The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Malicious with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1990 (17) 1991-1994 (15) 1995-1996 (19) 1997 (16) 1998 (34) 1999 (27) 2000 (47) 2001 (76) 2002 (100) 2003 (164) 2004 (264) 2005 (382) 2006 (463) 2007 (508) 2008 (584) 2009 (410) 2010 (169) 2011 (158) 2012 (173) 2013 (182) 2014 (208) 2015 (229) 2016 (261) 2017 (276) 2018 (369) 2019 (348) 2020 (394) 2021 (441) 2022 (395) 2023 (443) 2024 (125)
Publication types (Num. hits)
article(2248) book(8) data(5) incollection(29) inproceedings(4933) phdthesis(62) proceedings(12)
Venues (Conferences, Journals, ...)
CoRR(363) MALWARE(192) IACR Cryptol. ePrint Arch.(98) IEEE Access(90) ACSAC(85) CCS(70) Comput. Secur.(61) ICC(58) ARES(55) SAC(50) RAID(43) DSN(39) GLOBECOM(37) Sensors(37) ICDCS(35) Wirel. Pers. Commun.(35) More (+10 of total 1903)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3452 occurrences of 1510 keywords

Results
Found 7297 publication records. Showing 7297 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
78EunYoung Kim, CheolHo Lee, HyungGeun Oh, JinSeok Lee The System Modeling for Detections of New Malicious Codes. Search on Bibsonomy PARA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Realtime monitoring, Malicious Code
67Jiang Wang 0008, Anup K. Ghosh, Yih Huang Web Canary: A Virtualized Web Browser to Support Large-Scale Silent Collaboration in Detecting Malicious Web Sites. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web browser security, honey client, virtualization, botnets, spyware, malicious code
58Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch Measurement Study on Malicious Web Servers in the .nz Domain. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
56Wan-Hui Tseng, Chin-Feng Fan Handling Malicious Code on Control Systems. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF control systems security, malicious code classification, undecidability
52Sinjae Lee, Shaojian Zhu, Yanggon Kim, Juno Chang Analysis on Malicious Peer's Behavior of the P2P Trust Resource Chain Model. Search on Bibsonomy Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Jia Zhang 0004, Yuntao Guan, Xiaoxin Jiang, Hai-Xin Duan, Jianping Wu AMCAS: An Automatic Malicious Code Analysis System. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Robert Moskovitch, Nir Nissim, Yuval Elovici Malicious Code Detection Using Active Learning. Search on Bibsonomy PinKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Robert Moskovitch, Clint Feher, Yuval Elovici A Chronological Evaluation of Unknown Malcode Detection. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Unknown Malicious File Detection, Classification
51Gregory J. Conti, Edward Sobiesk Malicious interface design: exploiting the user. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF adversarial interface design, evil interfaces, malicious interfaces, web usability guidelines, design principles
51Peter Likarish, Eunjin Jung A targeted web crawling for building malicious javascript collection. Search on Bibsonomy CIKM-DSMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious javascript, security, web crawling
51Yu Zhang 0003, Tao Li, Jia Sun, Renchao Qin An FSM-Based Approach for Malicious Code Detection Using the Self-Relocation Gene. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF self-relocation gene, finite-state machine, malicious code detection
51Payman Mohassel, Matthew K. Franklin Efficiency Tradeoffs for Malicious Two-Party Computation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Yao’s garbled circuit, malicious adversary, secure two-party computation, secure function evaluation
47Ping Chen 0003, Hai Xiao, Xiaobin Shen 0001, Xinchun Yin, Bing Mao, Li Xie 0001 DROP: Detecting Return-Oriented Programming Malicious Code. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Wenjia Li, Anupam Joshi, Tim Finin Policy-Based Malicious Peer Detection in Ad Hoc Networks. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo Data Mining Methods for Detection of New Malicious Executables. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
46Robert Moskovitch, Clint Feher, Nir Tzachar, Eugene Berger, Marina Gitelman, Shlomi Dolev, Yuval Elovici Unknown Malcode Detection Using OPCODE Representation. Search on Bibsonomy EuroISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF OpCode, Classification, Malicious Code Detection
