Výsledky vyhledávání - ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security AND Protection
-
1
Autoři: a další
Přispěvatelé: a další
Zdroj: CDVE 2018 : 15th International Conference on Cooperative Design, Visualization and Engineering ; https://hal.science/hal-01831965 ; CDVE 2018 : 15th International Conference on Cooperative Design, Visualization and Engineering, Oct 2018, Hangzou, China. pp.176-183, ⟨10.1007/978-3-030-00560-3_24⟩ ; http://www.cdve.org/
Témata: ACM: H.: Information Systems/H.5: INFORMATION INTERFACES AND PRESENTATION (e.g., HCI)/H.5.1: Multimedia Information Systems/H.5.1.1: Artificial, augmented, and virtual realities, HCI)/H.5.2: User Interfaces/H.5.2.4: Graphical user interfaces (GUI), HCI)/H.5.2: User Interfaces/H.5.2.15: User-centered design, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-GR]Computer Science [cs]/Graphics [cs.GR], [INFO.INFO-HC]Computer Science [cs]/Human-Computer Interaction [cs.HC], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
2
Autoři: a další
Přispěvatelé: a další
Zdroj: Computers & Security. 50:33-46
Témata: Fault Tree Analysis, Java Card Security, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, 0211 other engineering and technologies, 02 engineering and technology, Smart Card, [INFO.INFO-ES] Computer Science [cs]/Embedded Systems, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], Countermeasures, Logical Attack, 0202 electrical engineering, electronic engineering, information engineering, ACM: D.: Software/D.4: OPERATING SYSTEMS, [INFO.INFO-ES]Computer Science [cs]/Embedded Systems, Evaluation, Control Flow Transfer, [INFO.INFO-CR] Computer Science [cs]/Cryptography and Security [cs.CR]
Popis souboru: application/pdf
Přístupová URL adresa: https://hal.inria.fr/hal-01211370/file/15-CompSecu.pdf
https://inria.hal.science/hal-01211370v1
https://doi.org/10.1016/j.cose.2015.01.004
https://inria.hal.science/hal-01211370v1/document
https://hal.inria.fr/hal-01211370/document
https://www.sciencedirect.com/science/article/pii/S016740481500005X
https://hal.inria.fr/hal-01211370
https://dblp.uni-trier.de/db/journals/compsec/compsec50.html#BouffardL15 -
3
Autoři: a další
Přispěvatelé: a další
Zdroj: 2017 27th International Conference on Field Programmable Logic and Applications (FPL)
https://hal.science/hal-01558473
2017 27th International Conference on Field Programmable Logic and Applications (FPL), Sep 2017, Ghent, Belgium. ⟨10.23919/fpl.2017.8056767⟩
https://www.fpl2017.org/Témata: Information Flow Tracking, SoC, Zynq, Zynq SoC, CoreSight, ARM Debug components, IFT, Dynamic information flow tracking, DIFT, ACM: B.: Hardware/B.5: REGISTER-TRANSFER-LEVEL IMPLEMENTATION, ACM: B.: Hardware/B.6: LOGIC DESIGN, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-AR]Computer Science [cs]/Hardware Architecture [cs.AR], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-ES]Computer Science [cs]/Embedded Systems
-
4
Autoři: a další
Přispěvatelé: a další
Zdroj: Annual Conference on Privacy, Security and Trust ; https://inria.hal.science/hal-01382971 ; Annual Conference on Privacy, Security and Trust, Dec 2016, Auckland, New Zealand ; http://pst2016.unitec.ac.nz/
Témata: Software diversity, jit, Security Enforcement, ACM: D.: Software/D.3: PROGRAMMING LANGUAGES/D.3.4: Processors/D.3.4.1: Compilers, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Geografické téma: Auckland, New Zealand
-
5
Autoři: a další
Přispěvatelé: a další
Zdroj: ESORICS - 17th European Symposium on Research in Computer Security - 2012 ; https://inria.hal.science/hal-00762252 ; ESORICS - 17th European Symposium on Research in Computer Security - 2012, Sep 2012, Pisa, Italy. pp.806-823, ⟨10.1007/978-3-642-33167-1⟩
Témata: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, finite state automaton, formal language, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
6
Autoři: a další
Přispěvatelé: a další
Zdroj: ACM Multimedia and Security ; https://inria.hal.science/inria-00505875 ; ACM Multimedia and Security, Sep 2009, Princeton, United States
Témata: ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing, [SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing
Geografické téma: United States
Time: Princeton, United States
-
7
Autoři: a další
Přispěvatelé: a další
Zdroj: 1st International Conference on Runtime Verification
https://inria.hal.science/inria-00536500
1st International Conference on Runtime Verification, Howard Barringer, Klaus Havelund, Insup Lee, Nov 2010, St. Julians, Malta. pp.168-182, ⟨10.1007/978-3-642-16612-9_14⟩Témata: behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, Malware, behavior abstraction, string rewriting, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
Geografické téma: St. Julians, Malta
-
8
Autoři: a další
Přispěvatelé: a další
Zdroj: 5th International Conference on Malicious and Unwanted Software
https://inria.hal.science/inria-00538376
5th International Conference on Malicious and Unwanted Software, Fernando C. Colón Osorio, Oct 2010, Nancy, FranceTémata: malware, packing, self-modifying code, slicing techniques, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
9
Autoři: a další
Přispěvatelé: a další
Zdroj: GREHACK 2013 ; https://inria.hal.science/hal-00872967 ; GREHACK 2013, Guillaume Jeanne, Nov 2013, Grenoble, France
Témata: ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.4: Communications Management, [INFO.INFO-MC]Computer Science [cs]/Mobile Computing
-
10
Autoři: a další
Přispěvatelé: a další
Zdroj: Lecture Notes in Computer Science ; 21st International Workshop on Fast Software Encryption, FSE 2014, London, UK, March 3-5 ; https://inria.hal.science/hal-01044597 ; 21st International Workshop on Fast Software Encryption, FSE 2014, London, UK, March 3-5, Mar 2014, London, United Kingdom. pp.3-17, ⟨10.1007/978-3-662-46706-0_1⟩
