance Buffer Management Replacement Algorithm, " in Proceedings of the 20th International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc. San Francisco, CA, USA, 1994, pp. 439- 450.
-
(1994)
Proceedings of the 20th International Conference on Very Large Data Bases
, pp. 439-450
-
-
Johnson, T.1
Shasha, D.2
|