In recent years, web applications have become tremendously popular. However, vulnerabilities are pervasive resulting in exposure of organizations and firms to a wide array of risks. SQL injection attacks, which has be...
详细信息
In recent years, web applications have become tremendously popular. However, vulnerabilities are pervasive resulting in exposure of organizations and firms to a wide array of risks. SQL injection attacks, which has been ranked at the top in web application attack mechanisms used by hackers can potentially result in unauthorized access to confidential information stored in a backend database and the hackers can take advantages due to flawed design, improper coding practices, improper validations of user input, configuration errors, or other weaknesses in the infrastructure. Whereas using cross-site scripting techniques, miscreants can hijack Web sessions, and craft credible phishing sites. In this paper we have made a survey on different techniques to prevent SQLi and XSS attacks and we proposed a solution to detect and prevent against the malicious attacks over the developer's Web application written in programming languages like PHP, *** and JSP also we have created an API (applicationprogramming Interface) in native language through which transactions and interactions are sent to IDS Server through Inter Server Communication Mechanism. This IDS Server which is developed from PHPIDS, a purely PHP based intrusion detection system and has a system architecture meant only for PHP application detects and prevents attacks like SQLi (SQL Injection) and XSS(Cross-site scripting), LFI(Local File Inclusion), and RFE(Remote File Execution) and returns back the result to the Web application and logs the intrusions. In addition to this behavioural pattern of Web Logs is analysed using WAPT algorithm (Web Access Pattern Tree), which helps in recording the activity of the web application and examines any suspicious behaviour, uncommon patterns of behaviour over a period of time, and it also monitors the increased activity and known attack variants. Based on this an report is generated dynamically using P-Chart which can help the Website owner to increase the security measur
The paper investigates the capabilities for third party control on instant messaging functions in all IP-based managed networks. The open access to network functions is provided through Open Service Access (OSA) inter...
详细信息
The paper investigates the capabilities for third party control on instant messaging functions in all IP-based managed networks. The open access to network functions is provided through Open Service Access (OSA) interfaces. A mapping of OSA User Interaction interfaces onto Session Initiation Protocol and Message Session Relay Protocol is proposed. A formal approach to functional verification of OSA gateway behavior is suggested.
Access to hardware devices is an important requirement to be fulfilled by Java implementations targeting embedded systems because the interaction between the embedded system and the environment where it is inserted on...
详细信息
Access to hardware devices is an important requirement to be fulfilled by Java implementations targeting embedded systems because the interaction between the embedded system and the environment where it is inserted on is performed by these *** this paper we introduce a method for abstracting hardware devices to embedded Java applications. We have evaluated our method in terms of performance, memory footprint, and portability. The applicability of our method was tested for abstracting simple hardware devices for serial communication and for abstracting more complex components such as a motion estimator for H.264 video coding.
Code examples are important resources for expressing correct applicationprogramming interface (API) usages. However, many framework and library APIs fail in offering sufficient code examples in corresponding API docu...
详细信息
Code examples are important resources for expressing correct applicationprogramming interface (API) usages. However, many framework and library APIs fail in offering sufficient code examples in corresponding API documentations. This is because constructing proper code examples for documentation purpose takes significant developers' efforts. To reduce such effort, this work proposes a methodology, PropER-Doc, that recommends proper code examples for documentation purpose. PropER-Doc accepts queries from API developers and utilizes code search engines (CSEs) to collect corresponding code example candidates. The structural and conceptual links between API elements are captured from the API implementation and available API documents to guide candidate recommendation. During recommendation, PropER-Doc groups collected candidates based on involved API types for distinguishing different API usages. To assist API developers in selecting proper candidates, a diagrammatic presentation and three code example appropriateness metrics are also developed in {PropER-Doc}. Two case studies on Eclipse JDT framework are conducted to confirm the effectiveness of PropER-Doc.
We describe the design of a comparable corpus that spans all of the world's languages and facilitates large-scale cross-linguistic processing. This Universal Corpus consists of text collections aligned at the docu...
详细信息
ISBN:
(纸本)9781618392497
We describe the design of a comparable corpus that spans all of the world's languages and facilitates large-scale cross-linguistic processing. This Universal Corpus consists of text collections aligned at the document and sentence level, multilingual wordlists, and a small set of morphological, lexical, and syntactic annotations. The design encompasses submission, storage, and access. Submission preserves the integrity of the work, allows asynchronous updates, and facilitates scholarly citation. Storage employs a cloud-hosted filestore containing normalized source data together with a database of texts and annotations. Access is permitted to the filestore, the database, and an applicationprogramming interface. All aspects of the Universal Corpus are open, and we invite community participation in its design and implementation, and in supplying and using its data.
