Temes suggerits dins de la cerca
Temes suggerits dins de la cerca
Alternatives de cerca:
programming functionals » programming functional, programming function, programming fundamentals
function attacking » functions attacking, function tracking, function making
functionals https » functions https, function https, functionals hints
attacking https » teaching https
https function » its function, sites function, ups function
programming functionals » programming functional, programming function, programming fundamentals
function attacking » functions attacking, function tracking, function making
functionals https » functions https, function https, functionals hints
attacking https » teaching https
https function » its function, sites function, ups function
1
Publicat 2012
Taula de continguts:
“... of Drivers -- Attacks and Defenses -- Industrial Espionage and Targeted Attacks: Understanding...”Obtenir text complet
Electrònic
eBook
2
Publicat 2006
Taula de continguts:
“...802.11 De-authentication Attack Detection Using Genetic Programming -- 802.11 De-authentication...”Obtenir text complet
Electrònic
eBook
3
Publicat 2008
Taula de continguts:
“... of Programming -- The Tractability Frontier for NFA Minimization -- Finite Automata, Digraph Connectivity...”Obtenir text complet
Electrònic
eBook
4
Publicat 2012
Taula de continguts:
“... in Computer-Aided Cryptography: Proofs, Attacks and Designs -- Program Certification by Higher-Order Model...”Obtenir text complet
Electrònic
eBook
5
Programming Languages and Systems 24th European Symposium on Programming, ESOP 2015, Held as Part...
Publicat 2015
Taula de continguts:
“... Programs in Dynamic Languages -- Fine-Grained Detection of Privilege Escalation Attacks on Browser...”Obtenir text complet
Electrònic
eBook
6
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Publicat 2005
Taula de continguts:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”Obtenir text complet
Electrònic
eBook
7
Publicat 2012
Taula de continguts:
“... attacks -- ving the Usability of Specification Languages and Methods for Annotation-based Verification...”Obtenir text complet
Electrònic
eBook
8
Publicat 2008
Taula de continguts:
“... Programming -- An Algebra for Features and Feature Composition -- Petri Nets Are Dioids -- Towards...”Obtenir text complet
Electrònic
eBook
9
Publicat 2010
Taula de continguts:
“... on Outranking for Database Preference Queries -- Incremental Membership Function Updates -- A New Approach...”Obtenir text complet
Electrònic
eBook
10
Publicat 2008
Taula de continguts:
“... Global Path Planning in Time Varying Environments Based on a Cost Evaluation Function -- Grammar...”Obtenir text complet
Electrònic
eBook
11
Publicat 2008
Taula de continguts:
“...1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without...”Obtenir text complet
Electrònic
eBook
12
Publicat 2008
Taula de continguts:
“... Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3...”Obtenir text complet
Electrònic
eBook
13
Publicat 2010
Taula de continguts:
“... World -- Control Systems Security -- Modeling Control System Failures and Attacks – The Waterloo...”Obtenir text complet
Electrònic
eBook
14
Publicat 2005
Taula de continguts:
“... -- An Optimal Algorithm for Querying Priced Information: Monotone Boolean Functions and Game Trees -- Online...”Obtenir text complet
Electrònic
eBook
15
Publicat 2010
Taula de continguts:
“... of Genetic Programming Evolved Classifier Expressions Using Particle Swarm Optimization -- Developing...”Obtenir text complet
Electrònic
eBook
16
Publicat 2010
Taula de continguts:
“... Classification Rules with Gene Expression Programming: A Preliminary Study -- Solving Classification Problems...”Obtenir text complet
Electrònic
eBook
17
Publicat 2006
Taula de continguts:
“...) Probability Function for FMS IP Trace-Back Technique -- A Mechanism for Detection and Prevention...”Obtenir text complet
Electrònic
eBook
18
Publicat 2010
Taula de continguts:
“... Using All-Or-Nothing Transform Encryption -- Prevention of Wormhole Attacks in Mobile Ad Hoc Networks...”Obtenir text complet
Electrònic
eBook
19
Publicat 2005
Taula de continguts:
“... with Infinite Strategic Space -- On the Online Dial-A-Ride Problem with Time-Windows -- Semidefinite Programming...”Obtenir text complet
Electrònic
eBook
20
Publicat 2008
Taula de continguts:
“...-the-Box Attacks -- Invited Tutorials -- Assertion-Based Verification: Industry Myths to Realities (Invited...”Obtenir text complet
Electrònic
eBook