46Semin Kim, Hyun-seok Min, Jaehyun Jeon, Yong Man Ro, Seungwan Han Malicious content filtering based on semantic features. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious, naked, semantic, filtering
46Mohammad M. Masud 0001, Latifur Khan, Bhavani Thuraisingham A scalable multi-level feature extraction technique to detect malicious executables. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Malicious executable, n-gram analysis, Feature extraction, Disassembly
46Yingxu Lai, Zenghui Liu Unknown Malicious Identification. Search on Bibsonomy World Congress on Engineering (Selected Papers) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Unknown malicious detection, Half Increment Naive Bayes, classification
46Tiago H. Kobayashi, Aguinaldo B. Batista, João Paulo S. Medeiros, José Macedo F. Filho, Agostinho M. Brito Jr., Paulo S. Motta Pires Analysis of Malicious Traffic in Modbus/TCP Communications. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Critical Information Infrastructure Protection, Malicious Traffic Analysis, Threats and Attacks to AT Infrastructures, Automation Technology Security
46Yuval Elovici, Asaf Shabtai, Robert Moskovitch, Gil Tahan, Chanan Glezer Applying Machine Learning Techniques for Detection of Malicious Code in Network Traffic. Search on Bibsonomy KI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network Service Provider (NSP), Machine Learning, Feature Selection, Malicious Code
46Moshe Babaioff, Robert Kleinberg, Christos H. Papadimitriou Congestion games with malicious players. Search on Bibsonomy EC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF malicious behavior, equilibrium, selfish routing, congestion games
42Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Nathalie Japkowicz, Yuval Elovici Unknown malcode detection and the imbalance problem. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
42Sintayehu Dehnie, Nasir D. Memon A Stochastic Model for Misbehaving Relays in Cooperative Diversity. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Robert Moskovitch, Clint Feher, Yuval Elovici Unknown malcode detection - A chronological evaluation. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici Unknown malcode detection via text categorization and the imbalance problem. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Mingwu Zhang, Bo Yang 0003, Yu Qi, Wenzheng Zhang Using Trust Metric to Detect Malicious Behaviors in WSNs. Search on Bibsonomy SNPD (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Hiroaki Kikuchi, Masato Terada How Many Malicious Scanners Are in the Internet? Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Sungsuk Kim, Chang Choi, Junho Choi, Pankoo Kim, Hanil Kim A Method for Efficient Malicious Code Detection Based on Conceptual Similarity. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Ding Peng, Shi Jun, Sheng Huan Ye, Liming Li MA/LMA Architecture for Dealing with Malicious Agents in Agent-Mediated Electronic Markets. Search on Bibsonomy E-Commerce Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
41Konrad Rieck, Guido Schwenk, Tobias Limmer, Thorsten Holz, Pavel Laskov Botzilla: detecting the "phoning home" of malicious software. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF network intrusion detection, malicious software
41Ahmed Obied, Reda Alhajj Fraudulent and malicious sites on the web. Search on Bibsonomy Appl. Intell. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Fraudulent, Malicious, Web, Search engines, Spam, Malware, Proxy, Phishing, Crawlers, Pharming
41Zhe Fang, Minglu Li 0001, Chuliang Weng, Yuan Luo 0003 Dynamic Malicious Code Detection Based on Binary Translator. Search on Bibsonomy CloudCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic detection, binary translator, malicious code
41Justin Ma, Lawrence K. Saul, Stefan Savage, Geoffrey M. Voelker Beyond blacklists: learning to detect malicious web sites from suspicious URLs. Search on Bibsonomy KDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious web sites, supervised learning, L1-regularization
41M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious Executable Detection, Portable Executables, Data Mining, Malware Detection, Structural Information
41Xiang-he Yang, Huaping Hu, Xin Chen SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure data forwarding, malicious routers detecting, communication security
41Mohd Fadzli Marhusin, David Cornforth, Henry Larkin Malicious Code Detection Architecture Inspired by Human Immune System. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF System Call, Malicious Code Detection
