Contents
-
Publicly AvailableFrontmatterApril 14, 2017
- Editorial
-
Requires Authentication UnlicensedVulnerability analysisLicensedMarch 20, 2017
- Thematic Issue: Vulnerability Analysis
-
Requires Authentication UnlicensedOn the misuse of graphical user interface elements to implement security controlsLicensedMarch 15, 2017
-
Requires Authentication UnlicensedE-mail Header Injection VulnerabilitiesLicensedMarch 15, 2017
-
Requires Authentication Unlicensed64-Bit Migration VulnerabilitiesLicensedFebruary 13, 2017
-
Publicly AvailableCross-architecture bug search in binary executablesMarch 28, 2017
-
Requires Authentication UnlicensedExploitation as code reuse: On the need of formalizationLicensedJanuary 17, 2017
- Distinguished Dissertations
-
Requires Authentication UnlicensedPattern-based methods for vulnerability discoveryLicensedMarch 20, 2017
Issues in this Volume
-
Issue 6Urban Informatics / Guest Editor: Marcus Foth
-
Issue 5Multicore technology in the mobility domains / Guest Editor: Jürgen Becker
-
Issue 4Data Integration in Life Sciences / Guest Editor: Hans-Ulrich Prokosch
-
Issue 3Modern Database Architectures for Modern Hardware / Guest Editor: Wolfgang Lehner
-
Issue 2Vulnerability Analysis / Guest Editor: Konrad Rieck
-
Issue 1Recent Trends in Energy Informatics Research / Guest Editors: Sebastian Lehnhoff, Astrid Nieße
Issues in this Volume
-
Issue 6Urban Informatics / Guest Editor: Marcus Foth
-
Issue 5Multicore technology in the mobility domains / Guest Editor: Jürgen Becker
-
Issue 4Data Integration in Life Sciences / Guest Editor: Hans-Ulrich Prokosch
-
Issue 3Modern Database Architectures for Modern Hardware / Guest Editor: Wolfgang Lehner
-
Issue 2Vulnerability Analysis / Guest Editor: Konrad Rieck
-
Issue 1Recent Trends in Energy Informatics Research / Guest Editors: Sebastian Lehnhoff, Astrid Nieße