default search action
13. AISC 2015: Sydney, Australia
- Ian Welch, Xun Yi:
13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015. CRPIT 161, Australian Computer Society 2015, ISBN 978-1-921770-43-2 - Adrian Herrera, Ben Cheney:
JMD: A Hybrid Approach for Detecting Java Malware. 3-13 - Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan:
Hypervisor-based Security Architecture to Protect Web Applications. 15-24 - Tristan Newby, Duncan A. Grove, Alex Murray, Chris A. Owen, Jim McCarthy, Chris J. North:
Annex: A Middleware for Constructing High-Assurance Software Systems. 25-34 - Toby J. Richer, Grant Neale, Grant Osborne:
On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection. 35-44 - John Shield, Bradley D. Hopkins, Mark R. Beaumont, Chris North:
Hardware Trojans - A Systemic Threat. 45-51 - Deepa Mani, Alireza Heravi, Kim-Kwang Raymond Choo, Sameera Mubarak:
Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis. 53-56 - Binbin Di, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong:
Correcting flaws in Mitchell's analysis of EPBC. 57-60 - David Myers, Ernest Foo, Kenneth Radke:
Internet-wide Scanning Taxonomy and Framework. 61-65 - Nicholas R. Rodofile, Kenneth Radke, Ernest Foo:
Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy. 67-70
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.