Dynamic Data Flow Analysis via Virtual Code Integration (aka The SpiderPig case)
Dynamic IDP Signature processing by fast elimination using DFA
Dynamic MDS Matrices for Substantial Cryptographic Strength
Dynamic Multi Layer Signature based Intrusion Detection system Using Mobile Agents
Dynamic Session Key Exchange Method using Two S-Boxes
Dynamic Tardos Traitor Tracing Schemes
Dynamics, robustness and fragility of trust