Search
Now showing items 1-2 of 2
Effective SQL Injection Attack Reconstruction Using Network Recording
(2011-11-18)
Utilizing the location-awareness of mobile devices in developing innovative mobile application system has attracted much attention of academic researchers and commercial application developers. Location-based mobile learning ...
Multitenancy - Security Risks and Countermeasures
(2013-03-05)
Security within the cloud is of paramount importance as the interest and indeed utilization of cloud computing increase. Multitenancy in particular introduces unique security risks to cloud computing as a result of more ...