Search Results
2. Adaptive Anomaly Detection via Self-Calibration and Dynamic Updating
3. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors
4. Online Network Forensics for Automatic Repair Validation
5. Pushback for Overlay Networks: Protecting Against Malicious Insiders
6. Return Value Predictability Profiles for Self–healing
7. Return Value Predictability Profiles for Self-Healing
8. A Model for Automatically Repairing Execution Integrity
9. Defending Against Next Generation Through Network/Endpoint Collaboration and Interaction
10. From STEM to SEAD: Speculative Execution for Automated Defense
- « Previous
- Next »
- 1
- 2
- 3
- 4