The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase 2-attack (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1979 (15) 1980-1984 (18) 1985 (16) 1986-1987 (20) 1988 (19) 1989 (17) 1990 (27) 1991 (28) 1992 (20) 1993 (28) 1994 (50) 1995 (27) 1996 (38) 1997 (59) 1998 (89) 1999 (106) 2000 (150) 2001 (198) 2002 (308) 2003 (427) 2004 (622) 2005 (935) 2006 (1052) 2007 (1092) 2008 (1214) 2009 (940) 2010 (445) 2011 (529) 2012 (502) 2013 (529) 2014 (687) 2015 (718) 2016 (756) 2017 (964) 2018 (1272) 2019 (1607) 2020 (1779) 2021 (2136) 2022 (2366) 2023 (2631) 2024 (644)
Publication types (Num. hits)
article(10248) book(12) data(26) incollection(215) inproceedings(14469) phdthesis(107) proceedings(3)
Venues (Conferences, Journals, ...)
CoRR(2518) IACR Cryptol. ePrint Arch.(797) IEEE Access(430) IEEE Trans. Inf. Forensics Sec...(193) FSE(178) Comput. Secur.(177) CRYPTO(176) EUROCRYPT(172) CCS(152) Sensors(140) ICC(138) Secur. Commun. Networks(133) ACISP(115) GLOBECOM(114) ARES(113) CHES(113) More (+10 of total 3434)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8634 occurrences of 2564 keywords

Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
79Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis
78Steven Noel, Sushil Jajodia Managing attack graph complexity through visual hierarchical aggregation. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF network attack graphs, network attack modeling, vulnerability analysis, clustered graphs
76Jiali Choy, Khoongming Khoo, Chuan-Wen Loe Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF time-memory-data trade-off, block cipher, meet-in-the-middle, triple DES
74Katsuyuki Okeya, Kouichi Sakurai A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems
72Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha Relative Doubling Attack Against Montgomery Ladder. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Doubling attack, Cryptography, Smart card, Side-channel attack, Scalar multiplication, Exponentiation, Simple power analysis (SPA), Chosen-message attack
72Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002, Dowon Hong The Related-Key Rectangle Attack - Application to SHACAL-1. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF The Rectangle Attack, The Related-Key Attack, The Related-Key Rectangle Attack, SHACAL-1, Block Ciphers
71Siyuan Xin, Xingyuan Chen, Huilin Tang, Ning Zhu Research on DoS Atomic Attack Oriented to Attack Resistance Test. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
71Steven Noel, Michael Jacobs 0001, Pramod Kalapa, Sushil Jajodia Multiple Coordinated Views for Network Attack Graphs. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network attack modeling, network attack graphs, topological vulnerability analysis, graph filtering, graph visualization, graph clustering
63Zhu Ning, Chen Xin-yuan, Zhang Yong-fu, Xin Si-yuan Design and Application of Penetration Attack Tree Model Oriented to Attack Resistance Test. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu 0001, Edmund M. Clarke, Jeannette M. Wing Ranking Attack Graphs. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Google PageRank, Model Checking, security metric, Attack Graph, Attack Model
61John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen Improving Attack Graph Visualization through Data Reduction and Attack Grouping. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack graph visualization, network security analysis, dominator, graph clustering, attack graph
61Yuh-Min Tseng Efficient authenticated key agreement protocols resistant to a denial-of-service attack. Search on Bibsonomy Int. J. Netw. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Xinzhou Qin, Wenke Lee Discovering Novel Attack Strategies from INFOSEC Alerts. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
59Khoongming Khoo, Guang Gong, Hian-Kiat Lee The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Time-memory-data trade-off attack, Rainbow attack, Maiorana-McFarland functions
58Hongjun Wu 0001, Bart Preneel Resynchronization Attacks on WG and LEX. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack
58Wei-Chi Ku, Hao-Chuan Tsai, Shuai-Min Chen Two simple attacks on Lin-Shen-Hwang's strong-password authentication protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF strong password, password authentication, replay attack, denial-of-service attack, stolen-verifier attack
57Xinming Ou, Wayne F. Boyer, Miles A. McQueen A scalable approach to attack graph generation. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF enterprise network security, ttack graphs, logic-programming
55Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei 0001, Josef Pieprzyk Extensions of the Cube Attack Based on Low Degree Annihilators. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cube Attack, Low-Degree Annihilators, Algebraic Attack
55Alexander Maximov, Dmitry Khovratovich New State Recovery Attack on RC4. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF state recovery attack, RC4, key recovery attack
55Tetsuya Izu, Tsuyoshi Takagi Exceptional Procedure Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF exceptional procedure attack, exceptional point, side channel attack, Elliptic curve cryptosystem (ECC), scalar multiplication
