-
1
-
-
77949879017
-
Automatic creation of sql injection and cross-site scripting attacks
-
Adam Kieyzun, Philip J. Guo, Karthick Jayaraman, Michael D. Ernst, " Automatic Creation of SQL Injection and Cross-Site Scripting Attacks, " Proceedings of the 2009 IEEE 31st International Conference on Software Engineering, IEEE Computer Society, 2009, pp. 199-209.
-
(2009)
Proceedings of the 2009 IEEE 31st International Conference on Software Engineering, IEEE Computer Society
, pp. 199-209
-
-
Kieyzun, A.1
Guo, P.J.2
Jayaraman, K.3
Ernst, M.D.4
-
2
-
-
46749142572
-
A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture
-
Jayamsakthi Shanmugam and Dr. M. Ponnavaikko, "A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture, " 6th IEEE/ACIS International Conference, July 2007, pp. 861-866.
-
(2007)
6th IEEE/ACIS International Conference, July
, pp. 861-866
-
-
Shanmugam, J.1
Ponnavaikko, D.M.2
-
3
-
-
77958070206
-
A robust defense against Content-Sniffing XSS attacks
-
Multimedia Technology and its Applications (IDC), August
-
Misganaw Tadesse Gebre, Kyung-Suk Lhee and ManPyo Hong, "A robust defense against Content-Sniffing XSS attacks, " Digital Content, Multimedia Technology and its Applications (IDC), August 2010, pp. 315-320.
-
(2010)
Digital Content
, pp. 315-320
-
-
Tadesse Gebre, M.1
Lhee, K.2
Hong, M.3
-
6
-
-
72849141452
-
Honeylab: Large-scale honeypot deployment and resource sharing
-
October
-
W. Y. Chin, Evangelos P. Markatos, Spiros Antonatos, Sotiris Ioannidis, "HoneyLab: Large-scale Honeypot Deployment and Resource Sharing, " Network and System Security, Third International Conference, October 2009, pp. 381-388.
-
(2009)
Network and System Security, Third International Conference
, pp. 381-388
-
-
Chin, W.Y.1
Markatos, E.P.2
Antonatos, S.3
Ioannidis, S.4
-
7
-
-
34248399630
-
Honeypots: Concepts, approaches, and challenges
-
March
-
Iyatiti Mokube and Michele Adams, "Honeypots: Concepts, Approaches, and Challenges, " Proceedings of the 45th annual southeast regional conference, March 2007, pp. 321-326.
-
(2007)
Proceedings of the 45th Annual Southeast Regional Conference
, pp. 321-326
-
-
Mokube, I.1
Adams, M.2
-
8
-
-
77956533061
-
Enhanced attack collection scheme on high-interaction web honeypots
-
June
-
Takeshi Yagi, Naoto Tanimoto, Takeo Hariu and Mitsutaka Itoh, "Enhanced Attack Collection Scheme on High-Interaction Web Honeypots, " Computers and Communications (ISCC), IEEE Symposium, June 2010, pp. 81-86.
-
(2010)
Computers and Communications (ISCC) IEEE Symposium
, pp. 81-86
-
-
Yagi, T.1
Tanimoto, N.2
Hariu, T.3
Itoh, M.4
-
9
-
-
42149083798
-
Understanding passive and active service discovery
-
G. Bartlett, J. Heidemann, and C. Papadopoulos, Understanding passive and active service discovery, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, ACM New York, NY, USA, 2007, pp. 57-70.
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement ACM New York, NY, USA
, pp. 57-70
-
-
Bartlett, G.1
Heidemann, J.2
Papadopoulos, C.3
-
11
-
-
61849085156
-
An evaluation of connection characteristics for separating network attacks
-
R. Berthier and M. Cukier, An evaluation of connection characteristics for separating network attacks, International Journal, vol. 4, 2009, pp. 110-124.
