Details

Displaying results 1 to 20 out of 9973

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >
DroidSearch: A Powerful Search Engine for Android Applications
Siegfried Rasthofer, Steven Arzt, Max Kolhagen, Brian Pfretzschner, Stephan Huber, Eric Bodden, Philipp Richter
In: 2015 Science and Information Conference (SAI), Juli 2015.

Smart Traffic Flow
Werner Schmidt, Stephan Borgert, Albert Fleischmann, Lutz Heuser, Christian Müller, Immanuel Schweizer
In: HMD - Praxis der Wirtschaftsinformatik, p. to appear, Juli 2015.

Automatic Disambiguation of English Puns
Tristan Miller and Iryna Gurevych
In: Proceedings of the 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing (ACL-IJCNLP 2015), Juli 2015.

TyTAN: Tiny Trust Anchor for Tiny Devices
Ferdinand Brasser, Patrick Koeberl, Brahim El Mahjoub, Ahmad-Reza Sadeghi, Christian Wachsmann
In: 52nd Design Automation Conference (DAC) 2015, Juni 2015.

HAFIX: Hardware-Assisted Flow Integrity Extension
Orlando Arias, Lucas Davi, Matthias Hanreich, Yier Jin, Patrick Koeberl, Debayan Paul, Ahmad-Reza Sadeghi, Dean Sullivan
In: 52nd Design Automation Conference (DAC), Juni 2015.

Compacting Privacy-Preserving k-Nearest Neighbor Search using Logic Synthesis
Ebrahim Songhori, Ahmad-Reza Sadeghi, Farinaz Koushanfar
In: 52nd Design Automation Conference (DAC), Juni 2015.

A View on Privacy & Trust in IoT
Jörg Daubert, Alexander Wiesmaier, Panayotis Kikiras
In: IEEE: First IEEE International Workshop on Security and Privacy for Internet of Things and Cyber-Physical Systems (IoT/CPS-Security), IEEE International Conference on Communications, (ICC), p. to be presented, IEEE, Juni 2015.

Incorporating Attacker Capabilities in Risk Estimation and Mitigation
Lotfi ben Othmane, Rohit Ranchal, Ruchith Fernando, Bharat Bhargava, Eric Bodden
In: Computers & Security, vol. 51, p. 41–61, Juni 2015.
http://www.sciencedirect.com/science/article/pii/S01674048150003345000334.

Linking the Thoughts: Analysis of Argumentation Structures in Scientific Publications
Christian Kirschner, Judith Eckle-Kohler and Iryna Gurevych
In: Proceedings of the 2nd Workshop on Argumentation Mining held in conjunction with the 2015 Conference of the North American Chapter of the Association for Computational Linguistics – Human Language Technologies (NAACL HLT 2015), p. (to appear), Juni 2015.

Intelligente Datenauswertung mit Linked Open Data
Heiko Paulheim, Axel Schulz, Frederik Janssen, Petar Ristoski, Immanuel Schweizer
In: Börteçin Ege, Bernhard Humm, Anatol Reibold , Corporate Semantic Web, chap. 13, p. 186 - 200, Springer Vieweg, Juni 2015. ISBN 3642548857. ISSN 1439-3107.

How to Exchange Security Events? Overview and Evaluation of Formats and Protocols
Jessica Steinberger, Anna Sperotto, Mario Golling, Harald Baier and Aiko Pras
p. 9, Mai 2015.

No PAIN, No Gain? The utility of PArallel fault INjections
Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo
In: International Conference on Software Engineering (ICSE), 2015, Mai 2015.
http://2015.icse-conferences.org/.

TinyGarble: Highly Compressed and Scalable Sequential Garbled Circuits
Ebrahim M. Songhori, Siam U. Hussain, Ahmad-Reza Sadeghi, Thomas Schneider, Farinaz Koushanfar
In: 36th IEEE Symposium on Security and Privacy (Oakland), Mai 2015.

Readactor: Practical Code Randomization Resilient to Memory Disclosure
Stephen Crane, Christopher Liebchen, Andrei Homescu, Lucas Davi, Per Larsen, Ahmad-Reza Sadeghi, Stefan Brunthaler, Michael Franz
In: 36th IEEE Symposium on Security and Privacy (Oakland), Mai 2015.

Counterfeit Object-oriented Programming: On the Difficulty of Preventing Code Reuse Attacks in C++ Applications
Felix Schuster, Thomas Tendyck, Christopher Liebchen, Lucas Davi, Ahmad-Reza Sadeghi, Thorsten Holz
In: 36th IEEE Symposium on Security and Privacy (Oakland), Mai 2015.

A Guide to End-to-End Privacy Accountability
Denis Butin, Daniel Le Métayer
In: IEEE: 1st International Workshop on TEchnical and LEgal aspects of data pRIvacy and SEcurity (TELERISE 2015) , Mai 2015.
www.iit.cnr.it/telerise2015/.

Tor Experimentation Tools
Fatemeh Shirazi, Matthias Goehring, Claudia Diaz
In: IEEE: International Workshop on Privacy Engineering – IWPE'15, co-located with 36th IEEE symposium on Security and Privacy, Mai 2015.
ieee-security.org/TC/SPW2015/IWPE/.

Extracting Configuration Knowledge from Build Files with Symbolic Analysis
Shurui Zhou, Jafar Al-Kofahi, Tien N. Nguyen, Christian Kaestner, Sarah Nadi
In: IEEE: 3rd International Workshop on Release Engineering, p. 4, Mai 2015.
releng.polymtl.ca/RELENG2015/html/index.html.

rr

Mai 2015.

Mining Apps for Abnormal Usage of Sensitive Data
Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, Eric Bodden
In: 2015 International Conference on Software Engineering (ICSE), Mai 2015.

 Page 1 Page 2 Page 3 Page 4 Page 5 Page 6 Page 7 Page 8 Page 9 Page 10 Next >

[Export this query result to XML]

A A A | Drucken Drucken | Impressum Impressum | Sitemap Sitemap | Suche Suche | Kontakt Kontakt
zum Seitenanfangzum Seitenanfang