• Aucun résultat trouvé

[PDF] Top 20 An Invariant-based Approach for Detecting Attacks against Data in Web Applications

Has 10000 "An Invariant-based Approach for Detecting Attacks against Data in Web Applications" found on our website. Below are the top 20 most common "An Invariant-based Approach for Detecting Attacks against Data in Web Applications".

An Invariant-based Approach for Detecting Attacks against Data in Web Applications

An Invariant-based Approach for Detecting Attacks against Data in Web Applications

... An Invariant-based Approach for Detecting Attacks against Data in Web Applications Nowadays there is an important trend to ... Voir le document complet

24

Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments

Deep Learning with Dense Random Neural Network for Detecting Attacks against IoT-connected Home Environments

... addressed. In this paper, we analyze the cybersecurity threats against an IoT-connected home environment and present the principles and design of a learning-based approach for ... Voir le document complet

7

A MODEL-BASED APPROACH FOR DESCRIBING OFFLINE NAVIGATION OF WEB APPLICATIONS

A MODEL-BASED APPROACH FOR DESCRIBING OFFLINE NAVIGATION OF WEB APPLICATIONS

... with Web Applications The basic user interaction over the Web implies a request for a Web page and/or a service from a Web server (either by using a bookmark, by clicking on ... Voir le document complet

39

FLUSH + PREFETCH: A Countermeasure Against Access-driven Cache-based Side-Channel Attacks

FLUSH + PREFETCH: A Countermeasure Against Access-driven Cache-based Side-Channel Attacks

... side-channel attacks (SCAs) are becoming a security threat to the emerging computing ...these attacks, numerous countermeasures have been ...cryptosystem against a high-resolution cache side-channel ... Voir le document complet

19

Protection against Code Obfuscation Attacks based on control dependencies in Android Systems

Protection against Code Obfuscation Attacks based on control dependencies in Android Systems

... used in our daily ...smartphone applications have been growing at a high ...half-a-million applications, and Android Market [2] has just crossed the two hundred thousand ...AppStore ... Voir le document complet

10

An End-User Development approach for Mobile Web Augmentation

An End-User Development approach for Mobile Web Augmentation

... stage in the process, our tool asks the user to define a layer, and a set of configured augmenters for each Web page to ...options for this purpose: the first one lets the end user to define a ... Voir le document complet

29

A model-based approach for describing offline navigation of web applications

A model-based approach for describing offline navigation of web applications

... with Web Applications The basic user interaction over the Web implies a request for a Web page and/or a service from a Web server (either by using a bookmark, by clicking on ... Voir le document complet

39

Anomaly detection methods for detecting cyber attacks in industrial control systems

Anomaly detection methods for detecting cyber attacks in industrial control systems

... methods for early detection of novel cyber attacks (anomalies which are not included in the training) while keeping false alarm rates ...baseline approach is based on the multivariate ... Voir le document complet

123

Detecting Non-Sibling Dependencies in OpenMP Task-Based Applications

Detecting Non-Sibling Dependencies in OpenMP Task-Based Applications

... material for the modi- fied scheduling ...task-based applications. For this purpose, data-race detection methods exist, based on either static, dynamic, or post-mortem ...support ... Voir le document complet

16

Detection of Side Channel Attacks Based on Data Tainting in Android Systems

Detection of Side Channel Attacks Based on Data Tainting in Android Systems

... third-party applications can leak personal data stored in the Android system by exploiting side ...private data by third-party apps ...taint in side channels. An attacker can ... Voir le document complet

15

An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment

An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment

... similar approach has been proposed by Jeyanthi and Iyengar [ 18 ...this approach is the ability to increase the attack detec- tion accuracy because multiple stages of detection are ...IDSs in cloud ... Voir le document complet

19

A DL-Based Approach to Integrate Relational Data Sources into the Semantic Web

A DL-Based Approach to Integrate Relational Data Sources into the Semantic Web

... SEMANTIC WEB ENVIRONMENT 35 3.1 Semantic Web Environment Being an effort of a large number of researchers and industrial partners led by W3C, the Semantic Web (SW) is an extension of ... Voir le document complet

272

A clustering approach for detecting defects in technical documents

A clustering approach for detecting defects in technical documents

... unambiguous for any domain ...inconsistency in the underlying meaning of ...is an obviously time-consum- ing and costly task. We focus in this paper on two critical issues in writing ... Voir le document complet

8

Loosely Coupled Approach for Web-Based Collaborative 3D Design

Loosely Coupled Approach for Web-Based Collaborative 3D Design

... presents an original event-driven architecture for 3D web-based modeling in ...event-driven approach exposes several benefits in this context: the history of modifica- ... Voir le document complet

6

Loosely Coupled Approach for Web-Based Collaborative 3D Design

Loosely Coupled Approach for Web-Based Collaborative 3D Design

... consists, for a peer, of asking all connected peers for their ...number for each event ...recovery). For instance, a 3DEvent instance (idA) joins the network when other 3DEvent instances are ... Voir le document complet

5

Defending against side-channel attacks : DynamoREA

Defending against side-channel attacks : DynamoREA

... Since we need to maintain the ideal machine abstraction by ensuring that real time is less than ideal time at every observable action, to calculate ideal time a[r] ... Voir le document complet

68

Monitoring Web Service Networks in a Model-based Approach

Monitoring Web Service Networks in a Model-based Approach

... is an example described in the BPEL specification ...diagramed in Figure 1. It contains five activities (big shaded blocks). An activity involves a set of input and output variables (dotted ... Voir le document complet

14

Data-Injection Attacks

Data-Injection Attacks

... bound in Theorem 9.8 as a function of number of sample for ρ = ...lem in which the attacker aims to simultaneously minimize the MSE distortion induced by the injection vector and the probability of ... Voir le document complet

38

An Ontology for Attacks in Wireless Sensor Networks

An Ontology for Attacks in Wireless Sensor Networks

... Ontology for attacks in WSNs 7 (a) (b) (c) (d) Figure 2: Attacks on ...nd data packet and to jam ...when data packets will arrive and then apply the ...dierent data ... Voir le document complet

17

Application-Oriented Approach for Detecting Cyberaggression in Social Media

Application-Oriented Approach for Detecting Cyberaggression in Social Media

... analysis. In fact, there are many comments that use outright and clearly visible offensive terms: “Ich bin dafür, dass wir die Gaskammern wieder öffnen und die ganze Brut da ...am in favor of opening the ... Voir le document complet

8

Show all 10000 documents...