Sciweavers

1599 search results - page 9 / 320
» Program Analysis for Security and Privacy
Sort
View
98
Voted
CCS
2006
ACM
15 years 4 months ago
Vulnerability analysis For evaluating quality of protection of security policies
Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latif...
CRISIS
2008
15 years 4 months ago
Formal procedural security modeling and analysis
We are involved in a project related to the evaluation
Komminist Weldemariam, Adolfo Villafiorita
148
Voted
EUROSEC
2010
ACM
15 years 9 months ago
Detecting Wikipedia vandalism via spatio-temporal analysis of revision metadata?
Andrew G. West, Sampath Kannan, Insup Lee
112
Voted
FOSAD
2009
Springer
15 years 9 months ago
Resource Usage Analysis and Its Application to Resource Certification
Elvira Albert, Puri Arenas, Samir Genaim, Germ&aac...
117
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection
Peng Li, Hyundo Park, Debin Gao, Jianming Fu