55Werner Schindler A Combined Timing and Power Attack. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Montgomery's algorithm, Timing attack, power attack
55Katsuyuki Okeya, Kouichi Sakurai On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack
54Jiali Choy, Huihui Yap, Khoongming Khoo An Analysis of the Compact XSL Attack on BES and Embedded SMS4. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Compact XSL Attack, ESMS4, BES
54Lan Li, Gyungho Lee DDoS Attack Detection and Wavelets. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF energy distribution, distributed denial of service, wavelet analysis, traffic characterization, attack detection
54Orhun Kara Reflection Cryptanalysis of Some Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Round Function, Round Key, Cryptanalysis, Block Cipher, Self-similarity, Related Key Attack, Slide Attack, Key Schedule, Reflection attack
53Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang 0002, Chi-Sung Laih Generating Attack Scenarios with Causal Relationship. Search on Bibsonomy GrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Jung-Ho Eom, Young-Ju Han, Tai-Myoung Chung Modeling Active Cyber Attack for Network Vulnerability Assessment. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
53Kazumaro Aoki Efficient Evaluation of Security against Generalized Interpolation Attack. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
53Toru Akishita, Tsuyoshi Takagi On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF zero-value point attack, side channel attack, elliptic curve cryptosystems, isomorphism, isogeny
53Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee 0002, Ju-Sung Kang Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Related key differential attack, XTEA, GOST, Differential characteristic, Distinguishing attack
51Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano Success Probability in Chi2-Attacks. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RC5-64, 2 attack, statistical analysis, RC6
51Sisi Huang, Zhitang Li, Li Wang 0015 Mining Attack Correlation Scenarios Based on Multi-agent System. Search on Bibsonomy HCI (8) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF frequent attack sequence, correlation analysis, attack scenario
50Xiaorui Sun, Xuejia Lai The Key-Dependent Attack on Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key-Dependent Attack, Block Cipher, IDEA
50Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision
50Jungtaek Seo An Attack Classification Mechanism Based on Multiple Support Vector Machines. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack classification, intrusion detection, Internet security
50Tao Wu, Arun K. Somani Cross-talk attack monitoring and localization in all-optical networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF diagnosability of attacks, sparse monitoring, attack, crosstalk, all-optical network
50Elena Andreeva 0001, Charles Bouillaguet, Orr Dunkelman, John Kelsey Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Herding attack, Trojan message attack, Zipper hash, Concatenated hash, Tree hash, Second preimage attack
50Wei-Chi Ku, Min-Hung Chiang, Shen-Tien Chang Weaknesses of Yoon-Ryu-Yoo's hash-based password authentication scheme. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack
50Wei-Chi Ku A hash-based strong-password authentication scheme without using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF password-file compromise attack, strong password, user authentication, replay attack, denial-of-service attack
50Sviatoslav B. Braynov, Murtuza Jadliwala Representation and analysis of coordinated attacks. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF attack plan, coordinated attack, model checking, attack graph, adversary modelling
49Shoji Miyaguchi The FEAL-8 Cryptosystem and a Call for Attack. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
49Chong Hee Kim, Jean-Jacques Quisquater Method for Detecting Vulnerability to Doubling Attacks. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Doubling attack, relative doubling attack, smart card, simple power analysis (SPA), modular exponentiation
47Pratyusa K. Manadhata, Jeannette M. Wing, Mark Flynn, Miles McQueen Measuring the attack surfaces of two FTP daemons. Search on Bibsonomy QoP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack surface, attack surface metric, security metric
46Ahmed Zeeshan, Anwar M. Masood, Zafar M. Faisal, Azam Kalim, Naheed Farzana PrISM: Automatic Detection and Prevention from Cyber Attacks. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information Security Management System, Intrusion Detection, Network security, Computer Security, Intrusion Prevention
46Ruiliang Chen, Jung-Min Park 0001, Randolph Marchany A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network-level security and protection
46Olivier Thonnard, Wim Mees, Marc Dacier Addressing the attack attribution problem using knowledge discovery and multi-criteria fuzzy decision-making. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack attribution, intelligence monitoring and analysis
46Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu Improving cache attacks by considering cipher structure. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Block cipher, Side channel attack, Timing attack, Cache attack
