From post

Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications.

, , , и . RAID, том 4637 из Lecture Notes in Computer Science, стр. 63-86. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners., , и . DIMVA, том 6201 из Lecture Notes in Computer Science, стр. 111-131. Springer, (2010)Think Outside the Dataset: Finding Fraudulent Reviews using Cross-Dataset Analysis., , , , и . WWW, стр. 3108-3115. ACM, (2019)Escape from Monkey Island: Evading High-Interaction Honeyclients., , , и . DIMVA, том 6739 из Lecture Notes in Computer Science, стр. 124-143. Springer, (2011)EVILCOHORT: Detecting Communities of Malicious Accounts on Online Services., , , , , и . USENIX Security Symposium, стр. 563-578. USENIX Association, (2015)Behavior-based Spyware Detection, , , , и . #SEC06#, (2006)Cross-Site Scripting Prevention with Dynamic Data Tainting and Static Analysis, , , , , и . #NDSS07#, (2007)Noxes: a client-side solution for mitigating cross-site scripting attacks., , , и . SAC, стр. 330-337. ACM, (2006)Towards Detecting Compromised Accounts on Social Networks., , , и . CoRR, (2015)CLAPP: characterizing loops in Android applications., , , , и . ESEC/SIGSOFT FSE, стр. 687-697. ACM, (2015)Understanding fraudulent activities in online ad exchanges., , , , , и . Internet Measurement Conference, стр. 279-294. ACM, (2011)