Learn More
Current implementations of reflective Java typically either require access to source code, or require a modified Java platform. This makes them unsuitable for applying reflection to Commercial-off-the-Shelf (COTS) systems. The high level nature of Java bytecode makes on-the-fly rewritings of class files feasible and this has been exploited by a number of(More)
Mobile ad hoc network (MANET) security has become the focus of prolific research efforts. Driven by the unique and considerable difficulties of providing security arising from the dynamic nature of MANETs, many security schemes have been proposed. Rather than trying to encompass the entire field of MANET security, this paper focuses on networks using the(More)
The vesicular acetylcholine (ACh) transporter (VAChT) mediates ACh storage by synaptic vesicles. However, the VAChT-independent release of ACh is believed to be important during development. Here we generated VAChT knockout mice and tested the physiological relevance of the VAChT-independent release of ACh. Homozygous VAChT knockout mice died shortly after(More)
BACKGROUND Middle cerebral artery occlusion (MCAo) in mice results in a brain infarct, the volume of which depends on the length of occlusion. Following permanent occlusion, neuropathological changes - including a robust glial inflammatory response - also occur downstream of the infarct in the spinal cord. METHODS We have performed short, transient MCAo(More)
Client honeypots are security devices designed to find servers that attack clients. High-interaction client honey-pots (HICHPs) classify potentially malicious web pages by driving a dedicated vulnerable web browser to retrieve and classify these pages. Considering the size of the Internet, the ability to identify many malicious web pages is a crucial task.(More)
Client-side attacks have become an increasing problem on the Internet today. Malicious web pages launch so-called drive-by-download attacks that are capable to gain complete control of a user's machine by merely having that user visit a malicious web page. Criminals that are behind the majority of these malicious web pages are highly sensitive to location,(More)