Search Results
13. Towards Flexible and Realistic Insider Mission Simulation
Open Access
14. BATTLING CYBER ATTACKS WITH SOFTWARE CRASH DIAGNOSIS
Open Access
15. Opaque Predicate: Attack and Defense in Obfuscated Binary Code
Open Access
17. Advanced Software Obfuscation Techniques and Applications
Open Access
18. Detection and Prevention: Toward Secure Mobile Robotic Systems
Open Access
19. Towards Secure Solutions for Cloud Applications
Open Access