Search alternatives:
programming function » programming functional, programming functionals, programme function
function attacking » functions attacking, function tracking, function making
attacking https » teaching https
function https » functions https, fiction https
https function » its function, sites function, ups function
1
Published 2012
Table of Contents: ... of Drivers -- Attacks and Defenses -- Industrial Espionage and Targeted Attacks: Understanding...
View full text
Electronic eBook
2
Published 2006
Table of Contents: ...802.11 De-authentication Attack Detection Using Genetic Programming -- 802.11 De-authentication...
View full text
Electronic eBook
3
Published 2008
Table of Contents: ... of Programming -- The Tractability Frontier for NFA Minimization -- Finite Automata, Digraph Connectivity...
View full text
Electronic eBook
4
Published 2012
Table of Contents: ... in Computer-Aided Cryptography: Proofs, Attacks and Designs -- Program Certification by Higher-Order Model...
View full text
Electronic eBook
5
Published 2015
Table of Contents: ... Programs in Dynamic Languages -- Fine-Grained Detection of Privilege Escalation Attacks on Browser...
View full text
Electronic eBook
6
Published 2005
Table of Contents: ...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...
View full text
Electronic eBook
7
Published 2012
Table of Contents: ... attacks -- ving the Usability of Specification Languages and Methods for Annotation-based Verification...
View full text
Electronic eBook
8
Published 2008
Table of Contents: ... Programming -- An Algebra for Features and Feature Composition -- Petri Nets Are Dioids -- Towards...
View full text
Electronic eBook
9
Published 2010
Table of Contents: ... on Outranking for Database Preference Queries -- Incremental Membership Function Updates -- A New Approach...
View full text
Electronic eBook
10
Published 2008
Table of Contents: ... Global Path Planning in Time Varying Environments Based on a Cost Evaluation Function -- Grammar...
View full text
Electronic eBook
11
Published 2008
Table of Contents: ...1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without...
View full text
Electronic eBook
12
Published 2008
Table of Contents: ... Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3...
View full text
Electronic eBook
13
Published 2010
Table of Contents: ... World -- Control Systems Security -- Modeling Control System Failures and Attacks – The Waterloo...
View full text
Electronic eBook
14
Published 2010
Table of Contents: ... of Genetic Programming Evolved Classifier Expressions Using Particle Swarm Optimization -- Developing...
View full text
Electronic eBook
15
Published 2010
Table of Contents: ... Using All-Or-Nothing Transform Encryption -- Prevention of Wormhole Attacks in Mobile Ad Hoc Networks...
View full text
Electronic eBook
16
Published 2005
Table of Contents: ... -- An Optimal Algorithm for Querying Priced Information: Monotone Boolean Functions and Game Trees -- Online...
View full text
Electronic eBook
17
Published 2006
Table of Contents: ...) Probability Function for FMS IP Trace-Back Technique -- A Mechanism for Detection and Prevention...
View full text
Electronic eBook
18
Published 2010
Table of Contents: ... Classification Rules with Gene Expression Programming: A Preliminary Study -- Solving Classification Problems...
View full text
Electronic eBook
19
Published 2010
Table of Contents: ... in Distributed Environments by Simultaneous Fragmentation and Allocation -- Parallel Architectures -- Function...
View full text
Electronic eBook
20
Published 2005
Table of Contents: ... with Infinite Strategic Space -- On the Online Dial-A-Ride Problem with Time-Windows -- Semidefinite Programming...
View full text
Electronic eBook