نتایج جستجو برای: static analysis

تعداد نتایج: 2902069  

2004
Riccardo Focardi

Authentication protocols are very simple distributed algorithms whose purpose is to enable two entities to achieve mutual and reliable agreement on some piece of information, typically the identity of the other party, its presence, the origin of a message, its intended destination. Achieving the intended agreement guarantees is subtle because they typically are the result of the encryption/decr...

Journal: :ACM Computing Surveys 2016

Journal: :Electronic Notes in Theoretical Computer Science 2001

Journal: :Journal of Wood Science 2018

Journal: :Computer Science in Economics and Management 1992

Journal: :Information and Software Technology 2012

2009
Phillip A. Porras Hassen Saïdi

We present an in depth static analysis of the Conficker worm, primarily through the exploration of the client-side binary logic. In this paper, we summarize various aspects of the inner workings of binary variants A and B,1 which were the first in a chain of recent revisions aimed to keep this epidemic resistant to ongoing eradication attempts. These first two variants have combined to produce ...

1997
D. Dal Fiume M. Orlandini G. Cusumano S. Del Sordo M. Feroci F. Frontera T. Oosterbroek E. Palazzi A. N. Parmar A. Santangelo A. Segreto

We report on the timing analysis of the observation of the X–ray binary pulsar Her X–1 performed during the BeppoSAX Science Verification Phase. The observation covered more that two full orbital cycles near the maximum of the main–on in the 35 day cycle of Her X–1. We present the pulse profiles from 0.1 to 100 keV. Major changes are present below 1 keV, where the appearance of a broad peak is ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید