aspect 发表于 2025-3-28 16:30:14

978-3-319-68062-0Springer International Publishing AG 2017

Mosaic 发表于 2025-3-28 21:58:16

Security and Trust Management978-3-319-68063-7Series ISSN 0302-9743 Series E-ISSN 1611-3349

exorbitant 发表于 2025-3-29 01:45:42

Estimating Software Obfuscation Potency with Artificial Neural Networksf complexity metrics – which are used to compute the potency – after an obfuscation transformation is applied to a code region. This work is the first step towards a decision support to optimally protect software applications.

Prologue 发表于 2025-3-29 06:50:24

Lecture Notes in Computer Sciencehttp://image.papertrans.cn/s/image/863550.jpg

nugatory 发表于 2025-3-29 08:40:19

http://reply.papertrans.cn/87/8636/863550/863550_45.png

继而发生 发表于 2025-3-29 12:51:35

http://reply.papertrans.cn/87/8636/863550/863550_46.png

饥荒 发表于 2025-3-29 18:50:06

http://reply.papertrans.cn/87/8636/863550/863550_47.png

Accommodation 发表于 2025-3-29 23:27:38

http://reply.papertrans.cn/87/8636/863550/863550_48.png

老巫婆 发表于 2025-3-30 01:14:31

http://reply.papertrans.cn/87/8636/863550/863550_49.png

深陷 发表于 2025-3-30 06:16:06

Refinement-Aware Generation of Attack Treestrees in which the refined nodes correspond to semantically relevant levels of abstraction is still an open question. In this paper, we formulate the attack-tree generation problem and propose a methodology to, given a system model, generate attack trees with meaningful levels of abstraction.
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Security and Trust Management; 13th International W Giovanni Livraga,Chris Mitchell Conference proceedings 2017 Springer International Publ