185 | -- | 196 | Marcus Botacin, Marco Antonio Zanata Alves, André Grégio. The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support |
197 | -- | 216 | Vladimir Fomichev, Alisa Koreneva. Encryption performance and security of certain wide block ciphers |
217 | -- | 227 | Jiaxing Cheng, Ying Li, Cheng Huang, Ailing Yu, Tao Zhang. ACER: detecting Shadowsocks server based on active probe technology |
229 | -- | 244 | Mugdha Jain, William Andreopoulos, Mark Stamp. Convolutional neural networks and extreme learning machines for malware classification |
245 | -- | 256 | Javier Carrillo Mondéjar, Juan Manuel Castelo Gómez, José Roldán Gómez, José Luis Martínez. An instrumentation based algorithm for stack overflow detection |