Dropping Malware Through Sound Injection: A Comparative Analysis On Android Operating Systems | 0 | 0.34 | 2021 |
Automatic network restructuring and risk mitigation through business process asset dependency analysis | 1 | 0.37 | 2020 |
An Improved Bit Masking Technique to Enhance Covert Channel Attacks in Everyday IT Systems. | 0 | 0.34 | 2020 |
Leaking supervisory controls and data acquisition commands over unpadded TCP/IP encryption through differential packet size analysis. | 0 | 0.34 | 2020 |
Using side channel TCP features for real-time detection of malware connections. | 0 | 0.34 | 2019 |
Analyzing Congestion Interdependencies Of Ports And Container Ship Routes In The Maritime Network Infrastructure | 0 | 0.34 | 2018 |
Using formal distributions for threat likelihood estimation in cloud-enabled IT risk assessment. | 1 | 0.36 | 2018 |
Side Channel Attacks over Encrypted TCP/IP Modbus Reveal Functionality Leaks. | 0 | 0.34 | 2018 |
Protecting the Transportation Sector from the Negative Impacts of Climate Change. | 0 | 0.34 | 2017 |
Interdependency analysis of junctions for congestion mitigation in Transportation Infrastructures. | 1 | 0.36 | 2017 |
Program analysis with risk-based classification of dynamic invariants for logical error detection. | 0 | 0.34 | 2017 |
A Process-Based Dependency Risk Analysis Methodology For Critical Infrastructures | 2 | 0.45 | 2017 |
Critical Infrastructure Protection: A Holistic Methodology for Greece. | 0 | 0.34 | 2016 |
Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures. | 4 | 0.75 | 2016 |
Combining Invariant Violation with Execution Path Classification for Detecting Multiple Types of Logical Errors and Race Conditions. | 1 | 0.36 | 2016 |
Automated exploit detection using path profiling: The disposition should matter, not the position | 1 | 0.35 | 2015 |
"Water, Water, Every Where": Nuances For A Water Industry Critical Infrastructure Specification Exemplar | 0 | 0.34 | 2015 |
Using Logical Error Detection in Software Controlling Remote-Terminal Units to Predict Critical Information Infrastructures Failures | 1 | 0.35 | 2015 |
Execution Path Classification for Vulnerability Analysis and Detection. | 0 | 0.34 | 2015 |
A Bug Hunter's Diary. | 1 | 0.34 | 2014 |
Insider Threat: Enhancing BPM through Social Media | 5 | 0.43 | 2014 |
Automated Detection of Logical Errors in Programs. | 4 | 0.41 | 2014 |
On Business Logic Vulnerabilities Hunting: The APP_LogGIC Framework. | 6 | 0.47 | 2013 |
Hunting application-level logical errors | 8 | 0.53 | 2012 |