Cited By
View all- Linger RPleszkoch MProwell SSayre KAnkrum T(2013)Computing legacy software behavior to understand functionality and security propertiesProceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop10.1145/2459976.2460025(1-4)Online publication date: 8-Jan-2013
- Linger RPleszkoch MProwell SSayre K(2011)Behavior computation for smart grid software analysisProceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research10.1145/2179298.2179354(1-1)Online publication date: 12-Oct-2011
- Linger RProwell SSayre K(2009)Computing the behavior of malicious code with function extraction technologyProceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies10.1145/1558607.1558648(1-2)Online publication date: 13-Apr-2009