Sciweavers

Share
SP   2010 IEEE Symposium on Security and Privacy
Wall of Fame | Most Viewed SP-2010 Paper
SP
2010
IEEE
419views Security Privacy» more  SP 2010»
8 years 8 months ago
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
Matt Fredrikson, Somesh Jha, Mihai Christodorescu,...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source419
2Download preprint from source327
3Download preprint from source226
4Download preprint from source222
5Download preprint from source220
6Download preprint from source217
7Download preprint from source212
8Download preprint from source210
9Download preprint from source206
10Download preprint from source204
11Download preprint from source194
12Download preprint from source192
13Download preprint from source190
14Download preprint from source187
15Download preprint from source182
16Download preprint from source182
17Download preprint from source181
18Download preprint from source179
19Download preprint from source178
20Download preprint from source176
21Download preprint from source176
22Download preprint from source174
23Download preprint from source165
24Download preprint from source164
25Download preprint from source161
26Download preprint from source158
27Download preprint from source157
28Download preprint from source156
29Download preprint from source152
30Download preprint from source150
31Download preprint from source149
32Download preprint from source140
books