Filter your results
- 4
- 4
- 4
- 4
- 4
- 4
- 4
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Test Case Generation Technique for VMM Fuzzing1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.318-323, ⟨10.1007/978-3-642-36818-9_34⟩
Conference papers
hal-01480188v1
|
||
|
Architecture of Network Environment for High-Risk Security Experimentation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.479-484, ⟨10.1007/978-3-642-36818-9_53⟩
Conference papers
hal-01480206v1
|
||
|
SA4WSs: A Security Architecture for Web Services1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.306-311, ⟨10.1007/978-3-642-36818-9_32⟩
Conference papers
hal-01480186v1
|
||
|
Emulation on the Internet Prefix Hijacking Attack Impaction1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.485-489, ⟨10.1007/978-3-642-36818-9_54⟩
Conference papers
hal-01480207v1
|