Abstract interpretation-based semantic framework for software birthmark (English)
- New search for: Zeng, Y.
- New search for: Liu, F.
- New search for: Luo, X.
- New search for: Lian, S.
- New search for: Zeng, Y.
- New search for: Liu, F.
- New search for: Luo, X.
- New search for: Lian, S.
In:
COMPUTERS AND SECURITY
;
31
, 4
;
377-390
;
2012
-
ISSN:
- Article (Journal) / Print
-
Title:Abstract interpretation-based semantic framework for software birthmark
-
Contributors:
-
Published in:COMPUTERS AND SECURITY ; 31, 4 ; 377-390
-
Publisher:
- New search for: Elsevier Science B.V., Amsterdam.
-
Publication date:2012-01-01
-
Size:14 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 005.8
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 005.8 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 31, Issue 4
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 375
-
Editorial| 2012
- 377
-
Abstract interpretation-based semantic framework for software birthmarkZeng, Ying / Liu, FenLin / Luo, XiangYang / Lian, ShiGuo et al. | 2012
- 391
-
Performance analysis of Bayesian networks and neural networks in classification of file system activitiesKhan, Muhammad Naeem Ahmed et al. | 2012
- 402
-
MSABMS-based approach of detecting LDoS attackZhi-jun, Wu / Hai-tao, Zhang / Ming-hua, Wang / Bao-song, Pei et al. | 2012
- 418
-
SCADA security in the light of Cyber-WarfareNicholson, A. / Webber, S. / Dyer, S. / Patel, T. / Janicke, H. et al. | 2012
- 437
-
Encryption-based multilevel model for DBMSSallam, Ahmed I. / El-Rabaie, El-Sayed / Faragallah, Osama S. et al. | 2012
- 447
-
Dynamic risk-based decision methods for access control systemsShaikh, Riaz Ahmed / Adi, Kamel / Logrippo, Luigi et al. | 2012
- 465
-
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasuresSun, San-Tsai / Hawkey, Kirstie / Beznosov, Konstantin et al. | 2012
- 484
-
PIN selection policies: Are they really effective?Kim, Hyoungshick / Huh, Jun Ho et al. | 2012
- 497
-
CRiBAC: Community-centric role interaction based access control modelJung, Youna / Joshi, James B.D. et al. | 2012
- 524
-
FT-FW: A cluster-based fault-tolerant architecture for stateful firewallsAyuso, Pablo Neira / Gasca, Rafael M. / Lefevre, Laurent et al. | 2012
- 540
-
domRBAC: An access control model for modern collaborative systemsGouglidis, Antonios / Mavridis, Ioannis et al. | 2012
- 557
-
Bypassing information leakage protection with trusted applicationsBlasco, Jorge / Hernandez-Castro, Julio Cesar / Tapiador, Juan E. / Ribagorda, Arturo et al. | 2012
- 569
-
QoP-ML: Quality of protection modelling language for cryptographic protocolsKsiezopolski, Bogdan et al. | 2012
- 597
-
Leveraging behavioral science to mitigate cyber security riskPfleeger, Shari Lawrence / Caputo, Deanna D. et al. | 2011
- 612
-
Noncespaces: Using randomization to defeat cross-site scripting attacksVan Gundy, Matthew / Chen, Hao et al. | 2011
- 629
-
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented InfrastructureHudic, Aleksandar / Weippl, Edgar et al. | 2012
- 630
-
Penetration Tester's Open Source ToolkitCuppens-Boulahia, Nora et al. | 2012
- 633
-
Securing the Cloud: Cloud Computer Security Techniques and TacticsMichael, Katina et al. | 2012
- 634
-
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and PracticeMichael, Katina et al. | 2012
- 636
-
Enterprise Security for the ExecutiveWeippl, Edgar / Leithner, Manuel et al. | 2012
- 637
-
Cyber Warfare – Techniques, Tactics and Tools for Security Practitioners| 2012
- 638
-
Thor's Microsoft Security BibleLeithner, Manuel / Weippl, Edgar R. et al. | 2012
- 639
-
XBOX 360 Forensics: A Digital Forensics Guide to Examining ArtifactsLeithner, Manuel / Weippl, Edgar et al. | 2012
- I
-
Filler AD:IFIP| 2012
- IFC
-
Editorial Board| 2012
- iii
-
Contents| 2012