|
Conferences in DBLP
Reverse Engineering Python Applications. [Citation Graph (, )][DBLP]
Exploitable Redirects on the Web: Identification, Prevalence, and Defense. [Citation Graph (, )][DBLP]
Insecure Context Switching: Inoculating Regular Expressions for Survivability. [Citation Graph (, )][DBLP]
Experiences with Model Inference Assisted Fuzzing. [Citation Graph (, )][DBLP]
Engineering Heap Overflow Exploits with JavaScript. [Citation Graph (, )][DBLP]
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. [Citation Graph (, )][DBLP]
Towards Systematic Evaluation of the Evadability of Bot/Botnet Detection Methods. [Citation Graph (, )][DBLP]
Modeling the Trust Boundaries Created by Securable Objects. [Citation Graph (, )][DBLP]
|