Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Vulnerability Discovery and Analysis
Automated CPE labeling of CVE summaries with Machine Learning
Backstabber's Knife Collection: A Review of Open Source Software Supply Chain Attacks
Putting Attacks in Context: A Building Automation Testbed for Impact Assessment from the Victims Perspective
Attacks
Fast and Furious: Outrunning Windows Kernel Notification Routines from User-Mode
HAEPG: An Automatic Multi-hop Exploitation Generation Framework
Understanding Android VoIP Security: A System-level Vulnerability Assessment
Web Security
Web Runner 2049: Evaluating Third-Party Anti-bot Services
Short Paper
Taming The Shape Shifter: Detecting Anti-fingerprinting Browsers
It Never Rains but It Pours: Analyzing and Detecting Fake Removal Information Advertisement Sites
On the Security of Application Installers & Online Software Repositories
Detection and Containment
Distributed Heterogeneous N-Variant Execution
Sec2graph: Network Attack Detection based on Novelty Detection on Graph Structured Data
Efficient Context-Sensitive CFI Enforcement through a Hardware Monitor.

Browse Subjects

Show more subjects...

Statistics

from
to
Export