-
1
-
-
0000710299
-
Queries and concept learning
-
Angluin, D.: Queries and concept learning. Mach. Learn. 2-4:319-342 (1988)
-
(1988)
Mach. Learn.
, vol.2-4
, pp. 319-342
-
-
Angluin, D.1
-
3
-
-
0003723775
-
-
Cambridge: Cambridge University Press, ISBN 0-5214-4432-2 and ISBN 0-5217-7231-1
-
Beth, T., Jungnickel, D., Lenz, H.: Design Theory, vol. 1. Cambridge: Cambridge University Press, ISBN 0-5214-4432-2 and ISBN 0-5217-7231-1 (1.999)
-
(1999)
Design Theory
, vol.1
-
-
Beth, T.1
Jungnickel, D.2
Lenz, H.3
-
6
-
-
84944068664
-
A new statistical testing for symmetric ciphers and hash functions
-
Proceedings of the 4th International Conference on Information and Communication Security 2002, Berlin Heidelberg New York: Springer
-
Filiol, E.: A new statistical testing for symmetric ciphers and hash functions. In: Proceedings of the 4th International Conference on Information and Communication Security 2002, Lecture Notes in Computer Science, vol. 2513, pp. 342-353. Berlin Heidelberg New York: Springer (2002)
-
(2002)
Lecture Notes in Computer Science
, vol.2513
, pp. 342-353
-
-
Filiol, E.1
-
9
-
-
33748967226
-
-
Fortinet, http://www.fortinet.com/FortiGuardCenter/global_threat_ stats.html
-
-
-
-
10
-
-
0344113893
-
Constructing computer virus phylogenies
-
Goldberg, L.A., Goldberg, P.W., Phillips, C.A., Sorkin, G.B.: Constructing computer virus phylogenies. J. Algorithms 26, 188-208 (1998)
-
(1998)
J. Algorithms
, vol.26
, pp. 188-208
-
-
Goldberg, L.A.1
Goldberg, P.W.2
Phillips, C.A.3
Sorkin, G.B.4
-
12
-
-
33746882464
-
Malware phylogeny generation using permutations of code
-
Karim, Md.E., Walenstein, A., Lakhotia, A.: Malware phylogeny generation using permutations of code. J. Comput. Virol. 1(1-2), pp. 13-23 (2005)
-
(2005)
J. Comput. Virol.
, vol.1
, Issue.1-2
, pp. 13-23
-
-
Karim, Md.E.1
Walenstein, A.2
Lakhotia, A.3
-
15
-
-
33845331515
-
Minimization of Boolean functions
-
McCluskey, E.J.: Minimization of Boolean functions. Bell Syst. Tech. J. 35(5), 1417-1444 (1956)
-
(1956)
Bell Syst. Tech. J.
, vol.35
, Issue.5
, pp. 1417-1444
-
-
McCluskey, E.J.1
-
16
-
-
84944878354
-
-
CRC, Boca Raton, ISBN 0-8493-8523-7
-
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC, Boca Raton, ISBN 0-8493-8523-7 (1997)
-
(1997)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Van Oorschot, P.C.2
Vanstone, S.A.3
-
17
-
-
33748962046
-
Algebraic Structures
-
Rosen K.H. (ed.), CRC, Boca Raton, ISBN 0-8493-0149-1
-
Michaels, J.G.: Algebraic Structures. In: Rosen K.H. (ed.), Handbook of Discrete and Combinatorial Mathematics, pp. 344-354. CRC, Boca Raton, ISBN 0-8493-0149-1 (2000)
-
(2000)
Handbook of Discrete and Combinatorial Mathematics
, pp. 344-354
-
-
Michaels, J.G.1
-
19
-
-
0000070975
-
The problem of symplifying truth functions
-
Quine, V.W.: The problem of symplifying truth functions. Am. Math. Monthly 59(8), 521-531 (1952)
-
(1952)
Am. Math. Monthly
, vol.59
, Issue.8
, pp. 521-531
-
-
Quine, V.W.1
-
20
-
-
0000316190
-
A way to simplify truth functions
-
Quine, V.W.: A way to simplify truth functions. Am. Math. Monthly 62, 627-631 (1955)
-
(1955)
Am. Math. Monthly
, vol.62
, pp. 627-631
-
-
Quine, V.W.1
-
21
-
-
84856043672
-
A mathematical theory of communication
-
Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27, pp. 379-423, 623-656 (1948)
-
(1948)
Bell Syst. Tech. J.
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
22
-
-
3142720692
-
-
UK Department of Trade and Industry, A video presenting the report to the press as well as a summary for decision-makers are also available on this website (2004)
-
Stimms, S., Potter, C., Beard, A.: 2004 information security breaches survey, UK Department of Trade and Industry, 2004. Available at http://www.security-survey.gov.uk. A video presenting the report to the press as well as a summary for decision-makers are also available on this website (2004)
-
(2004)
2004 Information Security Breaches Survey
-
-
Stimms, S.1
Potter, C.2
Beard, A.3
|