|
|
Line 1: |
Line 1: |
− | {{cventry |[1]|Serguei A. Mokhov, Michael J. Assels, Joey Paquet, Mourad Debbabi: Toward Automated MAC Spoofer Investigations. In: Proceedings of the Seventh International C* Conference on Computer Science and Software Engineering (C3S2E'14), Montreal, Canada. ACM, August 2014. p.27 [http://doi.acm.org/10.1145/2641483.2641540]}} | + | {{cventry |[1]|Serguei A. Mokhov, Michael J. Assels, Joey Paquet, Mourad Debbabi: Toward Automated MAC Spoofer Investigations. In: Proceedings of the Seventh International C* Conference on Computer Science and Software Engineering (C3S2E'14), Montreal, Canada. ACM, August 2014. p.27 doi: 10.1145/2641483.2641540 [http://doi.acm.org/10.1145/2641483.2641540]}} |
| | | |
− | {{cventry |[2]|Touraj Laleh, Arash Khodadadi, Serguei A. Mokhov, Joey Paquet, Yuhong Yan: Toward Policy-Based Dynamic Context-Aware Adaptation Architecture for Web Service Composition. In: Proceedings of the Seventh International C* Conference on Computer Science and Software Engineering (C3S2E'14), Montreal, Canada. ACM, August 2014. p.23 [http://doi.acm.org/10.1145/2641483.2641528]}} | + | {{cventry |[2]|Touraj Laleh, Arash Khodadadi, Serguei A. Mokhov, Joey Paquet, Yuhong Yan: Toward Policy-Based Dynamic Context-Aware Adaptation Architecture for Web Service Composition. In: Proceedings of the Seventh International C* Conference on Computer Science and Software Engineering (C3S2E'14), Montreal, Canada. ACM, August 2014. p.23 doi: 10.1145/2641483.2641528 [http://doi.acm.org/10.1145/2641483.2641528]}} |
| | | |
| {{cventry |[3]|Serguei A. Mokhov, Joey Paquet and Mourad Debbabi. "The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities". In: Proceedings of the Canadian Conference on AI 2014, Montreal, Canada. Lecture Notes in Computer Science #8436, Springer. May 2014, pp. 326-332. doi: 10.1007/978-3-319-06483-3_33. [http://dx.doi.org/10.1007/978-3-319-06483-3_33]}} | | {{cventry |[3]|Serguei A. Mokhov, Joey Paquet and Mourad Debbabi. "The Use of NLP Techniques in Static Code Analysis to Detect Weaknesses and Vulnerabilities". In: Proceedings of the Canadian Conference on AI 2014, Montreal, Canada. Lecture Notes in Computer Science #8436, Springer. May 2014, pp. 326-332. doi: 10.1007/978-3-319-06483-3_33. [http://dx.doi.org/10.1007/978-3-319-06483-3_33]}} |