Filter your results
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 5
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
2 results
|
|
sorted by
|
|
Runtime Detection of Zero-Day Vulnerability Exploits in Contemporary Software Systems30th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2016, Trento, Italy. pp.347-363, ⟨10.1007/978-3-319-41483-6_24⟩
Conference papers
hal-01633685v1
|
||
|
Duality of Equations and Coequations via Contravariant Adjunctions13th International Workshop on Coalgebraic Methods in Computer Science (CMCS), Apr 2016, Eindhoven, Netherlands. pp.73-93, ⟨10.1007/978-3-319-40370-0_6⟩
Conference papers
hal-01446034v1
|