Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
function attacking » functions attacking, function tracking, function making
program computing » program comparing, programs compiling, problem computing
attacking https » teaching https
https function » its function, sites function, ups function
function attacking » functions attacking, function tracking, function making
program computing » program comparing, programs compiling, problem computing
attacking https » teaching https
https function » its function, sites function, ups function
1
Published 2012
Table of Contents:
“... of Drivers -- Attacks and Defenses -- Industrial Espionage and Targeted Attacks: Understanding...”View full text
Electronic
eBook
2
Published 2008
Table of Contents:
“... of Programming -- The Tractability Frontier for NFA Minimization -- Finite Automata, Digraph Connectivity...”View full text
Electronic
eBook
3
Published 2006
Table of Contents:
“...802.11 De-authentication Attack Detection Using Genetic Programming -- 802.11 De-authentication...”View full text
Electronic
eBook
4
Published 2012
Table of Contents:
“... in Computer-Aided Cryptography: Proofs, Attacks and Designs -- Program Certification by Higher-Order Model...”View full text
Electronic
eBook
5
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Published 2005
Table of Contents:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”View full text
Electronic
eBook
6
Published 2008
Table of Contents:
“...-the-Box Attacks -- Invited Tutorials -- Assertion-Based Verification: Industry Myths to Realities (Invited...”View full text
Electronic
eBook
7
Published 2015
Table of Contents:
“... with Structural Plasticity: Attacking the Subset Sum Problem -- P Systems with Generalized Multisets over Totally...”View full text
Electronic
eBook
8
Published 2014
Table of Contents:
“... -- Symbolic Resource Bound Inference for Functional Programs -- Proving Non-termination Using Max-SMT...”View full text
Electronic
eBook
9
Published 2006
Table of Contents:
“... of Distributed Denial of Service Attacks -- Session II B: Grid and P2P Computing -- Auction Based Resource...”View full text
Electronic
eBook
10
Published 2005
Table of Contents:
“... -- On the Complexity of Universal Programs -- Finite Sets of Words and Computing -- Universality and Cellular Automata...”View full text
Electronic
eBook
11
Programming Languages and Systems 24th European Symposium on Programming, ESOP 2015, Held as Part...
Published 2015
Table of Contents:
“... Programs in Dynamic Languages -- Fine-Grained Detection of Privilege Escalation Attacks on Browser...”View full text
Electronic
eBook
12
Published 2010
Table of Contents:
“... Without Prior Fault Data -- Models of Computation for Heterogeneous Embedded Systems -- A Quotient-Graph...”View full text
Electronic
eBook
13
Computer Mathematics 9th Asian Symposium (ASCM2009), Fukuoka, December 2009, 10th Asian Symposium...
Published 2014
Table of Contents:
“... in the Evaluations -- An Incremental Algorithm for Computing Cylindrical Algebraic Decompositions -- Finding...”View full text
Electronic
eBook
14
Published 2007
Table of Contents:
“... Shortcut to Information Security Management Success -- Intrusion Attack Tactics for the Model Checking of e...”View full text
Electronic
eBook
15
Published 2015
Table of Contents:
“...Binary Bat Algorithm: On the Efficiency of Mapping Functions When Handling Binary Problems Using...”View full text
Electronic
eBook
16
Published 2014
Table of Contents:
“...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...”View full text
Electronic
eBook
17
Published 2012
Table of Contents:
“... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...”View full text
Electronic
eBook
18
Published 2007
Table of Contents:
“... Computation in Large Territories -- Non-equilibrium Thermodynamics, Thermomechanics, Geodynamics -- A Finite...”View full text
Electronic
eBook
19
Published 2006
Table of Contents:
“... -- Forward Secure Communication in Wireless Sensor Networks -- Mechanisms -- Low Rate DoS Attack...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“...EvoCOMNET Contributions -- Detection of DDoS Attacks via an Artificial Immune System-Inspired...”View full text
Electronic
eBook



