يعرض 1 - 10 نتائج من 36 نتيجة بحث عن '"Shirani, Paria"', وقت الاستعلام: 0.83s تنقيح النتائج
  1. 1
    كتاب إلكتروني

    المساهمون: Goos, Gerhard, Founding EditorAff1, Hartmanis, Juris, Founding EditorAff2, Bertino, Elisa, Editorial Board MemberAff3, Gao, Wen, Editorial Board MemberAff4, Steffen, Bernhard, Editorial Board MemberAff5, Yung, Moti, Editorial Board MemberAff6, Günther, Felix, editorAff7, Hesse, Julia, editorAff8

    المصدر: Security Standardisation Research : 8th International Conference, SSR 2023, Lyon, France, April 22-23, 2023, Proceedings. 13895:103-128

  2. 2
  3. 3
    مؤتمر

    المصدر: 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE) Electrical and Computer Engineering (CCECE), 2015 IEEE 28th Canadian Conference on. :836-841 May, 2015

    Relation: 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE)

  4. 4
    كتاب إلكتروني

    المؤلفون: Alrabaee, SaedAff12, Debbabi, MouradAff13, Shirani, PariaAff13, Wang, LingyuAff13, Youssef, AmrAff13, Rahimian, AshkanAff14, Nouh, LinaAff15, Mouheb, DjedjigaAff16, Huang, HeAff17, Hanna, AimanAff13

    المساهمون: Jajodia, Sushil, Series EditorAff1, Alrabaee, SaedAff2, Debbabi, MouradAff3, Shirani, PariaAff4, Wang, LingyuAff5, Youssef, AmrAff6, Rahimian, AshkanAff7, Nouh, LinaAff8, Mouheb, DjedjigaAff9, Huang, HeAff10, Hanna, AimanAff11

    المصدر: Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting. 78:211-230

  5. 5
    كتاب إلكتروني

    المؤلفون: Alrabaee, SaedAff12, Debbabi, MouradAff13, Shirani, PariaAff13, Wang, LingyuAff13, Youssef, AmrAff13, Rahimian, AshkanAff14, Nouh, LinaAff15, Mouheb, DjedjigaAff16, Huang, HeAff17, Hanna, AimanAff13

    المساهمون: Jajodia, Sushil, Series EditorAff1, Alrabaee, SaedAff2, Debbabi, MouradAff3, Shirani, PariaAff4, Wang, LingyuAff5, Youssef, AmrAff6, Rahimian, AshkanAff7, Nouh, LinaAff8, Mouheb, DjedjigaAff9, Huang, HeAff10, Hanna, AimanAff11

    المصدر: Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting. 78:187-209

  6. 6
    كتاب إلكتروني

    المؤلفون: Alrabaee, SaedAff12, Debbabi, MouradAff13, Shirani, PariaAff13, Wang, LingyuAff13, Youssef, AmrAff13, Rahimian, AshkanAff14, Nouh, LinaAff15, Mouheb, DjedjigaAff16, Huang, HeAff17, Hanna, AimanAff13

    المساهمون: Jajodia, Sushil, Series EditorAff1, Alrabaee, SaedAff2, Debbabi, MouradAff3, Shirani, PariaAff4, Wang, LingyuAff5, Youssef, AmrAff6, Rahimian, AshkanAff7, Nouh, LinaAff8, Mouheb, DjedjigaAff9, Huang, HeAff10, Hanna, AimanAff11

    المصدر: Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting. 78:157-186

  7. 7
    كتاب إلكتروني

    المؤلفون: Alrabaee, SaedAff12, Debbabi, MouradAff13, Shirani, PariaAff13, Wang, LingyuAff13, Youssef, AmrAff13, Rahimian, AshkanAff14, Nouh, LinaAff15, Mouheb, DjedjigaAff16, Huang, HeAff17, Hanna, AimanAff13

    المساهمون: Jajodia, Sushil, Series EditorAff1, Alrabaee, SaedAff2, Debbabi, MouradAff3, Shirani, PariaAff4, Wang, LingyuAff5, Youssef, AmrAff6, Rahimian, AshkanAff7, Nouh, LinaAff8, Mouheb, DjedjigaAff9, Huang, HeAff10, Hanna, AimanAff11

    المصدر: Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting. 78:123-155

  8. 8
    كتاب إلكتروني

    المؤلفون: Alrabaee, SaedAff12, Debbabi, MouradAff13, Shirani, PariaAff13, Wang, LingyuAff13, Youssef, AmrAff13, Rahimian, AshkanAff14, Nouh, LinaAff15, Mouheb, DjedjigaAff16, Huang, HeAff17, Hanna, AimanAff13

    المساهمون: Jajodia, Sushil, Series EditorAff1, Alrabaee, SaedAff2, Debbabi, MouradAff3, Shirani, PariaAff4, Wang, LingyuAff5, Youssef, AmrAff6, Rahimian, AshkanAff7, Nouh, LinaAff8, Mouheb, DjedjigaAff9, Huang, HeAff10, Hanna, AimanAff11

    المصدر: Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting. 78:79-99

  9. 9
    كتاب إلكتروني

    المؤلفون: Alrabaee, SaedAff12, Debbabi, MouradAff13, Shirani, PariaAff13, Wang, LingyuAff13, Youssef, AmrAff13, Rahimian, AshkanAff14, Nouh, LinaAff15, Mouheb, DjedjigaAff16, Huang, HeAff17, Hanna, AimanAff13

    المساهمون: Jajodia, Sushil, Series EditorAff1, Alrabaee, SaedAff2, Debbabi, MouradAff3, Shirani, PariaAff4, Wang, LingyuAff5, Youssef, AmrAff6, Rahimian, AshkanAff7, Nouh, LinaAff8, Mouheb, DjedjigaAff9, Huang, HeAff10, Hanna, AimanAff11

    المصدر: Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting. 78:101-122

  10. 10
    كتاب إلكتروني

    المؤلفون: Alrabaee, SaedAff12, Debbabi, MouradAff13, Shirani, PariaAff13, Wang, LingyuAff13, Youssef, AmrAff13, Rahimian, AshkanAff14, Nouh, LinaAff15, Mouheb, DjedjigaAff16, Huang, HeAff17, Hanna, AimanAff13

    المساهمون: Jajodia, Sushil, Series EditorAff1, Alrabaee, SaedAff2, Debbabi, MouradAff3, Shirani, PariaAff4, Wang, LingyuAff5, Youssef, AmrAff6, Rahimian, AshkanAff7, Nouh, LinaAff8, Mouheb, DjedjigaAff9, Huang, HeAff10, Hanna, AimanAff11

    المصدر: Binary Code Fingerprinting for Cybersecurity : Application to Malicious Code Fingerprinting. 78:45-78