A Scalable Approach for Vulnerability Discovery Based on Security Patches (Englisch)
- Neue Suche nach: Li, Hongzhe
- Neue Suche nach: Kwon, Hyuckmin
- Neue Suche nach: Kwon, Jonghoon
- Neue Suche nach: Lee, Heejo
- Neue Suche nach: Li, Hongzhe
- Neue Suche nach: Kwon, Hyuckmin
- Neue Suche nach: Kwon, Jonghoon
- Neue Suche nach: Lee, Heejo
In:
ATIS, International Conference on Applications and Techniques in Information Security, 5
;
109-122
;
2014
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:A Scalable Approach for Vulnerability Discovery Based on Security Patches
-
Beteiligte:Li, Hongzhe ( Autor:in ) / Kwon, Hyuckmin ( Autor:in ) / Kwon, Jonghoon ( Autor:in ) / Lee, Heejo ( Autor:in )
-
Erschienen in:Communications in Computer and Information Science ; 490 ; 109-122
-
Verlag:
-
Erscheinungsdatum:2014
-
Format / Umfang:14 Seiten
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Reportnr. / Förderkennzeichen:Chapter 11
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
System-Level Permission Management Mechanism of Android DeviceZhu, D. / Fan, Z. / Pang, N. et al. | 2014
- 13
-
Enhancing Security of the Android Platform via Multi-level Security ModelOh, J.-S. / Park, M.-W. / Chung, T.-M. et al. | 2014
- 25
-
A Competitive Three-Level Pruning Technique for Information SecurityChowdhury, M. / Abawajy, J. / Kelarev, A. / Sakurai, K. et al. | 2014
- 33
-
Popularity Prediction of Tianya BBS Posts Based on User BehaviorLi, G. / Hu, Y. / Yu, Y. et al. | 2014
- 44
-
Design and Implementation of Network User Behaviors Analysis Based on Hadoop for Big DataGuan, J. / Yao, S. / Xu, C. / Zhang, H. et al. | 2014
- 56
-
The Research of Extraction Algorithm for Target Feature of Chest BitmapLiu, T. / Liu, R. / Wang, H. / Zhang, L. / Wang, C. et al. | 2014
- 65
-
A Method for Detecting Trojan Based on Hidden Network Traffic AnalysisChen, Z. / Tao, Y. / Li, G. et al. | 2014
- 73
-
A Survey on Encrypted Traffic ClassificationCao, Z. / Xiong, G. / Zhao, Y. / Li, Z. / Guo, L. et al. | 2014
- 82
-
An Approach to Detect the Internet Water Army via Dirichlet Process Mixture Model Based GSP AlgorithmLi, D. / Li, Q. / Hu, Y. / Niu, W. / Tan, J. / Guo, L. et al. | 2014
- 96
-
Modeling and Analysis of Network Survivability under Attack PropagationYao, S. / Guan, J. / Ding, S. / Zhang, H. / Song, F. et al. | 2014
- 109
-
A Scalable Approach for Vulnerability Discovery Based on Security PatchesLi, H. / Kwon, H. / Kwon, J. / Lee, H. et al. | 2014
- 123
-
Modeling the Effect of Infection Time on Active Worm PropagationsLiu, H. / Ma, X. / Wang, T. / Ding, B. / Lu, Q. et al. | 2014
- 135
-
Location Privacy Preserving for Semantic-Aware ApplicationsZhang, L. / Xiong, P. / Zhu, T. et al. | 2014
- 147
-
Analysis on the Reliability of Non-repairable and Repairable Network Storage SystemsYin, M. / Wu, C. / Tao, Y. et al. | 2014
- 159
-
Homomorphic Cryptography-Based Privacy-Preserving Network CommunicationsGuellier, A. / Bidan, C. / Prigent, N. et al. | 2014
- 171
-
The 0-1 Knapsack Polytope - A Starting Point for Cryptanalysis of Knapsack Ciphers?Mak-Hau, V.H. / Batten, L.M. et al. | 2014
- 183
-
Forensic Identification of Students Outsourcing Assignment Projects from Freelancer.comMonnik, M. / Pan, L. et al. | 2014
- 191
-
A Novel Method for Detecting Double Compressed Facebook JPEG ImagesAllan, N.G. / Pan, L. / Xiang, Y. et al. | 2014
- 199
-
Using Randomization to Attack Similarity DigestsOliver, J. / Forman, S. / Cheng, C. et al. | 2014
- 211
-
Research of Password Recovery Method for RAR Based on Parallel Random SearchGe, L. / Wang, L. et al. | 2014
- 219
-
Sybil-Resist: A New Protocol for Sybil Attack Defense in Social NetworkMa, W. / Hu, S.-Z. / Dai, Q. / Wang, T.-T. / Huang, Y.-F. et al. | 2014
- 231
-
PAITS: Detecting Masquerader via Short-Lived Interventional Mouse DynamicsChen, X.-j. / Shi, J.-q. / Xu, R. / Yiu, S.M. / Fang, B.-x. / Xu, F. et al. | 2014
- 243
-
Social Engineering through Social Media: An Investigation on Enterprise SecurityWilcox, H. / Bhattacharya, M. / Islam, R. et al. | 2014
- 256
-
Efficient Key Pre-distribution for 6LoWPANSmeets, R. / Mentens, N. / Aerts, K. / Singelee, D. / Braeken, A. / Carlier, M. / Segers, L. / Steenhaut, K. / Touhafi, A. et al. | 2014