Amanote Research

Amanote Research

    RegisterSign In

COSAK: Code Security Analysis Kit

doi 10.21236/ada421440
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2004

Authors
Spiros Mancoridis
Publisher

Defense Technical Information Center


Related search

Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis

Proceedings - International Conference on Software Engineering
Software
2007English

Reverse Engineering for Malicious Code Behavior Analysis Using Virtual Security Patching

International Journal of Computer Applications
2011English

High System-Code Security With Low Overhead

2015English

Modular Verification of Security Protocol Code by Typing

ACM SIGPLAN Notices
Computer Science
2010English

Data Security Through Qr Code Encryption and Steganography

Advanced Computing: An International Journal
2016English

Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2002English

Security Mechanisms for Legacy Code Applications in GT3 Environment

English

High Security Adaptive BCH Code Discrete Wavelet Transform Copyright Protection

2019English

Design, Detection and Management of Mechanical Security Code Manhole Cover

MATEC Web of Conferences
Materials ScienceEngineeringChemistry
2018English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy