1. Working paper › Research
  2. Published
  3. Published
  4. Published

    LISABETH: Automated Content-Based Signatures Generator for Zero-day Polymorphic Worms

    Cavallaro, L., Lanzi, A., Mayer, L. & Monga, M., 2007.

    Research output: Working paper

  5. Published

    Mining the Network Behavior of Bots

    Cavallaro, L., Kruegel, C. & Vigna, G., 1 Jul 2009.

    Research output: Working paper

  6. Unpublished
  7. Published

    PAriCheck: An efficient pointer arithmetic checker for C programs

    Younan, Y., Phillipaerts, P., Cavallaro, L., Sekar, R., Piessens, F. & Joosen, W., 1 Jun 2009.

    Research output: Working paper

  8. Unpublished

    PKI - An Insider's View (Extended Abstract)

    Price, G., 2005, (Unpublished).

    Research output: Working paper

  9. Published

    SARBAC: A New Model for Role-Based Administration

    Crampton, J. & Loizou, G., 2002.

    Research output: Working paper

  10. Unpublished

    Security consideration for virtualization

    Gebhardt, C. & Tomlinson, A., 2008, (Unpublished).

    Research output: Working paper

  11. Published

    Structural complexity of conflict of interest policies

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  12. Published

    Syscalls Obfuscation for Preventing Mimicry and Impossible Paths Execution Attacks

    Bruschi, D., Cavallaro, L. & Lanzi, A., 2006, Dipartimento di Informatica e Comunicazione, Università degli Studi di Milano.

    Research output: Working paper

  13. Published
  14. Published
  15. Published
  16. Published
  17. Unpublished

    Towards the Secure Initialisation of a Personal Distributed Environment

    Schwiderski-Grosche, S., Tomlinson, A. & Pearce, D. B., 1 Jul 2005, (Unpublished).

    Research output: Working paper

  18. Published

    Triangulations of the sphere, bitrades and abelian groups

    Blackburn, S. R. & McCourt, T. A., 29 Jul 2013, arXiv, p. 1-22.

    Research output: Working paper

  19. Published
  20. Published

    Two partial orders on the set of antichains

    Crampton, J. & Loizou, G., 2000.

    Research output: Working paper

  21. Published

    Who needs trust for 5G?

    Mitchell, C. J., 2 May 2020, arXiv.

    Research output: Working paper

  22. Published

    Your Botnet is My Botnet: Analysis of a Botnet Takeover

    Stone-Gross, B., Cova, M., Cavallaro, L., Gilbert, B., Szydlowski, M., Kemmerer, R., Kruegel, C. & Vigna, G., 9 Nov 2009.

    Research output: Working paper

Previous 1...83 84 85 86 87 Next