Foundations and Practice of Security最新文献

筛选
英文 中文
Obfuscation Code Localization Based on CFG Generation of Malware 基于CFG生成的恶意软件混淆码定位
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_14
Nguyen Minh Hai, Mizuhito Ogawa, Q. T. Tho
{"title":"Obfuscation Code Localization Based on CFG Generation of Malware","authors":"Nguyen Minh Hai, Mizuhito Ogawa, Q. T. Tho","doi":"10.1007/978-3-319-30303-1_14","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_14","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Security Enforcement by Rewriting: An Algebraic Approach 通过重写实现安全:一种代数方法
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_22
Guangye Sui, M. Mejri
{"title":"Security Enforcement by Rewriting: An Algebraic Approach","authors":"Guangye Sui, M. Mejri","doi":"10.1007/978-3-319-30303-1_22","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_22","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126401790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Runtime Monitoring of Stream Logic Formulae 流逻辑公式的运行时监控
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_15
Sylvain Hallé, R. Khoury
{"title":"Runtime Monitoring of Stream Logic Formulae","authors":"Sylvain Hallé, R. Khoury","doi":"10.1007/978-3-319-30303-1_15","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_15","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimization Problems in Infrastructure Security 基础设施安全中的优化问题
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_1
E. Kranakis, D. Krizanc
{"title":"Optimization Problems in Infrastructure Security","authors":"E. Kranakis, D. Krizanc","doi":"10.1007/978-3-319-30303-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_1","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129133857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security Mechanisms Planning to Enforce Security Policies 执行安全策略的安全机制规划
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_6
Anis Bkakria, F. Cuppens, N. Cuppens-Boulahia, D. Gross-Amblard
{"title":"Security Mechanisms Planning to Enforce Security Policies","authors":"Anis Bkakria, F. Cuppens, N. Cuppens-Boulahia, D. Gross-Amblard","doi":"10.1007/978-3-319-30303-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_6","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124413615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring Touch from Motion in Real World Data 从真实世界数据的运动推断触摸
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_4
Pascal Bissig, P. Brandes, Jonas Passerini, Roger Wattenhofer
{"title":"Inferring Touch from Motion in Real World Data","authors":"Pascal Bissig, P. Brandes, Jonas Passerini, Roger Wattenhofer","doi":"10.1007/978-3-319-30303-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121613463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties 处理代数性质的密码协议验证工具的性能评估
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_9
P. Lafourcade, Maxime Puys
{"title":"Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties","authors":"P. Lafourcade, Maxime Puys","doi":"10.1007/978-3-319-30303-1_9","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_9","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
AnBx: Automatic Generation and Verification of Security Protocols Implementations 安全协议实现的自动生成和验证
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_10
P. Modesti
{"title":"AnBx: Automatic Generation and Verification of Security Protocols Implementations","authors":"P. Modesti","doi":"10.1007/978-3-319-30303-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_10","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132971467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation 安全计算中尴尬并行计算的点计数方法
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_5
Toomas Krips, J. Willemson
{"title":"Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation","authors":"Toomas Krips, J. Willemson","doi":"10.1007/978-3-319-30303-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_5","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast and Effective Clustering of Spam Emails Based on Structural Similarity 基于结构相似度的垃圾邮件快速有效聚类
Foundations and Practice of Security Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_12
M. Alishahi, A. Saracino, M. Mejri, N. Tawbi, F. Martinelli
{"title":"Fast and Effective Clustering of Spam Emails Based on Structural Similarity","authors":"M. Alishahi, A. Saracino, M. Mejri, N. Tawbi, F. Martinelli","doi":"10.1007/978-3-319-30303-1_12","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信