The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NSS"( http://dblp.L3S.de/Venues/NSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nss

Publication years (Num. hits)
2009 (90) 2010 (91) 2011 (58) 2012 (40) 2013 (72) 2014 (48) 2015 (42) 2016 (36) 2017 (60)
Publication types (Num. hits)
inproceedings(528) proceedings(9)
Venues (Conferences, Journals, ...)
NSS(537)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 215 occurrences of 177 keywords

Results
Found 537 publication records. Showing 537 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Lulu Liang, Kai Zheng 0003, Qiankun Sheng, Wei Wang, Rong Fu, Xin Huang A Denial of Service Attack Method for IoT System in Photovoltaic Energy System. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Irina Mihai, Catalin Leordeanu, Alecsandru Patrascu Covert Channels Implementation and Detection in Virtual Environments. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Naoki Nishikawa, Hideharu Amano, Keisuke Iwai Implementation of Bitsliced AES Encryption on CUDA-Enabled GPU. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Donghang Liu, Lihua Dong, Shaoqing Lv, Ying Dong, Fannv He, Chensi Wu, Yuqing Zhang, Hua Ma A Novel Approach to Network Security Situation Assessment Based on Attack Confidence. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jing Li, Lihua Yin, Yunchuan Guo, Chao Li, Fenghua Li, Lihua Chen A Novel Threat-Driven Data Collection Method for Resource-Constrained Networks. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rendon Sánchez Angel Mecías, Salcedo Parra Octavio José, Correa Sánchez Lewys Platform for Detection of Holes in the Bogotá D.C. Road Network and Exposure of the Information in a Web Environment. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Deepak Kumar Dalai, Dibyendu Roy 0001 A State Recovery Attack on ACORN-v1 and ACORN-v2. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Patrick Eitschberger, Jörg Keller 0001, Simon Holmbacka Hardware and Software Support for Transposition of Bit Matrices in High-Speed Encryption. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Markku Vajaranta, Joona Kannisto, Jarmo Harju IPsec and IKE as Functions in SDN Controlled Network. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elena Reshetova, Filippo Bonazzi, N. Asokan Randomization Can't Stop BPF JIT Spray. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yukun Zheng, Kun Lv, Changzhen Hu A Quantitative Method for Evaluating Network Security Based on Attack Graph. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elena Ivannikova, Mikhail Zolotukhin, Timo Hämäläinen 0002 Probabilistic Transition-Based Approach for Detecting Application-Layer DDoS Attacks in Encrypted Software-Defined Networks. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Juha Nurmi, Mikko S. Niemelä Tor De-anonymisation Techniques. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Dang Nguyen, Dat Tran, Wanli Ma, Khoa Nguyen EEG-Based Random Number Generators. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fakher Ben Ftima, Kamel Karoui, Henda Ben Ghézala A Formal Approach for Network Security Policy Relevancy Checking. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rui Ma, Siyu Chen, Ke Ma, Changzhen Hu, Xiajing Wang Defenses Against Wormhole Attacks in Wireless Sensor Networks. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Joona Kannisto, Jarmo Harju The Time Will Tell on You: Exploring Information Leaks in SSH Public Key Authentication. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Deepak Kumar Dalai, Pinaki Sarkar Enhancing Resilience of KPS Using Bidirectional Hash Chains and Application on Sensornet. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ian Oliver, Silke Holtmanns, Yoan Miche, Shankar Lal, Leo Hippeläinen, Aapo Kalliola, Sowmya Ravidas Experiences in Trusted Cloud Computing. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tommi Meskanen, Masoud Naderpour, Valtteri Niemi Mind Your Right to Know: On De-anonymization Auditability in V2X Communications. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jiayuan Zhang, Yao Yao, Xiaoqi Li, Jian Xie, Gaofei Wu An Android Vulnerability Detection System. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jayaprakash Kar Cryptanalysis and Improvement of an Identity-Based Proxy Multi-signature Scheme. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Somanath Tripathy, Praveen Kumar CookiesWall: Preventing Session Hijacking Attacks Using Client Side Proxy. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Thomas W. Pieber, Thomas Ulz, Christian Steger, Rainer Matischek Hardware Secured, Password-based Authentication for Smart Sensors for the Industrial Internet of Things. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Silke Holtmanns, Yoan Miche, Ian Oliver Subscriber Profile Extraction and Modification via Diameter Interconnection. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fannv He, Yuqing Zhang, Donghang Liu, Ying Dong, Caiyun Liu, Chensi Wu Mixed Wavelet-Based Neural Network Model for Cyber Security Situation Prediction Using MODWT and Hurst Exponent Analysis. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Roberto Saia A Discrete Wavelet Transform Approach to Fraud Detection. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohsin Khan, Valtteri Niemi Concealing IMSI in 5G Network Using Identity Based Encryption. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nian Xue, Chenglong Jiang, Xin Huang, Dawei Liu A Role-Based Access Control System for Intelligent Buildings. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Saeed Shafieian, Daniel Smith, Mohammad Zulkernine Detecting DNS Tunneling Using Ensemble Learning. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hao Zhang, Kun Lv, Changzhen Hu An Automatic Vulnerabilities Classification Method Based on Their Relevance. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yajie Dong, Zhenyan Liu, Yida Yan, Yong Wang, Tu Peng, Ji Zhang Machine Learning for Analyzing Malware. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Smriti Bhatt, Farhan Patwa, Ravi Sandhu Access Control Model for AWS Internet of Things. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohammed Al-Janabi, Peter Andras A Systematic Analysis of Random Forest Based Social Media Spam Classification. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tahmina Ahmed, Ravi Sandhu Safety of ABAC _\alpha Is Decidable. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Huiting Tan, Chaojing Tang, Chen Zhang, Shaolei Wang Area-Dividing Route Mutation in Moving Target Defense Based on SDN. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chia-Mei Chen, Gu Hsin Lai, Yen-Chih Kuo, Tan-Ho Chang Improving Alert Accuracy for Smart Vehicles. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Le Trieu Phong Privacy-Preserving Stochastic Gradient Descent with Multiple Distributed Trainers. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Leo Hippelainen, Ian Oliver, Shankar Lal Towards Dependably Detecting Geolocation of Cloud Servers. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ahmad M. K. Nasser, Di Ma, Sam Lauzon Exploiting AUTOSAR Safety Mechanisms to Launch Security Attacks. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hanlu Chen, Yulong Fu, Zheng Yan 0002 Survey on Big Data Analysis Algorithms for Network Security Measurement. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Amirhossein Gharib, Ali Ghorbani DNA-Droid: A Real-Time Android Ransomware Detection Framework. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michal Zima Coincer: Decentralised Trustless Platform for Exchanging Decentralised Cryptocurrencies. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yun Chen, Kun Lv, Changzhen Hu Optimal Attack Path Generation Based on Supervised Kohonen Neural Network. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Igor Kabashkin Risk Modelling of Blockchain Ecosystem. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Donghai Tian, Dingjun Qi, Li Zhan, Yuhang Yin, Changzhen Hu, Jingfeng Xue A Practical Method to Confine Sensitive API Invocations on Commodity Hardware. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ali Abbasi, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle \mu Shield - Configurable Code-Reuse Attacks Mitigation For Embedded Systems. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sara Ramezanian, Tommi Meskanen, Masoud Naderpour, Valtteri Niemi Private Membership Test Protocol with Low Communication Complexity. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zheng Yan 0002, Refik Molva, Wojciech Mazurczyk, Raimo Kantola (eds.) Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chensi Wu, Yuqing Zhang, Ying Dong Application Research on Network Attacks and Defenses with Zachman Framework. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Keita Emura A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chun Shan, Shiyou Sun, Jingfeng Xue, Changzhen Hu, Hongjin Zhu A Detecting Method of Array Bounds Defects Based on Symbolic Execution. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lauri Isotalo 5G Slicing as a Tool to Test User Equipment Against Advanced Persistent Threats. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rui Ma, Tianbao Zhu, Changzhen Hu, Chun Shan, Xiaolin Zhao SulleyEX: A Fuzzer for Stateful Network Protocol. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Noria Foukia, David Billard, Eduardo Solana Privacy Verification Chains for IoT. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jialu Hao, Jian Liu, Hong Rong, Huimei Wang, Ming Xian OE-CP-ABE: Over-Encryption Based CP-ABE Scheme for Efficient Policy Updating. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pinaki Sarkar Lightweight Deterministic Non Interactive (ni) Hierarchical Key Agreement Scheme (KAS). Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Leyou Zhang, Qing Wu Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lihua Wang, Takuya Hayashi 0001, Yoshinori Aono, Le Trieu Phong A Generic yet Efficient Method for Secure Inner Product. Search on Bibsonomy NSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jia-Ning Luo, Ming-Hour Yang, Cho-Luen Tsai A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kewei Lv, Wenjie Qin, Ke Wang Improved Security Proof for Modular Exponentiation Bits. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei-Ting Lu, Wei Wu, Shih-Ya Lin, Min-Chi Tseng, Hung-Min Sun A System of Shareable Keyword Search on Encrypted Data. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Prosunjit Biswas, Ravi S. Sandhu, Ram Krishnan An Attribute-Based Protection Model for JSON Documents. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zisis Tsiatsikas, Dimitris Geneiatakis, Georgios Kambourakis, Stefanos Gritzalis Realtime DDoS Detection in SIP Ecosystems: Machine Learning Tools of the Trade. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gang Sheng, Chunming Tang, Wei Gao, Ying Yin MD-VCMatrix: An Efficient Scheme for Publicly Verifiable Computation of Outsourced Matrix Multiplication. