Sciweavers

1599 search results - page 9 / 320
» Program Analysis for Security and Privacy
Sort
View
CCS
2006
ACM
15 years 5 months ago
Vulnerability analysis For evaluating quality of protection of security policies
Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latif...
CRISIS
2008
15 years 4 months ago
Formal procedural security modeling and analysis
We are involved in a project related to the evaluation
Komminist Weldemariam, Adolfo Villafiorita
156
Voted
EUROSEC
2010
ACM
15 years 10 months ago
Detecting Wikipedia vandalism via spatio-temporal analysis of revision metadata?
Andrew G. West, Sampath Kannan, Insup Lee
117
Voted
FOSAD
2009
Springer
15 years 10 months ago
Resource Usage Analysis and Its Application to Resource Certification
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
124
Voted
ACSAC
2008
IEEE
15 years 10 months ago
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection
Peng Li, Hyundo Park, Debin Gao, Jianming Fu