Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
14850
search results - page 131 / 2970
»
The Security of
Sort
relevance
views
votes
recent
update
View
thumb
title
64
click to vote
SP
2010
IEEE
419
views
Security Privacy
»
more
SP 2010
»
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors
14 years 1 months ago
Download
www.cs.ucsb.edu
Matt Fredrikson, Somesh Jha, Mihai Christodorescu,...
claim paper
Read More »
31
click to vote
ACSAC
2004
IEEE
180
views
Security Privacy
»
more
ACSAC 2004
»
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders
14 years 1 months ago
Download
www.acsac.org
Dick Brackney, Terrance Goan, Allen Ott, Lockheed ...
claim paper
Read More »
20
click to vote
ACSAC
2004
IEEE
86
views
Security Privacy
»
more
ACSAC 2004
»
Detecting Kernel-Level Rootkits Through Binary Analysis
14 years 1 months ago
Download
www.cs.ucsb.edu
Christopher Krügel, William K. Robertson, Gio...
claim paper
Read More »
31
click to vote
AINA
2004
IEEE
174
views
Computer Networks
»
more
AINA 2004
»
Formal Verification of PAP and EAP-MD5 Protocols in Wireless Networks: FDR Model Checking
14 years 1 months ago
Download
www.irisa.fr
IEEE 802.1x and authentication server based security protocols are mainly used for enhancing security of wireless networks. In this paper, we specify PAP and EAP-MD5 based securit...
Il-Gon Kim, Jin-Young Choi
claim paper
Read More »
21
click to vote
CCS
2004
ACM
70
views
Security Privacy
»
more
CCS 2004
»
Synthesising verified access control systems in XACML
14 years 1 months ago
Download
www.cs.bham.ac.uk
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
claim paper
Read More »
« Prev
« First
page 131 / 2970
Last »
Next »