Search alternatives:
function attacking » functions attacking, function tracking, function making
program computing » program comparing, programs compiling, problem computing
attacking https » teaching https
https function » its function, sites function, ups function
1
Published 2012
Table of Contents: ... of Drivers -- Attacks and Defenses -- Industrial Espionage and Targeted Attacks: Understanding...
View full text
Electronic eBook
2
Published 2008
Table of Contents: ... of Programming -- The Tractability Frontier for NFA Minimization -- Finite Automata, Digraph Connectivity...
View full text
Electronic eBook
3
Published 2006
Table of Contents: ...802.11 De-authentication Attack Detection Using Genetic Programming -- 802.11 De-authentication...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... in Computer-Aided Cryptography: Proofs, Attacks and Designs -- Program Certification by Higher-Order Model...
View full text
Electronic eBook
5
Published 2005
Table of Contents: ...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...
View full text
Electronic eBook
6
Published 2008
Table of Contents: ...-the-Box Attacks -- Invited Tutorials -- Assertion-Based Verification: Industry Myths to Realities (Invited...
View full text
Electronic eBook
7
Published 2015
Table of Contents: ... with Structural Plasticity: Attacking the Subset Sum Problem -- P Systems with Generalized Multisets over Totally...
View full text
Electronic eBook
8
Published 2014
Table of Contents: ... -- Symbolic Resource Bound Inference for Functional Programs -- Proving Non-termination Using Max-SMT...
View full text
Electronic eBook
9
Published 2006
Table of Contents: ... of Distributed Denial of Service Attacks -- Session II B: Grid and P2P Computing -- Auction Based Resource...
View full text
Electronic eBook
10
Published 2005
Table of Contents: ... -- On the Complexity of Universal Programs -- Finite Sets of Words and Computing -- Universality and Cellular Automata...
View full text
Electronic eBook
11
Published 2015
Table of Contents: ... Programs in Dynamic Languages -- Fine-Grained Detection of Privilege Escalation Attacks on Browser...
View full text
Electronic eBook
12
Published 2010
Table of Contents: ... Without Prior Fault Data -- Models of Computation for Heterogeneous Embedded Systems -- A Quotient-Graph...
View full text
Electronic eBook
13
Published 2014
Table of Contents: ... in the Evaluations -- An Incremental Algorithm for Computing Cylindrical Algebraic Decompositions -- Finding...
View full text
Electronic eBook
14
Published 2007
Table of Contents: ... Shortcut to Information Security Management Success -- Intrusion Attack Tactics for the Model Checking of e...
View full text
Electronic eBook
15
Published 2015
Table of Contents: ...Binary Bat Algorithm: On the Efficiency of Mapping Functions When Handling Binary Problems Using...
View full text
Electronic eBook
16
Published 2014
Table of Contents: ...: A Literature Survey -- Detection of Web Based Attacks by Analyzing Web Server Log Files -- A Survey...
View full text
Electronic eBook
17
Published 2012
Table of Contents: ... of Quality Metrics for Functional Safety in Systems of Cooperative Vehicles -- From Autonomous Vehicles...
View full text
Electronic eBook
18
Published 2007
Table of Contents: ... Computation in Large Territories -- Non-equilibrium Thermodynamics, Thermomechanics, Geodynamics -- A Finite...
View full text
Electronic eBook
19
Published 2006
Table of Contents: ... -- Forward Secure Communication in Wireless Sensor Networks -- Mechanisms -- Low Rate DoS Attack...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ...EvoCOMNET Contributions -- Detection of DDoS Attacks via an Artificial Immune System-Inspired...
View full text
Electronic eBook