Facet browsing currently unavailable
Page 1 of 852715 results
Sort by: relevance publication year
Limits of Static Analysis for Malware Detection PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Limits of Static Analysis for Malware Detection PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Panorama PROCEEDINGS ARTICLE published 28 October 2007 in Proceedings of the 14th ACM conference on Computer and communications security |
FIRE: FInding Rogue nEtworks PROCEEDINGS ARTICLE published December 2009 in 2009 Annual Computer Security Applications Conference |
Secure Input for Web Applications PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Secure Input for Web Applications PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |
Static analysis for detecting taint-style vulnerabilities in web applications JOURNAL ARTICLE published 16 August 2010 in Journal of Computer Security |
Using Static Program Analysis to Aid Intrusion Detection BOOK CHAPTER published 2006 in Lecture Notes in Computer Science |
PoX: Protecting users from malicious Facebook applications JOURNAL ARTICLE published July 2012 in Computer Communications |
AccessMiner PROCEEDINGS ARTICLE published 4 October 2010 in Proceedings of the 17th ACM conference on Computer and communications security |
BareBox PROCEEDINGS ARTICLE published 5 December 2011 in Proceedings of the 27th Annual Computer Security Applications Conference Research funded by Army Research Office (W911NF-09-1-0553) | Office of Naval Research (N000140911042) | Division of Computer and Network Systems (CNS-0845559CNS-0905537) |
Disclosure PROCEEDINGS ARTICLE published 3 December 2012 in Proceedings of the 28th Annual Computer Security Applications Conference Research funded by Seventh Framework Programme (257007) | Division of Computer and Network Systems (CNS-1116777) |
On the Effectiveness of Techniques to Detect Phishing Sites BOOK CHAPTER published 2007 in Detection of Intrusions and Malware, and Vulnerability Assessment |
The power of procrastination PROCEEDINGS ARTICLE published 17 October 2011 in Proceedings of the 18th ACM conference on Computer and communications security |
Dynamic Analysis of Malicious Code JOURNAL ARTICLE published August 2006 in Journal in Computer Virology |
Neurlux PROCEEDINGS ARTICLE published 9 December 2019 in Proceedings of the 35th Annual Computer Security Applications Conference Research funded by Defense Advanced Research Projects Agency (FA8750-19-C-0003) | National Science Foundation (CNS-1704253) |
Protecting Users Against Phishing Attacks with AntiPhish PROCEEDINGS ARTICLE published in 29th Annual International Computer Software and Applications Conference (COMPSAC'05) |
FORECAST PROCEEDINGS ARTICLE published 5 December 2011 in Proceedings of the 27th Annual Computer Security Applications Conference Research funded by Seventh Framework Programme (257007 (SysSec)) | Österreichische Forschungsförderungsgesellschaft (820854 (TRUDIE)) |
Jarhead analysis and detection of malicious Java applets PROCEEDINGS ARTICLE published 3 December 2012 in Proceedings of the 28th Annual Computer Security Applications Conference Research funded by Division of Computer and Network Systems (CNS-0845559CNS-0905537) | Office of Naval Research (N000140911042) |
Improving Signature Testing through Dynamic Data Flow Analysis PROCEEDINGS ARTICLE published December 2007 in Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) |