Search results for: Aloysius K Mok
Lecture Notes in Computer Science > Real-Time and Embedded Computing Systems and Applications > Scheduling > 18-37
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Web Application Testing and Evasion > 175-190
Lecture Notes in Computer Science > Embedded Software > Regular Papers > 356-372
Lecture Notes in Computer Science > Active, Real-Time, and Temporal Database Systems > Invited Talks > 27-38
Lecture Notes in Computer Science > Software Security - Theories and Systems > Part 2: Verification of Security Properties > 113-133
Lecture Notes in Computer Science > Active, Real-Time, and Temporal Database Systems > Panel Sessions > 231-237
Lecture Notes in Computer Science > Embedded Software > 182-196
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > Detecting Worms and Viruses > 82-101
Lecture Notes in Computer Science > Recent Advances in Intrusion Detection > System Call-Based Intrusion Detection > 165-184
IEEE Transactions on Knowledge and Data Engineering > 2016 > 28 > 3 > 756 - 769
Wireless Networks > 2015 > 21 > 6 > 1999-2018