Personensuche
X
?
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
1
On Continuously Verifying Device-level Functional Integrity..:
, In:
?
Security Standardisation Research; Lecture Notes in Computer Science ,
2
On Reducing Underutilization of Security Standards by Deriv..:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
7
Compiler Provenance Attribution:
, In:
?
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
9
Function Fingerprinting:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
10
Identifying Reused Functions in Binary Code:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
11
Library Function Identification:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
12
Introduction:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
13
Binary Analysis Overview:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
14
Clone Detection:
, In:
?
15
Binary Code Fingerprinting for Cybersecurity: Application t..
Advances in Information Security, 78