DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 138,438
1.
  • CHEX CHEX
    Lu, Long; Li, Zhichun; Wu, Zhenyu ... Proceedings of the 2012 ACM conference on Computer and communications security, 10/2012
    Conference Proceeding

    An enormous number of apps have been developed for Android in recent years, making it one of the most popular mobile operating systems. However, the quality of the booming apps can be a concern 4. ...
Full text
Available for: UL
2.
  • An Empirical Comparison of ... An Empirical Comparison of Model Validation Techniques for Defect Prediction Models
    Tantithamthavorn, Chakkrit; McIntosh, Shane; Hassan, Ahmed E. ... IEEE transactions on software engineering, 2017-Jan.-1, 2017-1-1, 20170101, Volume: 43, Issue: 1
    Journal Article
    Peer reviewed

    Defect prediction models help software quality assurance teams to allocate their limited resources to the most defect-prone modules. Model validation techniques, such as <inline-formula><tex-math ...
Full text
Available for: UL
3.
  • Amandroid Amandroid
    Wei, Fengguo; Roy, Sankardas; Ou, Xinming ... Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 11/2014
    Conference Proceeding

    We propose a new approach to conduct static analysis for security vetting of Android apps, and built a general framework, called Amandroid for determining points-to information for all objects in an ...
Full text
Available for: UL
4.
Full text
Available for: UL

PDF
5.
  • Semantics-Aware Android Mal... Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs
    Zhang, Mu; Duan, Yue; Yin, Heng ... Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 11/2014
    Conference Proceeding
    Open access

    The drastic increase of Android malware has led to a strong interest in developing methods to automate the malware analysis process. Existing automated Android malware detection and classification ...
Full text
Available for: UL
6.
  • Static detection of cross-s... Static detection of cross-site scripting vulnerabilities
    Wassermann, Gary; Su, Zhendong 2008 ACM/IEEE 30th International Conference on Software Engineering, 01/2008, Volume: 2008, Issue: 24
    Conference Proceeding, Journal Article

    Web applications support many of our daily activities, but they often have security problems, and their accessibility makes them easy to exploit. In cross-site scripting (XSS), an attacker exploits ...
Full text
Available for: UL
7.
Check availability
8.
Full text
Available for: BF, UL

PDF
9.
  • Model selection using infor... Model selection using information criteria, but is the "best" model any good?
    Mac Nally, Ralph; Duncan, Richard P.; Thomson, James R. ... The Journal of applied ecology, 05/2018, Volume: 55, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    1. Information criteria (ICs) are used widely for data summary and model building in ecology, especially in applied ecology and wildlife management. Although ICs are useful for distinguishing among ...
Full text
Available for: UL

PDF
10.
  • Validation process of EDTA ... Validation process of EDTA for infusion/ injection with ceftriaxone and sulbactam
    Akhtar, Md. Semimul; Babu, Akash; Kumar Mandal, Sudip Journal of applied pharmaceutical research, 9/2021, Volume: 9, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    The validation of the manufacturing process to produce ceftriaxone/ sulbactam with EDTA1.5 g/ vial powder for solution for injection/ infusion. Ceftriaxone works by inhibiting the mucopeptide ...
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 138,438

Load filters