-
(2009)
International Journal
, vol.4
, pp. 110-124
-
-
Berthier, R.1
Cukier, M.2
-
12
-
-
58449089067
-
On the comparison of network attack datasets: An empirical analysis
-
R. Berthier, D. Korman, M. Cukier, M. Hiltunen, G. Vesonder, and D. Sheleheda, On the Comparison of Network Attack Datasets: An Empirical Analysis, 11th IEEE High Assurance Systems Engineering Symposium, 2008. HASE 2008, 2008, pp. 39-48.
-
(2008)
11th IEEE High Assurance Systems Engineering Symposium 2008 HASE 2008
, pp. 39-48
-
-
Berthier, R.1
Korman, D.2
Cukier, M.3
Hiltunen, M.4
Vesonder, G.5
Sheleheda, D.6
-
13
-
-
79961236654
-
The spoofer project: Inferring the extent of source address filtering on the Internet
-
USENIX Association Berkeley, CA, USA
-
R. Beverly and S. Bauer, The spoofer project: Inferring the extent of source address filtering on the Internet, Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop table of contents, USENIX Association Berkeley, CA, USA, 2005, pp. 8-8.
-
(2005)
Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop Table of Contents
, pp. 8-8
-
-
Beverly, R.1
Bauer, S.2
-
14
-
-
14944363571
-
Toward understanding distributed blackhole placement
-
E. Cooke, M. Bailey, Z.M. Mao, D. Watson, F. Jahanian, and D. McPherson,Toward understanding distributed blackhole placement, Proceedings of the 2004 ACM workshop on Rapid malcode, ACM New York, NY, USA, 2004, pp. 54-64.
-
(2004)
Proceedings of the 2004 ACM Workshop on Rapid Malcode, ACM New York, NY, USA
, pp. 54-64
-
-
Cooke, E.1
Bailey, M.2
Mao, Z.M.3
Watson, D.4
Jahanian, F.5
McPherson, D.6
-
15
-
-
33845589988
-
A statistical analysis of attack data to separate attacks
-
M. Cukier, R. Berthier, S. Panjwani, and S. Tan, A Statistical Analysis of Attack Data to Separate Attacks, Dependable Systems and Networks, 2006. DSN 2006. International Conference on, 2006, pp. 383-392.
-
(2006)
Dependable Systems and Networks 2006. DSN 2006. International Conference on
, pp. 383-392
-
-
Cukier, M.1
Berthier, R.2
Panjwani, S.3
Tan, S.4
-
16
-
-
33745816410
-
Why phishing works
-
R. Dhamija, J.D. Tygar, and M. Hearst, Why phishing works, Proceedings of the SIGCHI conference on Human Factors in computing systems, ACM New York, NY, USA, 2006, pp. 581-590.
-
(2006)
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems ACM New York, NY, USA
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
17
-
-
49149125632
-
A hybrid messaging-based scheme for IP traceback
-
A. Fadlallah, A. Serhrouchni, Y. Begriche, and F. Nait-Abdesselam, A Hybrid Messaging-Based Scheme for IP Traceback, Information and Communication Technologies: From Theory to Applications, 2008. ICTTA 2008. 3rd International Conference on, 2008, pp. 1-6.
-
(2008)
Information and Communication Technologies: From Theory to Applications 2008. ICTTA 2008. 3rd International Conference on
, pp. 1-6
-
-
Fadlallah, A.1
Serhrouchni, A.2
Begriche, Y.3
Nait-Abdesselam, F.4
-
18
-
-
21944439990
-
Breaking downdimensionality: An effective feature selection method for high-dimensional clustering Workshop on Clustering High Dimensional Data and its Applications, the Third
-
D. Guo, M. Gahegan, D. Peuquet, and A. MacEachren, Breaking downdimensionality: an effective feature selection method for high-dimensional clustering, Workshop on Clustering High Dimensional Data and its Applications, the Third SIAM International Conference on Data Mining, May, pp. 1-3.
-
SIAM International Conference on Data Mining, May
, pp. 1-3
-
-
Guo, D.1
Gahegan, M.2
Peuquet, D.3
Maceachren, A.4
|