41Yingxu Lai A Feature Selection for Malicious Detection. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unknown malicious detection, classification, SVM, feature selection
41Jin-Cherng Lin, Jan-Min Chen, Hsing-Kuo Wong An Automatic Meta-revised Mechanism for Anti-malicious Injection. Search on Bibsonomy NBiS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malicious injection, Security gateway, Black box testing, Input validation
41Jin-Cherng Lin, Jan-Min Chen An Automatic Revised Tool for Anti-Malicious Injection. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Complete crawling, Malicious injection, Security, SQL Injection, Input validation
41Krishna Sandeep Reddy Dubba, Subrat Kumar Dash, Arun K. Pujari New Malicious Code Detection Using Variable Length n-grams. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Episodes, Data Mining, n-grams, Malicious code detection
41Tom Goovaerts, Bart De Win, Bart De Decker, Wouter Joosen Assessment of Palm OS Susceptibility to Malicious Code Threats. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF mobile operating systems, Palm OS, worms, malicious code
36Feng Li 0001, Jie Wu 0001 Hit and Run: A Bayesian Game Between Malicious and Regular Nodes in MANETs. Search on Bibsonomy SECON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Martin Gairing Malicious Bayesian Congestion Games. Search on Bibsonomy WAOA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Yongtao Hu, Liang Chen, Ming Xu 0001, Ning Zheng 0001, Yanhua Guo Unknown Malicious Executables Detection Based on Run-Time Behavior. Search on Bibsonomy FSKD (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Christian Seifert, Ian Welch, Peter Komisarczuk, Chiraag Uday Aval, Barbara Endicott-Popovsky Identification of malicious web pages through analysis of underlying DNS and web server relationships. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Jin-Cherng Lin, Jan-Min Chen The Automatic Defense Mechanism for Malicious Injection Attack. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Claude Crépeau, Carlton R. Davis, Muthucumaru Maheswaran A Secure MANET Routing Protocol with Resilience against Byzantine Behaviours of Malicious or Selfish Nodes. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Samarth Shetty, Patricio Galdames, Wallapak Tavanapong, Ying Cai Detecting Malicious Peers in Overlay Multicast Streaming. Search on Bibsonomy LCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Donggang Liu, Peng Ning, Wenliang Du Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Punit Rathod, Nirali Mody, Dhaval Gada, Rajat Gogri, Zalak Dedhia, Sugata Sanyal, Ajith Abraham Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks. Search on Bibsonomy IWDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Paul Ammann, Sushil Jajodia, Peng Liu 0005 Recovery from Malicious Transactions. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Security, transaction processing, assurance, database recovery
36James A. Whittaker, Andres De Vivanco Neutralizing windows-based malicious mobile code. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF API hooking, code signing, interrupt table, native code, worm, windows, wrapper, mobile code, virus, sandbox, Microsoft Windows
36Mohamed Ali Kâafar, Laurent Mathy, Chadi Barakat, Kavé Salamatian, Thierry Turletti, Walid Dabbous Securing internet coordinate embedding systems. Search on Bibsonomy SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF internet coordinates-embedding systems, malicious behavior detection, network positioning systems, security, kalman filter
36Tirthankar Ghosh, Niki Pissinou, S. Kami Makki Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collaborative trust-based routing, colluding malicious nodes, mobile ad hoc networks, secure communication
35Andreas Dewald, Thorsten Holz, Felix C. Freiling ADSandbox: sandboxing JavaScript to fight malicious websites. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dynamic analysis, malicious software, drive-by downloads
35Peishun Liu, Xuefang Wang Identification of Malicious Web Pages by Inductive Learning. Search on Bibsonomy WISM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious detection, generalization, specialization, inductive learning, drive-by downloads
35Chao Dai, Jianmin Pang, Rongcai Zhao, Xiaojun Ma Static Analysis of the Disassembly against Malicious Code Obfuscated with Conditional Jumps. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF conditional jump, obfuscation, malicious codes, disassembly
35Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic
35Guoyan Zhang, Shaohui Wang A Certificateless Signature and Group Signature Schemes against Malicious PKG. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malicious PKG, group signature, certificateless signature
35George Karakostas, Anastasios Viglas Equilibria for networks with malicious users. Search on Bibsonomy Math. Program. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malicious user, Equilibrium, Selfish routing, Saddle point
35Boyun Zhang, Jianping Yin, Jingbo Hao Using RS and SVM to Detect New Malicious Executable Codes. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF support vector machine, Rough set, malicious code
35Akira Mori, Tomonori Izumida, Toshimi Sawada, Tadashi Inoue A tool for analyzing and detecting malicious mobile code. Search on Bibsonomy ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF OS execution emulation, code simulation, static code analysis, malicious code detection
35Yi Hu, Brajendra Panda Design and Analysis of Techniques for Detection of Malicious Activities in Database Systems. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Malicious transactions, intrusion detection, anomaly detection, data dependency
35Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann Malicious Behaviour in Content-Addressable Peer-to-Peer Networks. Search on Bibsonomy CNSR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF malicious behaviour, networking, DHT, attacks, CAN
35Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
35Yu Chen 0002, Yu-Kwong Kwok, Kai Hwang 0001 MAFIC: Adaptive Packet Dropping for Cutting Malicious Flows to Push Back DDoS Attacks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF packet dropping policy, DDoS defense, malicious flows, duplicated ACKs, probing
35Philippe Golle, Daniel H. Greene, Jessica Staddon Detecting and correcting malicious data in VANETs. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2004 DBLP  DOI  BibTeX  RDF malicious node, data validation, location verification
35Jeremy Z. Kolter, Marcus A. Maloof Learning to detect malicious executables in the wild. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, data mining, concept learning, malicious software
35Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandowski, Robert K. Cunningham Detection of injected, dynamically generated, and obfuscated malicious code. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF intrusion detection, static analysis, anomaly detection, dynamic analysis, system calls, code analysis, execution monitoring, malicious code detection
35Erica Y. Yang, Jie Xu 0007, Keith H. Bennett Private Information Retrieval in the Presence of Malicious Failures. Search on Bibsonomy COMPSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, fault tolerance, Distributed systems, secret sharing, privacy protection, private information retrieval, malicious failures
35Klaus Echtle Avoiding Malicious Byzantine Faults by a New Signature Generation Technique. Search on Bibsonomy EDCC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Malicious Byzantine Faults, Digital Signatures for Fault Tolerance, Agreement Protocols
32Jiin-Chiou Cheng, Chi-Sung Laih Conference key agreement protocol with non-interactive fault-tolerance over broadcast network. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conference key agreement, Modified Weil pairing, Fault-tolerance, Elliptic curve
32Eugene Santos Jr., Hien Nguyen 0001, Fei Yu 0002, Keum Joo Kim, Deqing Li, John Thomas Wilkinson, Adam Olson, Russell Jacob Intent-Driven Insider Threat Detection in Intelligence Analyses. Search on Bibsonomy IAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Andrew J. Kalafut, Abhinav Acharya, Minaxi Gupta A study of malware in peer-to-peer networks. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF limewire, openFT, peer-to-peer, filtering, malware
32Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan Fast Portscan Detection Using Sequential Hypothesis Testing. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Marco Cova, Christopher Krügel, Giovanni Vigna Detection and analysis of drive-by-download attacks and malicious JavaScript code. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF drive-by-download attacks, web client exploits, anomaly detection
