Personensuche
X
?
Proceedings of the 17th ACM Conference on Security and Privacy in Wireless and Mobile Networks ,
1
On Continuously Verifying Device-level Functional Integrity..:
, In:
?
Security Standardisation Research; Lecture Notes in Computer Science ,
2
On Reducing Underutilization of Security Standards by Deriv..:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
7
Function Fingerprinting:
, In:
?
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
9
Compiler Provenance Attribution:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
10
Clone Detection:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
11
Binary Analysis Overview:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
12
Introduction:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
13
Library Function Identification:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
14
Identifying Reused Functions in Binary Code:
, In:
?
Advances in Information Security; Binary Code Fingerprinting for Cybersecurity ,
15