Sciweavers

46
Voted
IEEESP
2007
85views more  IEEESP 2007»
15 years 1 months ago
Toward Automated Dynamic Malware Analysis Using CWSandbox
Carsten Willems, Thorsten Holz, Felix C. Freiling
42
Voted
IEEESP
2007
56views more  IEEESP 2007»
15 years 1 months ago
Cost-Effective Security
Johan Peeters, Paul Dyson
44
Voted
IEEESP
2007
53views more  IEEESP 2007»
15 years 1 months ago
Micro-Architectural Cryptanalysis
Onur Acucmez, Jean-Pierre Seifert, Çetin Ka...
39
Voted
IEEESP
2007
46views more  IEEESP 2007»
15 years 1 months ago
Software Protection through Anti-Debugging
Michael N. Gagnon, Stephen Taylor, Anup K. Ghosh
43
Voted
IEEESP
2007
45views more  IEEESP 2007»
15 years 1 months ago
When Cryptographers Turn Lead into Gold
Patrick P. Tsang
52
Voted
IEEESP
2007
43views more  IEEESP 2007»
15 years 1 months ago
Improving Mobile Core Network Security with Honeynets
Christos K. Dimitriadis
74
Voted
IEEESP
2007
93views more  IEEESP 2007»
15 years 1 months ago
Providing Certified Mail Services on the Internet
Rolf Oppliger
49
Voted
IEEESP
2007
68views more  IEEESP 2007»
15 years 1 months ago
Considering Operational Security Risk during System Development
Carol Woody, Christopher Alberts
41
Voted
IEEESP
2007
62views more  IEEESP 2007»
15 years 1 months ago
A Critique of the ANSI Standard on Role-Based Access Control
Ninghui Li, Ji-Won Byun, Elisa Bertino
57
Voted
IEEESP
2007
38views more  IEEESP 2007»
15 years 1 months ago
E-Passport Threats
Serge Vaudenay