Suggested Topics within your search.
Suggested Topics within your search.
Search alternatives:
programs functional » programming functional, proteins functional, processes functional
function attacking » functions attacking, function tracking, function making
functional https » functions https, function https, functional hop
attacking https » teaching https
https function » its function, sites function, ups function
programs functional » programming functional, proteins functional, processes functional
function attacking » functions attacking, function tracking, function making
functional https » functions https, function https, functional hop
attacking https » teaching https
https function » its function, sites function, ups function
1
Published 2012
Table of Contents:
“... of Drivers -- Attacks and Defenses -- Industrial Espionage and Targeted Attacks: Understanding...”View full text
Electronic
eBook
2
Published 2006
Table of Contents:
“...802.11 De-authentication Attack Detection Using Genetic Programming -- 802.11 De-authentication...”View full text
Electronic
eBook
3
Published 2012
Table of Contents:
“... in Computer-Aided Cryptography: Proofs, Attacks and Designs -- Program Certification by Higher-Order Model...”View full text
Electronic
eBook
4
Published 2008
Table of Contents:
“... of Programming -- The Tractability Frontier for NFA Minimization -- Finite Automata, Digraph Connectivity...”View full text
Electronic
eBook
5
Programming Languages and Systems 24th European Symposium on Programming, ESOP 2015, Held as Part...
Published 2015
Table of Contents:
“... Programs in Dynamic Languages -- Fine-Grained Detection of Privilege Escalation Attacks on Browser...”View full text
Electronic
eBook
6
Programming Languages and Systems 14th European Symposium on Programming, ESOP 2005, Held as Part...
Published 2005
Table of Contents:
“...Programming with Explicit Security Policies -- Trace Partitioning in Abstract Interpretation Based...”View full text
Electronic
eBook
7
Published 2012
Table of Contents:
“... attacks -- ving the Usability of Specification Languages and Methods for Annotation-based Verification...”View full text
Electronic
eBook
8
Published 2008
Table of Contents:
“... Programming -- An Algebra for Features and Feature Composition -- Petri Nets Are Dioids -- Towards...”View full text
Electronic
eBook
9
Published 2010
Table of Contents:
“... on Outranking for Database Preference Queries -- Incremental Membership Function Updates -- A New Approach...”View full text
Electronic
eBook
10
Published 2008
Table of Contents:
“... Global Path Planning in Time Varying Environments Based on a Cost Evaluation Function -- Grammar...”View full text
Electronic
eBook
11
Published 2008
Table of Contents:
“...1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without...”View full text
Electronic
eBook
12
Published 2008
Table of Contents:
“...-the-Box Attacks -- Invited Tutorials -- Assertion-Based Verification: Industry Myths to Realities (Invited...”View full text
Electronic
eBook
13
Published 2010
Table of Contents:
“... the Security in the GSM Radio Network Using Attack Jungles -- Formal Modeling and Verification of Sensor...”View full text
Electronic
eBook
14
Published 2005
Table of Contents:
“... -- On the Complexity of Universal Programs -- Finite Sets of Words and Computing -- Universality and Cellular Automata...”View full text
Electronic
eBook
15
Published 2014
Table of Contents:
“... -- Symbolic Resource Bound Inference for Functional Programs -- Proving Non-termination Using Max-SMT...”View full text
Electronic
eBook
16
Published 2007
Table of Contents:
“... of Human Activity -- Integration Use Cases – An Applied UML Technique for Modeling Functional Requirements...”View full text
Electronic
eBook
17
Published 2008
Table of Contents:
“... -- Analyzing Stripped Device-Driver Executables -- Model Checking-Based Genetic Programming with an Application...”View full text
Electronic
eBook
18
Published 2008
Table of Contents:
“... Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3...”View full text
Electronic
eBook
19
Published 2005
Table of Contents:
“... Functions -- Fast Generic Model-Checking for Data-Based Systems -- Logic and Model Checking for Hidden...”View full text
Electronic
eBook
20
Published 2010
Table of Contents:
“... World -- Control Systems Security -- Modeling Control System Failures and Attacks – The Waterloo...”View full text
Electronic
eBook



