Does licensing require new access control techniques?
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Does licensing require new access control techniques?
Communications of the ACM
Companion Viruses and the Macintosh: Threats and Countermeasures
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Prevention of information attacks by run-time detection of self-replication in computer codes
Journal of Computer Security
A semantics-based approach to malware detection
ACM Transactions on Programming Languages and Systems (TOPLAS)
Hi-index | 0.02 |