Displaying works 1 - 20 of 221 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2014 book
Accuracy of service area estimation methods used for critical infrastructure recovery
In IFIP Advances in Information and Communication Technology (Vol. 441, pp. 173–191). http://www.scopus.com/inward/record.url?eid=2-s2.0-84908286528&partnerID=MN8TOARS
Contributors: O. Pala , D. Wilson, R. Bent, S. Linger & J. Arnold
2014 conference paper
Tutorial: Text Analytics for Security
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 1540–1541.
Event: ACM
2014 conference paper
PREC: practical root exploit containment for android devices
Proceedings of the 4th ACM conference on Data and application security and privacy, 187–198.
Event: ACM
2014 conference paper
SEER: practical memory virus scanning as a service
Proceedings of the 30th Annual Computer Security Applications Conference, 186–195.
Event: ACM
2014 conference paper
NativeWrap: ad hoc smartphone application creation for end users
Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks, 13–24.
Event: ACM
2014 conference paper
Modeling and sensing risky user behavior on mobile devices
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 33.
Event: ACM
2014 conference paper
Insecure behaviors on mobile devices under stress
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 31.
Event: ACM
2014 conference paper
Improving mobile application security via bridging user expectations and application behaviors
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 32.
Event: ACM
2014 report
GraphAudit: Privacy Auditing for Massive Graph Mining
North Carolina State University. Dept. of Computer Science.
2014 conference paper
Dacsa: A decoupled architecture for cloud security analysis
Proceedings of the 7th Workshop on Cyber Security Experimentation and Test.
2014 journal article
An Application Package Configuration Approach to Mitigating Android SSL Vulnerabilities
ArXiv Preprint ArXiv:1410.7745.
2014 conference paper
ASM: A Programmable Interface for Extending Android Security.
USENIX Security Symposium, 1005–1019.
2014 conference paper
${$ASM$}$: A Programmable Interface for Extending Android Security
23rd USENIX Security Symposium (USENIX Security 14), 1005–1019.
2014 journal article
Spectrum Assignment in Optical Networks: A Multiprocessor Scheduling Perspective
Journal of Optical Communications and Networking, 6(8), 754.
2014 conference paper
Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, HVC 2014, Haifa, Israel, November 18-20, 2014. Proceedings
Ed(s): E. Yahav
2014 conference paper
Compositional solution space quantification for probabilistic software analysis
ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, Edinburgh, United Kingdom - June 09 - 11, 2014, 123–132.
2014 conference paper
A Comparative Study of Incremental Constraint Solving Approaches in Symbolic Execution
Hardware and Software: Verification and Testing - 10th International Haifa Verification Conference, HVC 2014, Haifa, Israel, November 18-20, 2014. Proceedings, 284–299.
2014 conference paper
Quantifying information leaks using reliability analysis
2014 International Symposium on Model Checking of Software, SPIN 2014, Proceedings, San Jose, CA, USA, July 21-23, 2014, 105–108.
2014 journal article
Efficient static checker for tainted variable attacks
Sci. Comput. Program., 80, 91–105.
2014 conference paper
ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI '14, Edinburgh, United Kingdom - June 09 - 11, 2014
http://dl.acm.org/citation.cfm?id=2594291
Ed(s): M. O’Boyle & K. Pingali
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.