The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ESSoS"( http://dblp.L3S.de/Venues/ESSoS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/essos

Publication years (Num. hits)
2009 (18) 2010 (19) 2011 (22) 2012 (15) 2013 (16) 2014 (16) 2015 (17) 2016 (18) 2017 (16) 2018 (11)
Publication types (Num. hits)
inproceedings(158) proceedings(10)
Venues (Conferences, Journals, ...)
ESSoS(168)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 168 publication records. Showing 168 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Aleieldin Salem, Tabea Schmidt, Alexander Pretschner Idea: Automatic Localization of Malicious Behaviors in Android Malware with Hidden Markov Models. Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christian Bunse, Sebastian Plotz Security Analysis of Drone Communication Protocols. Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Claudio Corrodi, Timo Spring, Mohammad Ghafari, Oscar Nierstrasz Idea: Benchmarking Android Data Leak Detection Tools. Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Victor Le Pochat, Tom van Goethem, Wouter Joosen Idea: Visual Analytics for Web Security. Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jago Gyselinck, Jo Van Bulck, Frank Piessens, Raoul Strackx Off-Limits: Abusing Legacy x86 Memory Segmentation to Spy on Enclaved Execution. Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Oleksii Starov, Nick Nikiforakis PrivacyMeter: Designing and Developing a Privacy-Preserving Browser Extension. Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christopher Gerking, David Schubert, Eric Bodden Model Checking the Information Flow Security of Real-Time Systems. Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mohammadreza Hazhirpasand, Mohammad Ghafari One Leak Is Enough to Expose Them All - From a WebRTC IP Leak to Web-Based Network Scanning. Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mathias Payer, Awais Rashid, Jose M. Such (eds.) Engineering Secure Software and Systems - 10th International Symposium, ESSoS 2018, Paris, France, June 26-27, 2018, Proceedings Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Otto Brechelmacher, Willibald Krenn, Thorsten Tarrach A Vision for Enhancing Security of Cryptography in Executables. Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eyasu Getahun Chekole, Sudipta Chattopadhyay 0001, Martín Ochoa, Huaqun Guo Enforcing Full-Stack Memory-Safety in Cyber-Physical Systems. Search on Bibsonomy ESSoS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel Gruss, Moritz Lipp, Michael Schwarz 0001, Richard Fellner, Clémentine Maurice, Stefan Mangard KASLR is Dead: Long Live KASLR. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lucian Cojocar, Taddeus Kroes, Herbert Bos JTR: A Binary Solution for Switch-Case Recovery. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dolière Francis Somé, Nataliia Bielova, Tamara Rezk Control What You Include! - Server-Side Protection Against Third Party Web Tracking. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gebrehiwet Biyane Welearegai, Christian Hammer 0001 Idea: Optimized Automatic Sanitizer Placement. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Eric Bodden, Mathias Payer, Elias Athanasopoulos (eds.) Engineering Secure Software and Systems - 9th International Symposium, ESSoS 2017, Bonn, Germany, July 3-5, 2017, Proceedings Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tayyaba Nafees, Natalie Coull, Robert Ian Ferguson, Adam T. Sampson Idea-Caution Before Exploitation: The Use of Cybersecurity Domain Knowledge to Educate Software Engineers Against Software Vulnerabilities. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Micah Morton, Hyungjoon Koo, Forrest Li, Kevin Z. Snow, Michalis Polychronakis, Fabian Monrose Defeating Zombie Gadgets by Re-randomizing Code upon Disclosure. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Federico De Meo, Luca Viganò 0001 A Formal Approach to Exploiting Multi-stage Attacks Based on File-System Vulnerabilities of Web Applications. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Robert Lagerström, Carliss Y. Baldwin, Alan MacCormack, Daniel J. Sturtevant, Lee Doolan Exploring the Relationship Between Architecture Coupling and Software Vulnerabilities. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Giampaolo Bella, Rosario Giustolisi Idea: A Unifying Theory for Evaluation Systems. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jasper Bogaerts, Bert Lagaisse, Wouter Joosen SEQUOIA: Scalable Policy-Based Access Control for Search Operations in Data-Driven Applications. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nuthan Munaiah, Benjamin S. Meyers, Cecilia Ovesdotter Alm, Andrew Meneely, Pradeep K. Murukannaiah, Emily Prud'hommeaux, Josephine Wolff, Yang Yu 0004 Natural Language Insights from Code Reviews that Missed a Vulnerability - A Large Scale Study of Chromium. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anhtuan Le, Utz Roedig, Awais Rashid LASARUS: Lightweight Attack Surface Reduction for Legacy Industrial Control Systems. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pierre Laperdrix, Benoit Baudry, Vikas Mishra FPRandom: Randomizing Core Browser Objects to Break Advanced Device Fingerprinting Techniques. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Heiko Mantel, Alexandra Weber, Boris Köpf A Systematic Study of Cache Side Channels Across AES Implementations. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Emad Heydari Beni, Bert Lagaisse, Ren Zhang 0003, Danny De Cock, Filipe Beato, Wouter Joosen A Voucher-Based Security Middleware for Secure Business Process Outsourcing. Search on Bibsonomy ESSoS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mathias Payer HexPADS: A Platform to Detect "Stealth" Attacks. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Benjamin Fogel, Shane Farmer, Hamza Alkofahi, Anthony Skjellum, Munawar Hafiz POODLEs, More POODLEs, FREAK Attacks Too: How Server Administrators Responded to Three Serious Web Vulnerabilities. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tom van Goethem, Wout Scheepers, Davy Preuveneers, Wouter Joosen Accelerometer-Based Device Fingerprinting for Multi-factor Mobile Authentication. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stanislav Dashevskyi, Achim D. Brucker, Fabio Massacci On the Security Cost of Using a Free and Open Source Component in a Proprietary Product. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sven Türpe Idea: Usable Platforms for Secure Programming - Mining Unix for Insight and Guidelines. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andreas Follner, Alexandre Bartel, Eric Bodden Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Willard Rafnsson, Deepak Garg 0001, Andrei Sabelfeld Progress-Sensitive Security for SPARK. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Eric Rothstein Morris, Joachim Posegga Idea: Enforcing Security Properties by Solving Behavioural Equations. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Achim D. Brucker, Michael Herzberg On the Static Analysis of Hybrid Mobile Apps - A Report on the State of Apache Cordova Nation. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bernhard J. Berger, Karsten Sohr, Rainer Koschke Automatically Extracting Threats from Extended Data Flow Diagrams. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Joseph Hallett, David Aspinall 0001 AppPAL for Android - Capturing and Checking Mobile App Policies. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pauline Anthonysamy, Matthew Edwards 0001, Christian Weichel, Awais Rashid Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jasper Bogaerts, Bert Lagaisse, Wouter Joosen Idea: Supporting Policy-Based Access Control on Database Systems. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mingyi Zhao, Peng Liu 0005 Empirical Analysis and Modeling of Black-Box Mutational Fuzzing. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Enrico Lovat, Martín Ochoa, Alexander Pretschner Sound and Precise Cross-Layer Data Flow Tracking. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Quanlong Guan, Heqing Huang, Weiqi Luo 0002, Sencun Zhu Semantics-Based Repackaging Detection for Mobile Apps. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Juan Caballero, Eric Bodden, Elias Athanasopoulos (eds.) Engineering Secure Software and Systems - 8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammad Torabi Dashti, David A. Basin Security Testing Beyond Functional Tests. Search on Bibsonomy ESSoS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Divya Muthukumaran, Nirupama Talele, Trent Jaeger, Gang Tan Producing Hook Placements to Enforce Expected Access Control Policies. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Philippe Massonet, Jesus Luna, Alain Pannetrat, Rubén Trapero Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Amina Souag, Camille Salinesi, Raúl Mazo, Isabelle Comyn-Wattiau A Security Ontology for Security Requirements Elicitation. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Raoul Strackx, Niels Lambrigts Idea: State-Continuous Transfer of State in Protected-Module Architectures. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Markus Dürmuth, Fabian Angelstorf, Claude Castelluccia, Daniele Perito, Chaabane Abdelberi OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stefano Calzavara, Alvise Rabitti, Michele Bugliesi Formal Verification of Liferay RBAC. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marouane Fazouane, Henning Kopp, Rens W. van der Heijden, Daniel Le Métayer, Frank Kargl Formal Verification of Privacy Properties in Electric Vehicle Charging. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maarten Decat, Jasper Moeys, Bert Lagaisse, Wouter Joosen Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Luca Allodi The Heavy Tails of Vulnerability Exploitation. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thuy D. Nguyen, Mark A. Gondree, Jean Khosalim, Cynthia E. Irvine Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Frank Piessens, Juan Caballero, Nataliia Bielova (eds.) Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Raoul Strackx, Pieter Philippaerts, Frédéric Vogels Idea: Towards an Inverted Cloud. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1David Pfaff, Sebastian Hack, Christian Hammer 0001 Learning How to Prevent Return-Oriented Programming Efficiently. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martín Ochoa, Jorge Cuéllar, Alexander Pretschner, Per A. Hallgren Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lars Hamann, Karsten Sohr, Martin Gogolla Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sebastian Banescu, Martín Ochoa, Nils Kunze, Alexander Pretschner Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation. Search on Bibsonomy ESSoS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Brahim Hamid, Christian Percebois A Modeling and Formal Approach for the Precise Specification of Security Patterns. