default search action
ICSSA 2016: St. Pölten, Austria
- International Conference on Software Security and Assurance, ICSSA 2016, St. Pölten, Austria, August 24-25, 2016. IEEE 2016, ISBN 978-1-5090-4388-0
- Lauri Koivunen, Sampsa Rauti, Ville Leppänen:
Applying Internal Interface Diversification to IoT Operating Systems. 1-5 - Mathias Wegerer, Simon Tjoa:
Defeating the Database Adversary Using Deception - A MySQL Database Honeypot. 6-10 - Franz Wotawa:
On the Automation of Security Testing. 11-16 - Marlies Temper, Simon Tjoa:
The Applicability of Fuzzy Rough Classifier for Continuous Person Authentication. 17-23 - Su Yeon Choi, Hae Young Lee:
Toward Automated Scanning for Code Injection Vulnerabilities in HTML5-Based Mobile Apps. 24 - Alexandre Melo Braga, Ricardo Dahab:
Towards a Methodology for the Development of Secure Cryptographic Software. 25-30 - Naurin Farooq Khan, Naveed Ikram:
Security Requirements Engineering: A Systematic Mapping (2010-2015). 31-36 - Igor Serov, Maria Leitner:
An Experimental Approach to Reputation in E-Participation. 37-42 - Sora Lee, Jinwoo Kim, Sangjun Ko, Hyoungshick Kim:
A Security Analysis of Paid Subscription Video-on-Demand Services for Online Learning. 43-48 - Jaegwan Yu, Eunsoo Kim, Hyoungshick Kim, Jun Ho Huh:
A Framework for Detecting MAC and IP Spoofing Attacks with Network Characteristics. 49-53 - Martin Pirker, Andreas Nusser:
Assessment of Server State via Inter-Clone Differences. 54-59 - Damjan Buhov, Richard Thron, Sebastian Schrittwieser:
Catch Me if You Can! Transparent Detection of Shellcode. 60-63 - Oliver Eigner, Philipp Kreimel, Paul Tavolato:
Detection of Man-in-the-Middle Attacks on Industrial Control Networks. 64-69 - Priya Anand:
Overview of Root Causes of Software Vulnerabilities - Technical and User-Side Perspectives. 70-74 - Ji-Hyeon Yoon, Jeong Oh Kye, Yongdae Kim, Hae Young Lee:
Decoder-Free Sino-Korean Shellcode. 75-78
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.