
- [Bulut 1973] Bulut, Necdet. Invariant properties of algorithms. PhD Thesis, Purdue University (August 1973) 118-119. Google Scholar
Digital Library
- [Bulut 1974] Bulut, Necdet and Halstead, Maurice H. Inpurities found in algorithm implemnetations. CSD-TR 111, Purdue University (1974).Google Scholar
- [Halstead 1972] Halstead, M. H. Natural laws controlling algorithm structure? ACM SIGPLAN Notices 7, 2 (February 1972) 19-26. Google Scholar
Digital Library
- [Halstead 1977] Halstead, Maurice H. Elements of Software Science. Elsevier North Holland, New York. (1977) (in press). Google Scholar
Digital Library
- [Kulm 1975] Kulm, Gerald. Language level applied to the information content of technical prose. In Collective phenonoma and the applications of physics to other fields of science (Prepared for delivery at a seminar Moscow, USSR, 1-5 July 1974) Norman A. Chigier and Edward A. Stern, eds., Fayetteville, N. Y. Brain Research Publications (1975) 401-408.Google Scholar
- [Ottenstein 1976] Ottenstein, Karl J. A Program to count operators and operands for ANSI-FORTRAN modules. CSD-TR 196, Purdue University (June 1976).Google Scholar
Index Terms
An algorithmic approach to the detection and prevention of plagiarism
Recommendations
A prevention model for algorithmic complexity attacks
DIMVA'05: Proceedings of the Second international conference on Detection of Intrusions and Malware, and Vulnerability AssessmentDenial of Service (DoS) attack has been identified in security surveys as the second largest cause of monetary loss. Hence, DoS is a very important problem that needs to be dealt with seriously. Many DoS attacks are conducted by generating extremely ...
A two-level hybrid approach for intrusion detection
To exploit the strengths of misuse detection and anomaly detection, an intensive focus on intrusion detection combines the two. From a novel perspective, in this paper, we proposed a hybrid approach toward achieving a high detection rate with a low ...
Web-based monitoring approach for network-based intrusion detection and prevention
There were many reports about incidents of network attacks and security treats. Damages caused by network attacks and malwares can be extremely expensive or unaffordable. In this paper, we present a web-based management system for network-based ...






Comments