45Li Wang 0015, Zhitang Li, Jie Lei 0004 Learning attack strategies through mining and correlation of security alarms. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Atsuko Miyaji, Yuuki Takano On the Success Probability of chi2-attack on RC6. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Steven Noel, Sushil Jajodia Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Takanori Isobe 0001, Kyoji Shibutani Preimage Attacks on Reduced Tiger and SHA-2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger
45ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim, Seokyu Kim, Sung-Ming Yen, Sang-Jae Moon A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Smart card, RSA, Side channel attack, DPA, CRT, Fault attack
44Steven Noel, Eric Robertson 0001, Sushil Jajodia Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Adam L. Young, Moti Yung Bandwidth-Optimal Kleptographic Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Leakage attacks, the Newton channel, design methodologies for asymmetric ciphers, kleptographic attacks, attack bandwidth, discrete logarithm based systems, tamper-proof hardware designs, public scrutiny, hardware technologies: EEPROM, ferroelectric, trust, DSA, ElGamal, subliminal channels, non-volatile memory
43Leevar Williams, Richard Lippmann, Kyle Ingols GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack path, visualization, network, recommendation, vulnerability, treemap, security metrics, attack graph, exploit, adversary model
43JaeCheol Ha, JeaHoon Park, Sang-Jae Moon, Sung-Ming Yen Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart card, ECC, Side channel attack, Power analysis attack
43Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç Cache Based Remote Timing Attack on the AES. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Remote Attack, AES, Timing Analysis, Side Channel Analysis, Cache Attack
43Florian Mendel, Norbert Pramstaller, Christian Rechberger Improved Collision Attack on the Hash Function Proposed at PKC'98. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision, collision attack, differential attack, near-collision
43Eric Filiol Decimation Attack of Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF sequence decimation, multiple clocking, Stream cipher, linear feedback shift register, correlation attack, fast correlation attack
43Steven M. Bellovin The Insider Attack Problem Nature and Scope. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Malek Ben Salem 0001, Shlomo Hershkop, Salvatore J. Stolfo A Survey of Insider Attack Detection Research. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel 08102 Executive Summary -- Perspectives Workshop: Network Attack Detection and Defense. Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
43Marc Dacier, Hervé Debar, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Konrad Rieck, James P. G. Sterbenz 8102 Working Group -- Attack Taxonomy. Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
43Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel, Pavel Laskov 08102 Manifesto -- Perspectives Workshop: Network Attack Detection and Defense. Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
42Amontip Jumratjaroenvanit, Yunyong Teng-Amnuay Probability of Attack Based on System Vulnerability Life Cycle. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Zero-day attack, Exploit code, Risk window, Radar chart, Vulnerability, Exploits, Life cycle, Exposure, POA
42Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Preimage Attack on the Parallel FFT-Hashing Function. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF the Parallel FFT-Hashing function, Cryptographic Hash Function, Preimage Attack
42Zhitang Li, Aifang Zhang, Dong Li, Li Wang 0015 Discovering Novel Multistage Attack Strategies. Search on Bibsonomy ADMA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multistage attack, sequential pattern, incremental mining, alert correlation
42Jeannette M. Wing Attack graph generation and analysis. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF minimization analysis, model checking, intrusion detection, attack graphs
42Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh Scalable network-based buffer overflow attack detection. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks
42Sjouke Mauw, Martijn Oostdijk Foundations of Attack Trees. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF semantics, attack trees, threat analysis
42Peng Ning, Dingbang Xu Learning attack strategies from intrusion alerts. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF profiling attack strategies, intrusion detection, alert correlation
42Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee 0002, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon Difference Distribution Attack on DONUT and Improved DONUT. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DONUT, Differential Cryptanalysis(DC), Linear Cryptanalysis(LC), Difference Distribution Attack(DDA), Decorrelation
42Wei-Chi Ku, Chien-Ming Chen 0001, Hui-Lung Lee Weaknesses of Lee-Li-Hwang's hash-based password authentication scheme. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hash function, password authentication, guessing attack, denial-of-service attack, stolen-verifier attack
