| dc.identifier.uri | http://hdl.handle.net/11401/72414 | |
| dc.identifier.uri | http://hdl.handle.net/1951/52300 | |
| dc.description.sponsorship | This work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree. | en_US |
| dc.format | Monograph | |
| dc.format.medium | Electronic Resource | en_US |
| dc.language.iso | en_US | |
| dc.publisher | The Graduate School, Stony Brook University: Stony Brook, NY. | |
| dc.type | Dissertation | |
| dcterms.available | 2011-09-13T17:32:05Z | |
| dcterms.available | 2015-04-24T14:51:54Z | |
| dcterms.creator | Xu, Wei | |
| dcterms.dateAccepted | 2011-09-13T17:32:05Z | |
| dcterms.dateAccepted | 2015-04-24T14:51:54Z | |
| dcterms.dateSubmitted | 2011-09-13T17:32:05Z | |
| dcterms.dateSubmitted | 2015-04-24T14:51:54Z | |
| dcterms.format | Application/PDF | en_US |
| dcterms.format | Monograph | |
| dcterms.identifier | http://hdl.handle.net/11401/72414 | |
| dcterms.identifier | 000000783.sbu.pdf | en_US |
| dcterms.identifier | http://hdl.handle.net/1951/52300 | |
| dcterms.issued | 2009-08-01 | |
| dcterms.language | en_US | |
| dcterms.provenance | Made available in DSpace on 2011-09-13T17:32:05Z (GMT). No. of bitstreams: 1
000000783.sbu.pdf: 877798 bytes, checksum: c3adb14ce0605cb6c63ed8bc83872a27 (MD5) | en |
| dcterms.provenance | Made available in DSpace on 2015-04-24T14:51:54Z (GMT). No. of bitstreams: 3
000000783.sbu.pdf.jpg: 1894 bytes, checksum: a6009c46e6ec8251b348085684cba80d (MD5)
000000783.sbu.pdf.txt: 251682 bytes, checksum: 82238ef03788d92a0763d2eb440b765c (MD5)
000000783.sbu.pdf: 877798 bytes, checksum: c3adb14ce0605cb6c63ed8bc83872a27 (MD5)
Previous issue date: 2009-08-01 | en |
| dcterms.publisher | The Graduate School, Stony Brook University: Stony Brook, NY. | |
| dcterms.subject | Programming languages (Electronic computers) | |
| dcterms.subject | Cyber attacks | |
| dcterms.subject | Computer security | |
| dcterms.subject | Cyberterrorism | |
| dcterms.title | Program Transformation Techniques For
Automatic Runtime Detection Of
Software Exploits | |
| dcterms.type | Dissertation | |