-
1
-
-
84876967516
-
-
Last visited on: September
-
Alexa Website: "The Web Information Company". http://www.alexa.com. Last visited on: September 2012.
-
(2012)
The Web Information Company
-
-
-
2
-
-
84883486407
-
-
Last visited on: Aug
-
Amazon Web Services: Products and Services. http://aws.amazon.com/ products. Last visited on: Aug. 2012.
-
(2012)
-
-
-
3
-
-
68249129760
-
-
Technical report UCB/EECS-2009-28, Electrical Engineering and Computer Sciences, University of California at Berkeley, Berkeley, USA, February
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, M. Zaharia: "Above the Clouds: A Berkeley View of Cloud Computing". Technical report UCB/EECS-2009-28, Electrical Engineering and Computer Sciences, University of California at Berkeley, Berkeley, USA, February 2009.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
4
-
-
84883486590
-
-
Technical Report, Version 1.3., April
-
J. Bach: "Explanatory Testing Explained". Satisfice Inc., Technical Report, Version 1.3. http://www.satisfice.com/articles/et-Article.pdf, April 2003.
-
(2003)
Explanatory Testing Explained
-
-
Bach, J.1
-
5
-
-
50249085491
-
Automatic patch-based exploit generation is possible: Techniques and implications
-
Washington, DC, USA, doi: 10.1109/SP.2008.17
-
D. Brumley, P. Poosankam, D. X. Song, and J. Zheng: "Automatic Patch-based Exploit Generation is Possible: Techniques and Implications". 2008 IEEE Symposium on Security and Privacy (SP 2008). Washington, DC, USA, pp. 143-157. doi: 10.1109/SP.2008.17.
-
2008 IEEE Symposium on Security and Privacy (SP 2008)
, pp. 143-157
-
-
Brumley, D.1
Poosankam, P.2
Song, D.X.3
Zheng, J.4
-
6
-
-
0035766166
-
Steganalysis based on jpeg compatibility
-
August
-
J. Fridrich, M. Goljan, and R. Du: "Steganalysis Based on JPEG Compatibility". SPIE Multimedia Systems and Applications IV, Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding, Vol. 4518, August 2001, pp. 275-280.
-
(2001)
SPIE Multimedia Systems and Applications IV, Special Session on Theoretical and Practical Issues in Digital Watermarking and Data Hiding
, vol.4518
, pp. 275-280
-
-
Fridrich, J.1
Goljan, M.2
Du, R.3
-
7
-
-
84858033710
-
Data security and validation framework for a scientific data processing soa based system
-
December, doi: 10.1109/DeSE.2011.75
-
V. Gancheva: "Data Security and Validation Framework for a Scientific Data Processing SOA Based System", Developments in E-systems Engineering (DeSE), December 2011, pp. 576-580, doi: 10.1109/DeSE.2011.75
-
(2011)
Developments in E-systems Engineering (DeSE)
, pp. 576-580
-
-
Gancheva, V.1
-
8
-
-
84883486250
-
-
Last visited on: August
-
Google Picasa: "Organize, Edit, and Share Your Photos". http://picasa.google.com. Last visited on: August 2012.
-
(2012)
Organize, Edit, and Share Your Photos
-
-
-
9
-
-
77951592919
-
Integration of data validation and user interface concerns in a dsl for web applications
-
Revised Selected Paper, Denver, CO, USA, October 5-6. doi: 10.1007/978-3-642-12107-4
-
D. Groenewegen, E. Visser: "Integration of Data Validation and User Interface Concerns in a DSL for Web Applications". International Conference of Software Language Engineering (SLE 2009), Lecture Notes in Computer Science, Revised Selected Paper, Denver, CO, USA, October 5-6, 2009, vol. 5969, pp. pp 164-173. doi: 10.1007/978-3-642-12107-4
-
(2009)
International Conference of Software Language Engineering (SLE 2009), Lecture Notes in Computer Science
, vol.5969
, pp. 164-173
-
-
Groenewegen, D.1
Visser, E.2
-
12
-
-
84883482570
-
-
February
-
M. Nilsson: "ID3 Tag Version 2.3". Informal Standard, February 1999. http://www.id3.org/id3v2.3.0.
-
(1999)
Informal Standard
-
-
Nilsson, M.1
-
13
-
-
78650820717
-
Detecting security vulnerabilities in web applications using dynamic analysis with penetration testing
-
Ghent, Belgium, May
-
A. Petukhov and D. Kozlov: "Detecting Security Vulnerabilities in Web Applications Using Dynamic Analysis with Penetration Testing". Application Security Confernce, Ghent, Belgium, May 2008.
-
(2008)
Application Security Confernce
-
-
Petukhov, A.1
Kozlov, D.2
-
14
-
-
84883485666
-
Wave pcm sound file format
-
Last visited on: August
-
C. S. Sapp: "WAVE PCM SoundFile Format". Project for the lecture Perceptual Audio Coding. https://ccrma.stanford.edu/courses/422/ projects/WaveFormat/. Last visited on: August 2012.
-
(2012)
Project for the Lecture Perceptual Audio Coding
-
-
Sapp, C.S.1
-
15
-
-
84883468802
-
-
Last visited on: August
-
SoundCloud: "Share your Sounds". http://www.soundcloud.com. Last visited on: August 2012.
-
(2012)
Share Your Sounds
-
-
-
17
-
-
84883485480
-
Steganography in signals
-
Last visited on: August 2012
-
E. Swanson, C. J. Ganier, R. Holman, and J. Rosser: "Steganography in Signals". Lecture Project, 2001. http://www.clear.rice.edu/elec301/ Projects01/smokey-steg/. Last visited on: August 2012.
-
(2001)
Lecture Project
-
-
Swanson, E.1
Ganier, C.J.2
Holman, R.3
Rosser, J.4
-
18
-
-
84883480201
-
-
Last visited on: August
-
Wikipedia: "File Format". http://en.wikipedia.org/wiki/File- format. Last visited on: August 2012.
-
(2012)
File Format
-
-
-
19
-
-
84883471602
-
-
Last visited on: August
-
Wikipedia: "GMailFS". http://en.wikipedia.org/wiki/GMailFS. Last visited on: August 2012.
-
(2012)
GMailFS
-
-
-
20
-
-
84883478541
-
-
Available at: Last visited on: Aug
-
W3C Website: "Portable Network Graphics (PNG) Specification". Available at: http://www.w3.org/TR/PNG/. Last visited on: Aug. 2012.
-
(2012)
Portable Network Graphics (PNG) Specification
-
-
|