The paper describes a formal approach to specification of Open Service Access (OSA) gateway that supports open interfaces for charging and quality of service management and Diameter protocol. The gateway has to implem...
详细信息
The paper describes a formal approach to specification of Open Service Access (OSA) gateway that supports open interfaces for charging and quality of service management and Diameter protocol. The gateway has to implement two mutually synchronized finite state machines, one representing the application view on the charging session and another one for the Diameter peer. Both state machines are formally described as Labeled Transition Systems and their behavioral equivalence is proved using the concept of week bisimulation. An example of OSA application quality of service based charging application is provided.
Multiview autostereoscopic systems display three-dimensional (3D) images interleaved from parallax images to provide adequate viewing zones for viewers. A 3D image synthesizing method based on parallel processing with...
详细信息
Multiview autostereoscopic systems display three-dimensional (3D) images interleaved from parallax images to provide adequate viewing zones for viewers. A 3D image synthesizing method based on parallel processing with Graphic Processing Unit (GPU) is proposed to accelerate the image synthesizing for real-time autostereoscopic displays. The GPU-based 3D image synthesizing method is implemented with Direct3D applicationprogramming Interface (API) library. Compared with traditional methods using Central Processing Unit (CPU), the proposed method takes advantage of GPU graphic processing. The experiments prove that GPU-based 3D image synthesizing method can meet the requirement of real-time 3D image synthesizing and perform well in stereoscopic sense.
Virtual Reality (VR) has been widely used for medical area applications in order to help students and health care professionals to practice procedures before execute them on real patients. The evaluation of the user...
详细信息
Virtual Reality (VR) has been widely used for medical area applications in order to help students and health care professionals to practice procedures before execute them on real patients. The evaluation of the user's learning is a very important step in any educational process, including systems for medical training. Serious Games are intended to employ entertaining aspects to training, knowledge transfer and simulations. This category of software can provide more motivation in the use of tools for training and also help in the evaluation of the learner. The aim of this paper is to present a serious game as a way to enhance the user experience in the use of medical training tools that use VR. This serious game contains entertaining aspects that are designed to stimulate the student to perform virtually the examination of breast biopsy.
In order to make content independent of LMS where it is deployed standards have been defined. These facilitate shareability, reusability, and interoperability of learning content. Many standards have evolved in last m...
详细信息
In order to make content independent of LMS where it is deployed standards have been defined. These facilitate shareability, reusability, and interoperability of learning content. Many standards have evolved in last many for this purpose. SCORM (Sharable Content Object reference Model) standard proposed by Advanced Distributed Learning (ADL) is the most popular and commonly used one. In this paper, we are explaining SCORM architecture and use of the SCORM package creator in Brihaspati-3 LMS.
Open Computing Language (R) (OpenCL (R)), which is created to support parallel programming of heterogeneous multicore-processor systems, has a very large potential for high-performance computing and consumer electroni...
详细信息
Open Computing Language (R) (OpenCL (R)), which is created to support parallel programming of heterogeneous multicore-processor systems, has a very large potential for high-performance computing and consumer electronics since it provides application programming interfaces (APIs) to help make a portable code that runs across multiple devices. OpenCL is still under development, and it is not clear whether OpenCL has any advantages over other frameworks aside from portability. The purpose of our project was to define evaluation criteria, empirically evaluate OpenCL as a programming framework using evaluation criteria (e.g., performance, productivity, and portability criteria), define and implement parallel primitives in OpenCL, and demonstrate how the use of the implemented parallel primitives can have benefits for our target applications. Parallel primitive library APIs are defined to implement parallel algorithms in OpenCL, and a set of data-and task-parallel primitives is implemented and incorporated in the target applications. Multicore central processing units, the Cell Broadband Engine (R) (Cell/B.E.(R)), and graphics processing units are used as target platforms, and digital TV applications are used to evaluate usefulness of OpenCL. Preliminary results show that parallel primitives can be one of the ways to improve application performance and programmer productivity with respect to OpenCL while still maintaining software portability.
暂无评论