New challenges in teaching database security
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
AWE: improving software analysis through modular integration of static and dynamic analyses
PASTE '07 Proceedings of the 7th ACM SIGPLAN-SIGSOFT workshop on Program analysis for software tools and engineering
Probabilistic suffix models for API sequence analysis of Windows XP applications
Pattern Recognition
Design and implementation of an isolated sandbox with mimetic internet used to analyze malwares
DETER Proceedings of the DETER Community Workshop on Cyber Security Experimentation and Test on DETER Community Workshop on Cyber Security Experimentation and Test 2007
Detecting energy-greedy anomalies and mobile malware variants
Proceedings of the 6th international conference on Mobile systems, applications, and services
An undergraduate rootkit research project: How available? How hard? How dangerous?
Proceedings of the 4th annual conference on Information security curriculum development
Design issues of an isolated sandbox used to analyze malwares
IWSEC'07 Proceedings of the Security 2nd international conference on Advances in information and computer security
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Propagation modeling and analysis of network worm attack
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
Intrusion detection system based on multi-class SVM
RSFDGrC'05 Proceedings of the 10th international conference on Rough Sets, Fuzzy Sets, Data Mining, and Granular Computing - Volume Part II
Hi-index | 0.00 |