An introduction to genetic algorithms
An introduction to genetic algorithms
Randomized instruction set emulation to disrupt binary code injection attacks
Proceedings of the 10th ACM conference on Computer and communications security
Address obfuscation: an efficient approach to combat a board range of memory error exploits
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
A survey and experimental evaluation of image spam filtering techniques
Pattern Recognition Letters
Infrastructures for information technology systems: perspectives on their evolution and impact
SERA'04 Proceedings of the Second international conference on Software Engineering Research, Management and Applications
Using a high assurance TCB for infrastructure security
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
Hi-index | 0.00 |
Today's computers are fighting daily battles with virus writers, spam distributors, organized criminals, and other Internet attackers. To keep up with malware writers, software developers must adopt a model for securing software that draws from animal evolution.