Evoattack - testing operating systems by learning harmful system call sequences

dc.contributor.advisorDenzinger, Jörg
dc.contributor.authorWilliams, Timothy Raymond
dc.date.accessioned2005-08-19T21:11:48Z
dc.date.available2005-08-19T21:11:48Z
dc.date.issued2003
dc.descriptionBibliography: p. 101-105.en
dc.format.extentix, 110 leaves : ill. ; 30 cm.en
dc.identifier.citationWilliams, T. R. (2003). Evoattack - testing operating systems by learning harmful system call sequences (Master's thesis, University of Calgary, Calgary, Canada). Retrieved from https://prism.ucalgary.ca. doi:10.11575/PRISM/19743en_US
dc.identifier.doihttp://dx.doi.org/10.11575/PRISM/19743
dc.identifier.isbn061293411Xen
dc.identifier.lccAC1 .T484 2003 W556en
dc.identifier.urihttp://hdl.handle.net/1880/42865
dc.language.isoeng
dc.publisher.institutionUniversity of Calgaryen
dc.publisher.placeCalgaryen
dc.rightsUniversity of Calgary graduate students retain copyright ownership and moral rights for their thesis. You may use this material in any way that is permitted by the Copyright Act or through licensing that has been assigned to the document. For uses that are not allowable under copyright legislation or licensing, you are required to seek permission.
dc.titleEvoattack - testing operating systems by learning harmful system call sequences
dc.typemaster thesis
thesis.degree.disciplineComputer Science
thesis.degree.grantorUniversity of Calgary
thesis.degree.nameMaster of Science (MSc)
ucalgary.thesis.accessionTheses Collection 58.002:Box 1481 520708916
ucalgary.thesis.notesUARCen
ucalgary.thesis.uarcreleaseyen
Files
Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
ucalgary_2003_williams_timothy raymond_565003.pdf
Size:
5.47 MB
Format:
Adobe Portable Document Format
Description:
Thesis
Collections