Sciweavers

20638 search results - page 139 / 4128
» Network Computing
Sort
View
88
Voted
DSN
2009
IEEE
15 years 9 months ago
Exploiting refactoring in formal verification
Xiang Yin, John C. Knight, Westley Weimer
96
Voted
NDSS
2009
IEEE
15 years 9 months ago
RB-Seeker: Auto-detection of Redirection Botnets
Xin Hu, Matthew Knysz, Kang G. Shin
POLICY
2009
Springer
15 years 8 months ago
Delegation Assistance
Achim D. Brucker, Helmut Petritsch, Andreas Schaad
101
Voted
AINA
2008
IEEE
15 years 8 months ago
Fortification of IT Security by Automatic Security Advisory Processing
Stefan Fenz, Andreas Ekelhart, Edgar R. Weippl