首页 > 最新文献

Foundations and Practice of Security最新文献

英文 中文
Obfuscation Code Localization Based on CFG Generation of Malware 基于CFG生成的恶意软件混淆码定位
Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_14
Nguyen Minh Hai, Mizuhito Ogawa, Q. T. Tho
{"title":"Obfuscation Code Localization Based on CFG Generation of Malware","authors":"Nguyen Minh Hai, Mizuhito Ogawa, Q. T. Tho","doi":"10.1007/978-3-319-30303-1_14","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_14","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122666967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Security Enforcement by Rewriting: An Algebraic Approach 通过重写实现安全:一种代数方法
Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_22
Guangye Sui, M. Mejri
{"title":"Security Enforcement by Rewriting: An Algebraic Approach","authors":"Guangye Sui, M. Mejri","doi":"10.1007/978-3-319-30303-1_22","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_22","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126401790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Runtime Monitoring of Stream Logic Formulae 流逻辑公式的运行时监控
Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_15
Sylvain Hallé, R. Khoury
{"title":"Runtime Monitoring of Stream Logic Formulae","authors":"Sylvain Hallé, R. Khoury","doi":"10.1007/978-3-319-30303-1_15","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_15","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130795777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimization Problems in Infrastructure Security 基础设施安全中的优化问题
Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_1
E. Kranakis, D. Krizanc
{"title":"Optimization Problems in Infrastructure Security","authors":"E. Kranakis, D. Krizanc","doi":"10.1007/978-3-319-30303-1_1","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_1","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129133857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security Mechanisms Planning to Enforce Security Policies 执行安全策略的安全机制规划
Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_6
Anis Bkakria, F. Cuppens, N. Cuppens-Boulahia, D. Gross-Amblard
{"title":"Security Mechanisms Planning to Enforce Security Policies","authors":"Anis Bkakria, F. Cuppens, N. Cuppens-Boulahia, D. Gross-Amblard","doi":"10.1007/978-3-319-30303-1_6","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_6","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124413615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring Touch from Motion in Real World Data 从真实世界数据的运动推断触摸
Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_4
Pascal Bissig, P. Brandes, Jonas Passerini, Roger Wattenhofer
{"title":"Inferring Touch from Motion in Real World Data","authors":"Pascal Bissig, P. Brandes, Jonas Passerini, Roger Wattenhofer","doi":"10.1007/978-3-319-30303-1_4","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_4","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121613463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties 处理代数性质的密码协议验证工具的性能评估
Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_9
P. Lafourcade, Maxime Puys
{"title":"Performance Evaluations of Cryptographic Protocols Verification Tools Dealing with Algebraic Properties","authors":"P. Lafourcade, Maxime Puys","doi":"10.1007/978-3-319-30303-1_9","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_9","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122255580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
AnBx: Automatic Generation and Verification of Security Protocols Implementations 安全协议实现的自动生成和验证
Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_10
P. Modesti
{"title":"AnBx: Automatic Generation and Verification of Security Protocols Implementations","authors":"P. Modesti","doi":"10.1007/978-3-319-30303-1_10","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_10","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132971467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation 安全计算中尴尬并行计算的点计数方法
Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_5
Toomas Krips, J. Willemson
{"title":"Point-Counting Method for Embarrassingly Parallel Evaluation in Secure Computation","authors":"Toomas Krips, J. Willemson","doi":"10.1007/978-3-319-30303-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_5","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115662658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast and Effective Clustering of Spam Emails Based on Structural Similarity 基于结构相似度的垃圾邮件快速有效聚类
Pub Date : 2015-10-26 DOI: 10.1007/978-3-319-30303-1_12
M. Alishahi, A. Saracino, M. Mejri, N. Tawbi, F. Martinelli
{"title":"Fast and Effective Clustering of Spam Emails Based on Structural Similarity","authors":"M. Alishahi, A. Saracino, M. Mejri, N. Tawbi, F. Martinelli","doi":"10.1007/978-3-319-30303-1_12","DOIUrl":"https://doi.org/10.1007/978-3-319-30303-1_12","url":null,"abstract":"","PeriodicalId":337718,"journal":{"name":"Foundations and Practice of Security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115843013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
Foundations and Practice of Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1