|
Search the dblp DataBase
Marco Cova:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Paolo Avesani, Conor Hayes, Marco Cova
Language Games: Solving the Vocabulary Problem in Multi-Case-Base Reasoning. [Citation Graph (0, 0)][DBLP] ICCBR, 2005, pp:35-49 [Conf]
- Greg Banks, Marco Cova, Viktoria Felmetsger, Kevin C. Almeroth, Richard A. Kemmerer, Giovanni Vigna
SNOOZE: Toward a Stateful NetwOrk prOtocol fuzZEr. [Citation Graph (0, 0)][DBLP] ISC, 2006, pp:343-358 [Conf]
- Paolo Avesani, Marco Cova
Shared lexicon for distributed annotations on the Web. [Citation Graph (0, 0)][DBLP] WWW, 2005, pp:207-214 [Conf]
- Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna
Static Detection of Vulnerabilities in x86 Executables. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:269-278 [Conf]
- Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. [Citation Graph (0, 0)][DBLP] RAID, 2007, pp:63-86 [Conf]
Analyzing and Detecting Malicious Flash Advertisements. [Citation Graph (, )][DBLP]
Multi-module vulnerability analysis of web-based applications. [Citation Graph (, )][DBLP]
Your botnet is my botnet: analysis of a botnet takeover. [Citation Graph (, )][DBLP]
Organizing Large Scale Hacking Competitions. [Citation Graph (, )][DBLP]
Why Johnny Can't Pentest: An Analysis of Black-Box Web Vulnerability Scanners. [Citation Graph (, )][DBLP]
Are your votes really counted?: testing the security of real-world electronic voting systems. [Citation Graph (, )][DBLP]
An Analysis of Rogue AV Campaigns. [Citation Graph (, )][DBLP]
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. [Citation Graph (, )][DBLP]
ClearShot: Eavesdropping on Keyboard Input from Video. [Citation Graph (, )][DBLP]
Symbolic String Verification: An Automata-Based Approach. [Citation Graph (, )][DBLP]
There Is No Free Phish: An Analysis of "Free" and Live Phishing Kits. [Citation Graph (, )][DBLP]
Detection and analysis of drive-by-download attacks and malicious JavaScript code. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|