Search results for: Kenji Kono
Lecture Notes in Computer Science > Detection of Intrusions and Malware, and Vulnerability Assessment > Emulation-Based Detection > 68-87
Lecture Notes in Computer Science > Software Security — Theories and Systems > Securing Programs by Rewriting and Sandboxing > 172-184
Lecture Notes in Computer Science > Advances in Computing Science – ASIAN 2003. Progamming Languages and Distributed Computation Programming Languages and Distributed Computation > 18-32