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Emily R. Jacobson, Andrew R. Bernat, William R. Williams, Barton P. Miller Detecting Code Reuse Attacks with a Model of Conformant Program Execution. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sibylle B. Fröschle, Alexander Stühring Idea: Security Engineering Principles for Day Two Car2X Applications. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Joachim Biskup, Cornelia Tadros Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tri Minh Ngo, Marieke Huisman Quantitative Security Analysis for Programs with Low Input and Noisy Output. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hamza Ghani, Jesus Luna Garcia, Ivaylo Petkov, Neeraj Suri User-Centric Security Assessment of Software Configurations: A Case Study. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jan Jürjens, Frank Piessens, Nataliia Bielova (eds.) Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fabian van den Broek, Brinio Hond, Arturo Cedillo Torres Security Testing of GSM Implementations. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Peter T. Breuer, Jonathan P. Bowen Idea: Towards a Working Fully Homomorphic Crypto-processor - Practice and the Secret Computer. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Maël Berthier, Julien Bringer, Hervé Chabanne, Thanh-Ha Le, Lionel Rivière, Victor Servant Idea: Embedded Fault Injection Simulator on Smartcard. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan Automatic and Robust Client-Side Protection for Cookie-Based Sessions. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hermann de Meer, Henrich Christopher Pöhls, Joachim Posegga, Kai Samelin On the Relation between Redactable and Sanitizable Signature Schemes. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yehia Elrakaiby, Moussa Amrani, Yves Le Traon Security@Runtime: A Flexible MDE Approach to Enforce Fine-grained Security Policies. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Piergiuseppe Bettassa Copet, Riccardo Sisto Automated Formal Verification of Application-specific Security Properties. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jonas Magazinius, Daniel Hedin, Andrei Sabelfeld Architectures for Inlining Security Monitors in Web Applications. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Filippo Del Tedesco, Alejandro Russo, David Sands 0001 Fault-Tolerant Non-interference. Search on Bibsonomy ESSoS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Myla Archer, Elizabeth I. Leonard, Constance L. Heitmeyer Idea: Writing Secure C Programs with SecProve. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bojan Simic, James Walden Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Linda Ariani Gunawan, Peter Herrmann Compositional Verification of Application-Level Security Properties. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vadim Kotov, Fabio Massacci Anatomy of Exploit Kits - Preliminary Analysis of Exploit Kits as Software Artefacts. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David A. Wagner 0001 An Empirical Study on the Effectiveness of Security Code Review. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Denis Butin, David Gray, Giampaolo Bella Towards Verifying Voter Privacy through Unlinkability. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Prachi Kumari, Alexander Pretschner Model-Based Usage Control Policy Derivation. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Peter T. Breuer, Jonathan P. Bowen A Fully Homomorphic Crypto-Processor Design. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jan Jürjens, Benjamin Livshits, Riccardo Scandariato (eds.) Engineering Secure Software and Systems - 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher Using Security Policies to Automate Placement of Network Intrusion Prevention. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes 0001, Christian Hammer 0001 Idea: Callee-Site Rewriting of Sealed System Libraries. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga Control-Flow Integrity in Web Applications. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jean-Baptiste Jeannin, Guido de Caso, Juan Chen 0002, Yuri Gurevich, Prasad Naldurg, Nikhil Swamy dkal ⋆ : Constructing Executable Specifications of Authorization Protocols. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman Confidentiality for Probabilistic Multi-threaded Programs and Its Verification. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael J. May, Karthikeyan Bhargavan Towards Unified Authorization for Android. Search on Bibsonomy ESSoS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi 0001 Formalisation and Implementation of the XACML Access Control Mechanism. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Viet Hung Nguyen, Fabio Massacci An Idea of an Independent Validation of Vulnerability Discovery Models. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Máté Kovács, Helmut Seidl Runtime Enforcement of Information Flow Security in Tree Manipulating Processes. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Samson Gejibo, Federico Mancini 0001, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kristian Beckers, Stephan Faßbender, Maritta Heisel, Jan-Christoph Küster, Holger Schmidt 0001 Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Matteo Maria Casalino, Henrik Plate, Slim Trabelsi Transversal Policy Conflict Detection. Search on Bibsonomy ESSoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 168 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license