The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Marco Cova: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Paolo Avesani, Conor Hayes, Marco Cova
    Language Games: Solving the Vocabulary Problem in Multi-Case-Base Reasoning. [Citation Graph (0, 0)][DBLP]
    ICCBR, 2005, pp:35-49 [Conf]
  2. Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna
    SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. [Citation Graph (0, 0)][DBLP]
    ISC, 2006, pp:343-358 [Conf]
  3. Paolo Avesani, Marco Cova
    Shared lexicon for distributed annotations on the Web. [Citation Graph (0, 0)][DBLP]
    WWW, 2005, pp:207-214 [Conf]
  4. Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna
    Static Detection of Vulnerabilities in x86 Executables. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:269-278 [Conf]
  5. Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna
    Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:63-86 [Conf]

  6. Analyzing and Detecting Malicious Flash Advertisements. [Citation Graph (, )][DBLP]


  7. Multi-module vulnerability analysis of web-based applications. [Citation Graph (, )][DBLP]


  8. Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP]


  9. Organizing Large Scale Hacking Competitions. [Citation Graph (, )][DBLP]


  10. Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. [Citation Graph (, )][DBLP]


  11. Are your votes really counted?: testing the security of real-world electronic voting systems. [Citation Graph (, )][DBLP]


  12. An Analysis of Rogue AV Campaigns. [Citation Graph (, )][DBLP]


  13. Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. [Citation Graph (, )][DBLP]


  14. ClearShot: Eavesdropping on Keyboard Input from Video. [Citation Graph (, )][DBLP]


  15. Symbolic String Verification: An Automata-Based Approach. [Citation Graph (, )][DBLP]


  16. There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. [Citation Graph (, )][DBLP]


  17. Detection and analysis of drive-by-download attacks and malicious JavaScript code. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002