DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Heewan | ko |
dc.contributor.author | Choi, Seokwoo | ko |
dc.contributor.author | Seo, Sunae | ko |
dc.contributor.author | Han, Taisook | ko |
dc.date.accessioned | 2010-02-03T05:20:23Z | - |
dc.date.available | 2010-02-03T05:20:23Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2008-04-24 | - |
dc.identifier.citation | 2nd International Conference on Information Security and Assurance, ISA 2008, pp.32 - 35 | - |
dc.identifier.uri | http://hdl.handle.net/10203/16446 | - |
dc.description.sponsorship | ∗This research was partially supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) Support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2008- C1090-0801-0020), and partially supported by Brain Korea 21 Project, the School of Information Technology, KAIST in 2008. | en |
dc.language | English | - |
dc.language.iso | en_US | en |
dc.publisher | IEEE | - |
dc.title | SCV: Structure and constant value based binary diffing | - |
dc.title.alternative | SCV: Structure and Constant Value Based Binary Diffing | - |
dc.type | Conference | - |
dc.identifier.wosid | 000256051100006 | - |
dc.identifier.scopusid | 2-s2.0-51349093788 | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 32 | - |
dc.citation.endingpage | 35 | - |
dc.citation.publicationname | 2nd International Conference on Information Security and Assurance, ISA 2008 | - |
dc.identifier.conferencecountry | KO | - |
dc.identifier.conferencelocation | Busan | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Han, Taisook | - |
dc.contributor.nonIdAuthor | Park, Heewan | - |
dc.contributor.nonIdAuthor | Choi, Seokwoo | - |
dc.contributor.nonIdAuthor | Seo, Sunae | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.