Show simple item record

dc.identifier.urihttp://hdl.handle.net/11401/72414
dc.identifier.urihttp://hdl.handle.net/1951/52300
dc.description.sponsorshipThis work is sponsored by the Stony Brook University Graduate School in compliance with the requirements for completion of degree.en_US
dc.formatMonograph
dc.format.mediumElectronic Resourceen_US
dc.language.isoen_US
dc.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dc.typeDissertation
dcterms.available2011-09-13T17:32:05Z
dcterms.available2015-04-24T14:51:54Z
dcterms.creatorXu, Wei
dcterms.dateAccepted2011-09-13T17:32:05Z
dcterms.dateAccepted2015-04-24T14:51:54Z
dcterms.dateSubmitted2011-09-13T17:32:05Z
dcterms.dateSubmitted2015-04-24T14:51:54Z
dcterms.formatApplication/PDFen_US
dcterms.formatMonograph
dcterms.identifierhttp://hdl.handle.net/11401/72414
dcterms.identifier000000783.sbu.pdfen_US
dcterms.identifierhttp://hdl.handle.net/1951/52300
dcterms.issued2009-08-01
dcterms.languageen_US
dcterms.provenanceMade available in DSpace on 2011-09-13T17:32:05Z (GMT). No. of bitstreams: 1 000000783.sbu.pdf: 877798 bytes, checksum: c3adb14ce0605cb6c63ed8bc83872a27 (MD5)en
dcterms.provenanceMade available in DSpace on 2015-04-24T14:51:54Z (GMT). No. of bitstreams: 3 000000783.sbu.pdf.jpg: 1894 bytes, checksum: a6009c46e6ec8251b348085684cba80d (MD5) 000000783.sbu.pdf.txt: 251682 bytes, checksum: 82238ef03788d92a0763d2eb440b765c (MD5) 000000783.sbu.pdf: 877798 bytes, checksum: c3adb14ce0605cb6c63ed8bc83872a27 (MD5) Previous issue date: 2009-08-01en
dcterms.publisherThe Graduate School, Stony Brook University: Stony Brook, NY.
dcterms.subjectProgramming languages (Electronic computers)
dcterms.subjectCyber attacks
dcterms.subjectComputer security
dcterms.subjectCyberterrorism
dcterms.titleProgram Transformation Techniques For Automatic Runtime Detection Of Software Exploits
dcterms.typeDissertation


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record