Issue Date: 11-16 April 2010rnrntOn page(s): rnt158rnttrn- 163rnrnrnLocation: Menuires, TBD, FrancernrnPrint ISBN: 978-1-4244-6231-5rnrnrnrnttrnDigital Object Identifier: href=''http://dx.doi.org/10.1109/ICONS.2010.34'' target=''_blank''>10.1109/ICONS.2010.34 rnrnDate of Current Version: trnrnt2010-05-13 13:19:46.0rnrnt rntt class="body-text">rntname="Abstract">>Abstractrn>Whilst the precise objectives and mechanisms used by malicious code will vary widely and may involve wholly unknown techniques to achieve their respective objectives, certain second-order operations such as privilege escalation or concealment of the codeȁ9;
s presence or activity are predictable. In particular, concealment mechanisms must modify well-known d;
Asymmetric Concurrency; Computational Model; Intrusion Detection; Memory Observation;
机译:双向滑动压电致动器的设计,建模和性能,具有耦合的不对称挠性铰链机构
机译:使用不对称球面耦合逸出概率对光学厚彗星中的H2O和CO2建模,并将其应用于C / 2009 P1 Garradd彗星对CO,H2O和CO2的观测
机译:使用不对称球面耦合逸出概率对光学厚彗星中的H2O和CO2建模,并将其应用于C / 2009 P1 Garradd彗星对CO,H2O和CO2的观测
机译:密切耦合不对称并发性的观测机制及成本模型
机译:CSIRO中的季节性足迹机制与一般环流模型和观测值耦合。
机译:组合式Stroop任务切换范式中非对称切换成本的神经动力学机制
机译:关于“大气波-海洋耦合模式和观测中飓风边界层的对称和非对称结构”的评论