Personensuche
X
?
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy ,
5
The BORG : Nanoprobing Binaries for Buffer Overreads:
, In:
?
Proceedings of the 28th Annual Computer Security Applications Conference ,
7
Lines of malicious code : insights into the malicious so..:
, In:
?
Proceedings of the 27th Annual Computer Security Applications Conference ,
8
FORECAST : skimming off the malware cream:
, In:
?
Proceedings of the 27th Annual Computer Security Applications Conference ,
9
Detecting malware's failover C&C strategies with squeeze:
, In:
?
10
Grundlagen der Integration behinderter Kinder und Jugendlic..:
Exemplare:
Zentrale:E03 z pae 345 j/314; Zentrale:Magazin Zs fe 1520