Sciweavers

533 search results - page 11 / 107
» Control flow based obfuscation
Sort
View
109
Voted
ICCD
2002
IEEE
152views Hardware» more  ICCD 2002»
15 years 11 months ago
Register Binding Based Power Management for High-level Synthesis of Control-Flow Intensive Behaviors
A circuit or circuit component that does not contain any spurious switching activity, i.e., activity that is not required by its specified functionality, is called perfectly power...
Lin Zhong, Jiong Luo, Yunsi Fei, Niraj K. Jha
104
Voted
ER
2005
Springer
93views Database» more  ER 2005»
15 years 8 months ago
Pattern-Based Analysis of the Control-Flow Perspective of UML Activity Diagrams
Petia Wohed, Wil M. P. van der Aalst, Marlon Dumas...
97
Voted
FTDCS
2003
IEEE
15 years 8 months ago
Network Tomography-Based Unresponsive Flow Detection and Control
Ahsan Habib, Bharat K. Bhargava
120
Voted
ESORICS
2003
Springer
15 years 8 months ago
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
In this paper, we describe a novel approach to policy-based intrusion detection. The model we propose checks legality of information flows between objects in the system, according...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...