42Kouichi Sakurai, Tsuyoshi Takagi A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EPOC-2, reject function, Manger's attack, factoring, timing attack, chosen ciphertext attack
41Qiuqin Lu, Guangqiu Huang An Attack Model Based on Both-Branch Fuzzy Logic and Fuzzy Petri Net. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Mohammad Zulkernine, Mohammad Feroz Raihan, Mohammad Gias Uddin 0001 Towards Model-Based Automatic Testing of Attack Scenarios. Search on Bibsonomy SAFECOMP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Jesse Sathre, Alex Baumgarten, Joseph Zambreno Architectural Support for Automated Software Attack Detection, Recovery, and Prevention. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Ryan Pries, Wei Yu 0002, Xinwen Fu, Wei Zhao 0001 A New Replay Attack Against Anonymous Communication Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Susanta Nanda, Tzi-cker Chiueh Execution Trace-Driven Automated Attack Signature Generation. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li A Data Mining Approach to Generating Network Attack Graph for Intrusion Prediction. Search on Bibsonomy FSKD (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
41Nong Ye, Toni Farley, Deepak Lakshminarasimhan An attack-norm separation approach for detecting cyber attacks. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks
41Li Wang 0015, Zhitang Li, Jie Lei 0004, Yao Li 0002 A novel algorithm SF for mining attack scenarios model. Search on Bibsonomy ICEBE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Somesh Jha, Oleg Sheyner, Jeannette M. Wing Two Formal Analys s of Attack Graphs. Search on Bibsonomy CSFW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
41Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing and Second-Preimage Attacks on CBC-Like MACs. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CBC, MAC, Distinguishing attack, Second preimage attack
41Terence K. T. Law, John C. S. Lui, David K. Y. Yau You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack traffic filtering, minimum stable time, DDoS attack, traceback
41Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park 0001, Chang Han Kim, Heuisu Ryu Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SPA attack, Randomized addition-subtraction chains countermeasure, Side-channel attack, Elliptic curve cryptosystems
41Werner Schindler, François Koeune, Jean-Jacques Quisquater Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Error detection, error correction, timing attack, power attack
40Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao Towards analyzing complex operating system access control configurations. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF access control, operating systems, attack graph
40Joshua J. Pauli, Patrick Henry Engebretson Hierarchy-Driven Approach for Attack Patterns in Software Security Education. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Refinement, Hierarchy, Attack Trees, Attack Patterns
40Shouhuai Xu Collaborative Attack vs. Collaborative Defense. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborative attack, collaborative defense, cyber security, cyber attack
40Yasuyuki Sakai, Kouichi Sakurai Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Parallel modular exponentiation, Side channel attack, Montgomery multiplication, Timing attack, RSA cryptosystems
40Thomas A. Berson Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF McEliece, error vectors, message-resend attack, related-message attack, protocol failure, cryptanalysis, error-correcting codes, randomization, public-key cryptosystem
39Saeed Rajput, Jihong Chen, Sam Hsu State based authentication. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF rule-based attack, syllable attack, security, authentication, access control, attack, password, help-desk, vulnerabilities, dictionary attack, unauthorized access, password management
38Steven Noel, Sushil Jajodia Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Topological vulnerability analysis, Intrusion detection, Attack graphs, Sensor placement
38Diptikalyan Saha Extending logical attack graphs for efficient vulnerability analysis. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF logic programming, attack graphs, incremental analysis
38Wen Ji, Lei Hu Square Attack on Reduced-Round Zodiac Cipher. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Zodiac, square attack, block cipher
38Bahador Bakhshi, Babak Sadeghiyan A Timing Attack on Blakley's Modular Multiplication Algorithm, and Applications to DSA. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blakley’s algorithm, modular multiplication, timing attack, DSA
38Ulf Larson, Emilie Lundin Barse, Erland Jonsson METAL - A Tool for Extracting Attack Manifestations. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Automated attack analysis, log data, intrusion detection, system calls
38James Newsome, Elaine Shi, Dawn Xiaodong Song, Adrian Perrig The sybil attack in sensor networks: analysis & defenses. Search on Bibsonomy IPSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, sensor networks, sybil attack
Displaying result #1 - #100 of 25080 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license