Dr. Hassen Saidi
Dr. Hassen Saidi
Sr Computer Scientist, SRI International
E-mail megerősítve itt: csl.sri.com - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Construction of abstract state graphs with PVS
S Graf, H Saïdi
International Conference on Computer Aided Verification, 72-83, 1997
18541997
Aurasium: Practical policy enforcement for android applications
R Xu, H Saïdi, R Anderson
Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security …, 2012
5322012
Abstract and model check while you prove
H Saïdi, N Shankar
International Conference on Computer Aided Verification, 443-454, 1999
2481999
Signal monitoring apparatus analyzing voice communication content
CD Blair, RL Keenan
US Patent 6,757,361, 2004
2442004
An overview of SAL
S Bensalem, V Ganesh, Y Lakhnech, C Munoz, S Owre, H Rueß, ...
NASA CONFERENCE PUBLICATION, 187-195, 2000
2392000
A multi-perspective analysis of the storm (peacomm) worm
P Porras, H Saidi, V Yegneswaran
Technical report, Computer Science Laboratory, SRI International, 2007
1892007
An analysis of conficker’s logic and rendezvous points
P Porras, H Saidi, V Yegneswaran
Computer Science Laboratory, SRI International, Tech. Rep, 36, 2009
1832009
Powerful techniques for the automatic generation of invariants
S Bensalem, Y Lakhnech, H Saidi
International Conference on Computer Aided Verification, 323-335, 1996
1711996
A Foray into Conficker's Logic and Rendezvous Points.
PA Porras, H Saïdi, V Yegneswaran
LEET 9, 7, 2009
1552009
Eureka: A framework for enabling static malware analysis
M Sharif, V Yegneswaran, H Saidi, P Porras, W Lee
European Symposium on Research in Computer Security, 481-500, 2008
1392008
Model checking guided abstraction and analysis
H Saïdi
International Static Analysis Symposium, 377-396, 2000
1392000
Binding of polychlorinated biphenyls to the aryl hydrocarbon receptor.
SA Kafafi, HY Afeefy, AH Ali, HK Said, AG Kafafi
Environmental Health Perspectives 101 (5), 422-428, 1993
1091993
A technique for invariant generation
A Tiwari, H Rueß, H Saïdi, N Shankar
International Conference on Tools and Algorithms for the Construction and …, 2001
1022001
An analysis of the ikee. b iphone botnet
P Porras, H Saidi, V Yegneswaran
International Conference on Security and Privacy in Mobile Information and …, 2010
872010
Conficker C analysis
P Porras, H Saidi, V Yegneswaran
SRI International 1, 1-1, 2009
802009
An architecture for an adaptive intrusion-tolerant server
A Valdes, M Almgren, S Cheung, Y Deswarte, B Dutertre, J Levy, H Saidi, ...
International Workshop on Security Protocols, 158-178, 2002
712002
Method and system for application-based policy monitoring and enforcement on a mobile device
H Saidi, R Xu
US Patent 8,844,036, 2014
622014
Intrusion tolerant software architectures
V Stavridou, B Dutertre, RA Riemenschneider, H Saidi
Proceedings DARPA Information Survivability Conference and Exposition II …, 2001
622001
Verifying invariants using theorem proving
S Graf, H Saïdi
International Conference on Computer Aided Verification, 196-207, 1996
621996
Polymorphic computing architectures
CS Lockett, SA Oberg, SM Forsberg, H Saidi, JE Casper
US Patent 9,501,666, 2016
602016
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20