Search alternatives:
function attacking » functions attacking, function tracking, function making
program function » programme function, programs functional, program foundation
attacking https » teaching https
function https » functions https, fiction https
https function » its function, sites function, ups function
1
Published 2012
Table of Contents: ... of Drivers -- Attacks and Defenses -- Industrial Espionage and Targeted Attacks: Understanding...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ...802.11 De-authentication Attack Detection Using Genetic Programming -- 802.11 De-authentication...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... of Programming -- The Tractability Frontier for NFA Minimization -- Finite Automata, Digraph Connectivity...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... in Computer-Aided Cryptography: Proofs, Attacks and Designs -- Program Certification by Higher-Order Model...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ... Programs in Dynamic Languages -- Fine-Grained Detection of Privilege Escalation Attacks on Browser...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...
View full text
Electronic eBook
7
Published 2012
Table of Contents: ... attacks -- ving the Usability of Specification Languages and Methods for Annotation-based Verification...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... Programming -- An Algebra for Features and Feature Composition -- Petri Nets Are Dioids -- Towards...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... on Outranking for Database Preference Queries -- Incremental Membership Function Updates -- A New Approach...
View full text
Electronic eBook
10
Published 2008
Table of Contents: ... Global Path Planning in Time Varying Environments Based on a Cost Evaluation Function -- Grammar...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ...1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ...-the-Box Attacks -- Invited Tutorials -- Assertion-Based Verification: Industry Myths to Realities (Invited...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... the Security in the GSM Radio Network Using Attack Jungles -- Formal Modeling and Verification of Sensor...
View full text
Electronic eBook
14
Published 2014
Table of Contents: ... -- Symbolic Resource Bound Inference for Functional Programs -- Proving Non-termination Using Max-SMT...
View full text
Electronic eBook
15
Published 2008
Table of Contents: ... -- Analyzing Stripped Device-Driver Executables -- Model Checking-Based Genetic Programming with an Application...
View full text
Electronic eBook
16
Published 2007
Table of Contents: ... of Human Activity -- Integration Use Cases – An Applied UML Technique for Modeling Functional Requirements...
View full text
Electronic eBook
17
Published 2008
Table of Contents: ... Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... World -- Control Systems Security -- Modeling Control System Failures and Attacks – The Waterloo...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... of Genetic Programming Evolved Classifier Expressions Using Particle Swarm Optimization -- Developing...
View full text
Electronic eBook
20
Published 2010
Table of Contents: ... Using All-Or-Nothing Transform Encryption -- Prevention of Wormhole Attacks in Mobile Ad Hoc Networks...
View full text
Electronic eBook