Témata: ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-IR]Computer Science [cs]/Information Retrieval [cs.IR], [INFO.INFO-IT]Computer Science [cs]/Information Theory [cs.IT]
Geografické téma: London, United Kingdom
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1412.4626; ARXIV: 1412.4626
-
11
Autoři: a další
Přispěvatelé: a další
Zdroj: CSCW'12 - The Twelfth International Workshop on Collaborative Editing Systems 2012 ; https://inria.hal.science/hal-00761058 ; CSCW'12 - The Twelfth International Workshop on Collaborative Editing Systems 2012, Feb 2012, Seattle, United States
Témata: ACM: C.: Computer Systems Organization/C.2: COMPUTER-COMMUNICATION NETWORKS/C.2.4: Distributed Systems, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, ACM: K.: Computing Milieux/K.6: MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS/K.6.5: Security and Protection/K.6.5.0: Authentication, [INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC]
Geografické téma: Seattle, United States
-
12
Autoři: a další
Přispěvatelé: a další
Zdroj: Software Composition ; https://inria.hal.science/inria-00270942 ; Software Composition, Mar 2008, Budapest, Hungary. pp.68-83, ⟨10.1007/978-3-540-78789-1_5⟩
Témata: ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, [INFO.INFO-OS]Computer Science [cs]/Operating Systems [cs.OS]
-
13
Autoři: a další
Přispěvatelé: a další
Zdroj: Proceedings of the 1st Workshop on Privacy by Design in Distributed Systems ; Workshop on Privacy by Design in Distributed Systems W-P2DS ; https://hal.science/hal-01801080 ; Workshop on Privacy by Design in Distributed Systems W-P2DS, Apr 2018, Porto, Portugal. ⟨10.1145/3195258.3195262⟩
Témata: Network security, Privacy Preservation, ACM: K.: Computing Milieux/K.4: COMPUTERS AND SOCIETY/K.4.1: Public Policy Issues/K.4.1.5: Privacy, ACM: C.: Computer Systems Organization/C.2: COMPUTER-COMMUNICATION NETWORKS/C.2.1: Network Architecture and Design, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, ACM: C.: Computer Systems Organization/C.2: COMPUTER-COMMUNICATION NETWORKS/C.2.4: Distributed Systems, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI], [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-DC]Computer Science [cs]/Distributed, Parallel, and Cluster Computing [cs.DC]
Time: Porto, Portugal
-
14
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/hal-00803412 ; [Research Report] 2013.
Témata: Malware, behavioral detection, behavior abstraction, trace, term rewriting, model checking, first order temporal logic, probability, weight, finite state automaton, formal language, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.4: Model checking, [INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO]
-
15
Autoři: a další
Přispěvatelé: a další
Zdroj: Les Cahiers de l'INRIA - La Recherche ; https://inria.hal.science/inria-00546796 ; Les Cahiers de l'INRIA - La Recherche, 2008, Les nouveaux défis de la cryptologie, 420 juin 2008
Témata: ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, ACM: E.: Data/E.3: DATA ENCRYPTION, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
16
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/inria-00594396 ; [Research Report] 2011.
Témata: behavioral analysis, malware detection, behavior abstraction, model checking, temporal logic, term rewriting, static analysis, information leak, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
17
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/inria-00509486 ; 2010.
Témata: malware, behavioral detection, abstraction, trace, rewriting, finite state automaton, formal language, dynamic binary instrumentation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
18
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/inria-00547884 ; [Research Report] 2010.
Témata: malware, behavioral detection, abstraction, trace, term rewriting, finite state automaton, formal language, dynamic binary instrumentation, temporal logic, information leak, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.0: General/D.2.0.0: Protection mechanisms, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.3: Formal methods, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.4: Software/Program Verification/D.2.4.8: Validation, ACM: D.: Software/D.2: SOFTWARE ENGINEERING/D.2.5: Testing and Debugging/D.2.5.9: Tracing, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.4: Invasive software (e.g., viruses, worms, Trojan horses), ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection/D.4.6.6: Verification, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR]
-
19
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/inria-00157341 ; [Research Report] RR-6231, INRIA. 2007, pp.84.
Témata: OSGi Platform, Security, Dependability, Java, Hardened Execution Platform, Vulnerability Catalog, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.5: Reliability, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO.INFO-MC]Computer Science [cs]/Mobile Computing, [INFO.INFO-OS]Computer Science [cs]/Operating Systems [cs.OS]
Relation: info:eu-repo/semantics/altIdentifier/arxiv/0706.3812; ARXIV: 0706.3812
-
20
Autoři: a další
Přispěvatelé: a další
Zdroj: https://inria.hal.science/inria-00379155 ; 2009.
Témata: ACM: D.: Software, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.6: Security and Protection, ACM: D.: Software/D.4: OPERATING SYSTEMS/D.4.5: Reliability, [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]
Nájsť tento článok vo Web of Science
Full Text Finder