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yen-Lung Lai, Zhe Jin, Bok-Min Goi, Tong-Yuen Chai, Wun-She Yap Iris Cancellable Template Generation Based on Indexing-First-One Hashing. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maanak Gupta, Ravi Sandhu The \mathrm GURA_G GURA G Administrative Model for User and Group Attribute Assignment. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tomasz Hyla, Jerzy Pejas Secure Outsourced Bilinear Pairings Computation for Mobile Devices. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Raylin Tso Two-in-One Oblivious Signatures Secure in the Random Oracle Model. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Min Hsuan Cheng, Reza Sedaghat, Prathap Siddavaatam A New Adaptable Construction of Modulo Addition with Scalable Security for Stream Ciphers. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chao Lin, Fei Zhu, Wei Wu, Kaitai Liang, Kim-Kwang Raymond Choo A New Transitive Signature Scheme. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fei Xu, Pinxin Liu, Jianfeng Yang, Jing Xu The Design and Implementation of Multi-dimensional Bloom Filter Storage Matrix. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yosuke Ishikuro, Kazumasa Omote Privacy-Preserving Profile Matching Protocol Considering Conditions. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qiumao Ma, Wensheng Zhang 0001, Jinsheng Zhang DF-ORAM: A Practical Dummy Free Oblivious RAM to Protect Outsourced Data Access Pattern. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kai He, Jian Weng, Joseph K. Liu, Wanlei Zhou, Jianan Liu Efficient Fine-Grained Access Control for Secure Personal Health Records in Cloud Computing. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nikolai Hampton, Zubair A. Baig Timestamp Analysis for Quality Validation of Network Forensic Data. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammad Saiful Islam Mamun, Mohammad Ahmad Rathore, Arash Habibi Lashkari, Natalia Stakhanova, Ali A. Ghorbani Detecting Malicious URLs Using Lexical Analysis. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shashank Gupta 0002, Brij Bhooshan Gupta An Infrastructure-Based Framework for the Alleviation of JavaScript Worms from OSN in Mobile Cloud Platforms. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hiroaki Anada, Sushmita Ruj, Kouichi Sakurai Expressive Rating Scheme by Signatures with Predications on Ratees. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kamil Kluczniak, Jianfeng Wang, Xiaofeng Chen 0001, Miroslaw Kutylowski Multi-device Anonymous Authentication. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qianqian Yang, Lei Hu, Siwei Sun, Ling Song Extension of Meet-in-the-Middle Technique for Truncated Differential and Its Application to RoadRunneR. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fangming Zhao, Takashi Nishide Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung (eds.) Network and System Security - 10th International Conference, NSS 2016, Taipei, Taiwan, September 28-30, 2016, Proceedings Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sherman S. M. Chow, Russell W. F. Lai, Xiuhua Wang, Yongjun Zhao Privacy Preserving Credit Systems. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bailin Xie, Yu Wang, Chao Chen, Yang Xiang Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anisur Rahman, Yue Xu, Kenneth Radke, Ernest Foo Finding Anomalies in SCADA Logs Using Rare Sequential Pattern Mining. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wenjuan Li, Weizhi Meng, Lam-for Kwok, Horace Ho-Shing Ip PMFA: Toward Passive Message Fingerprint Attacks on Challenge-Based Collaborative Intrusion Detection Networks. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chang-Shiun Liu, Li Xu 0002, Limei Lin, Min-Chi Tseng, Shih-Ya Lin, Hung-Min Sun Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Man Ho Au, Kaitai Liang, Joseph K. Liu, Rongxing Lu While Mobile Encounters with Clouds. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Asma Alshehri, Ravi Sandhu On the Relationship Between Finite Domain ABAM and PreUCON \mathrm _A A. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yi Zhang, Liuhua Chen, Haiying Shen, Xiaohui Cheng An Energy-Efficient Task Scheduling Heuristic Algorithm Without Virtual Machine Migration in Real-Time Cloud Environments. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tingting Wang, Man Ho Au, Wei Wu 0001 An Efficient Secure Channel Free Searchable Encryption Scheme with Multiple Keywords. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jinshuo Liu, Yabo Xu, Juan Deng, Lina Wang, Lanxin Zhang Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Toshihiro Yamauchi, Yuta Ikegami HeapRevolver: Delaying and Randomizing Timing of Release of Freed Memory Area to Prevent Use-After-Free Attacks. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ishai Rosenberg, Ehud Gudes Evading System-Calls Based Intrusion Detection Systems. Search on Bibsonomy NSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei Wang, Mikhail Istomin, Jeffrey Bickford Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Ronald Menendez, Shahab Etemad Foundations of Optical Encryption: A Candidate Short-Key Scheme. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaoshuang Ma, Kexin Qiao Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jongho Won, Elisa Bertino Distance-based Trustworthiness Assessment for Sensors in Wireless Sensor Networks. Search on Bibsonomy NSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 537 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license