Sciweavers

739 search results - page 4 / 148
» Security Analysis of IEEE 802.16
Sort
View
141
Voted
ACSAC
2008
IEEE
15 years 11 months ago
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection
Peng Li, Hyundo Park, Debin Gao, Jianming Fu
SP
2003
IEEE
104views Security Privacy» more  SP 2003»
15 years 10 months ago
Beyond Proof-of-Compliance: Safety and Availability Analysis in Trust Management
Ninghui Li, William H. Winsborough, John C. Mitche...
103
Voted
ACSAC
2004
IEEE
15 years 8 months ago
Detecting Kernel-Level Rootkits Through Binary Analysis
Christopher Krügel, William K. Robertson, Gio...