Sciweavers

WETICE
1999
IEEE
13 years 9 months ago
Protecting the Hosted Application Server
Paola Dotti, Owen Rees
WETICE
1999
IEEE
13 years 9 months ago
Static Analysis of Binary Code to Isolate Malicious Behaviors
In this paper, we address the problem of static slicing on binary executables for the purposes of the malicious code detection in COTS components. By operating directly on binary ...
J. Bergeron, Mourad Debbabi, M. M. Erhioui, B&eacu...
WETICE
1999
IEEE
13 years 9 months ago
Here Is the Knowledge-Where Should I Put It?
In order to design useful knowledge media spaces to knowledge workers it is essential that we understand the nature of the work conducted and the knowledge applied in real setting...
Peter H. Carstensen, Ulrika Snis