Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Searchable symmetric encryption: Improved definitions and efficient constructionsCurtmola, Reza ; Garay, Juan ; Kamara, Seny ; Ostrovsky, RafailJournal of computer security, 2011-01, Vol.19 (5), p.895-934 [Periódico revisado por pares]Texto completo disponível |
|
2 |
Material Type: Artigo
|
Automatic analysis of malware behavior using machine learningRieck, Konrad ; Trinius, Philipp ; Willems, Carsten ; Holz, ThorstenJournal of computer security, 2011-01, Vol.19 (4), p.639-668 [Periódico revisado por pares]Texto completo disponível |
|
3 |
Material Type: Artigo
|
Shared and searchable encrypted data for untrusted serversDong, Changyu ; Russello, Giovanni ; Dulay, Naranker Atluri, VijayJournal of computer security, 2011-01, Vol.19 (3), p.367-397 [Periódico revisado por pares]Texto completo disponível |
|
4 |
Material Type: Artigo
|
Automatic verification of correspondences for security protocolsBlanchet, BrunoJournal of computer security, 2009-01, Vol.17 (4), p.363-434 [Periódico revisado por pares]Texto completo disponível |
|
5 |
Material Type: Artigo
|
Practical automated detection of stealthy portscansStaniford, Stuart ; Hoagland, James A. ; McAlerney, Joseph M.Journal of computer security, 2002, Vol.10 (1-2), p.105-136 [Periódico revisado por pares]Texto completo disponível |
|
6 |
Material Type: Artigo
|
Secure authentication in the grid: A formal analysis of DNP3 SAv5Cremers, Cas ; Dehnel-Wild, Martin ; Milner, KevinJournal of computer security, 2019-01, Vol.27 (2), p.203-232 [Periódico revisado por pares]Amsterdam: IOS Press BVTexto completo disponível |
|
7 |
Material Type: Artigo
|
Bucketing and information flow analysis for provable timing attack mitigationTerauchi, Tachio ; Antonopoulos, TimosJournal of computer security, 2020-01, Vol.28 (6), p.607-634 [Periódico revisado por pares]Amsterdam: IOS Press BVTexto completo disponível |
|
8 |
Material Type: Artigo
|
Measuring and estimating power consumption in Android to support energy-based intrusion detectionMerlo, Alessio ; Migliardi, Mauro ; Fontanelli, Paolo Spalazzi, Luca ; Viganò, LucaJournal of computer security, , Vol.23 (5), p.611-637 [Periódico revisado por pares]Texto completo disponível |
|
9 |
Material Type: Artigo
|
A static analysis for quantifying information flow in a simple imperative languageClark, David ; Hunt, Sebastian ; Malacaria, PasqualeJournal of computer security, 2007-01, Vol.15 (3), p.321-371 [Periódico revisado por pares]Texto completo disponível |
|
10 |
Material Type: Artigo
|
The inductive approach to verifying cryptographic protocolsPaulson, Lawrence C.Journal of computer security, 1998, Vol.6 (1-2), p.85-128 [Periódico revisado por pares]Texto completo disponível |