|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 5 publication records. Showing 5 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno |
Hardware-enforced fine-grained isolation of untrusted code. |
SecuCode@CCS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aurélien Francillon, Daniele Perito, Claude Castelluccia |
Defending embedded systems against control flow attacks. |
SecuCode@CCS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Sven Lachmund, Christian Schaefer (eds.) |
Proceedings of the First ACM Workshop on Secure Execution of Untrusted Code, SecuCode '09, Chicago, Illinois, USA, November 9, 2009 |
SecuCode@CCS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wolfram Schulte |
From dependable multi-user to dependable multi-application operating systems: invited talk. |
SecuCode@CCS |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wim Maes, Thomas Heyman, Lieven Desmet, Wouter Joosen |
Browser protection against cross-site request forgery. |
SecuCode@CCS |
2009 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #5 of 5 (100 per page; Change: )
|
|