31Omer Demir, Bilal Khan 0002, Ala I. Al-Fuqaha Reconstruction of malicious internet flows. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF flow reconstruction, distributed denial of service
31George Theodorakopoulos 0001, John S. Baras Game Theoretic Modeling of Malicious Users in Collaborative Networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Nan Zhang 0004, Wei Zhao 0001 Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Sheng Zhong 0002, Murtuza Jadliwala, Shambhu J. Upadhyaya, Chunming Qiao Towards a Theory of Robust Localization Against Malicious Beacon Nodes. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Zesheng Chen, Chuanyi Ji, Paul Barford Spatial-Temporal Characteristics of Internet Malicious Sources. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Murat Kantarcioglu, Onur Kardes Privacy-Preserving Data Mining Applications in the Malicious Model. Search on Bibsonomy ICDM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Mihai Christodorescu, Somesh Jha, Christopher Kruegel Mining specifications of malicious behavior. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF behavior-based detection, malspec, differential analysis
31Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang Malicious Codes Detection Based on Ensemble Learning. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
31Jongoh Choi, Si-Ho Cha, JooSeok Song An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Gregory J. Conti, Julian B. Grizzard, Mustaque Ahamad, Henry L. Owen Visual Exploration of Malicious Network Objects Using Semantic Zoom, Interactive Encoding and Dynamic Queries. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF binary object visualization, payload visualization, binary navigation, packet visualization, reverse engineering, network visualization
31Yajie Zhu, Tai Xin, Indrakshi Ray Recovering from Malicious Attacks in Workflow Systems. Search on Bibsonomy DEXA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Teck Sung Yap, Hong Tat Ewe A Mobile Phone Malicious Software Detection Model with Behavior Checker. Search on Bibsonomy Human.Society@Internet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Johannes Kinder, Stefan Katzenbeisser 0001, Christian Schallhart, Helmut Veith Detecting Malicious Code by Model Checking. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Model Checking, Malware Detection
31Subramanian Lakshmanan, Deepak J. Manohar, Mustaque Ahamad, H. Venkateswaran Collective Endorsement and the Dissemination Problem in Malicious Environments. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Mike Just, Evangelos Kranakis, Tao Wan 0004 Resisting Malicious Packet Dropping in Wireless Ad Hoc Networks. Search on Bibsonomy ADHOC-NOW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed Probing, Security, Wireless Ad Hoc Networks, Denial of Service (DoS), Secure Routing Protocols
31Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné A protocol for detecting malicious hosts based on limiting the execution time of mobile agents. Search on Bibsonomy ISCC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Wenguang Chen, Weimin Zheng, Guangwen Yang On the Malicious Participants Problem in Computational Grid. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
31Rocco A. Servedio Smooth Boosting and Learning with Malicious Noise. Search on Bibsonomy COLT/EuroCOLT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
31Yalin Evren Sagduyu, Anthony Ephremides A game-theoretic analysis of denial of service attacks in wireless random access. Search on Bibsonomy Wirel. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious operation, Adaptive update algorithms, Wireless networks, Game theory, Cooperation, Medium access control, Pricing, Competition, Distributed control, Random access, Denial of service attacks
31Nguyen-Thanh Nhan, Insoo Koo A Secure Distributed Spectrum Sensing Scheme in Cognitive Radio. Search on Bibsonomy ICIC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious user, Distributed, Cognitive radio, Robust statistics, Spectrum sensing
31Deanna D. Caputo, Greg Stephens, Brad Stephenson, Megan Cormier, Minna Kim An Empirical Approach to Identify Information Misuse by Insiders (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malicious users, detection, insider threat, misuse
31Huafei Zhu Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Black-box constructions, defensible adversary, malicious adversary, oblivious transfer protocols
31Nicolò Cesa-Bianchi, Eli Dichterman, Paul Fischer, Eli Shamir 0001, Hans Ulrich Simon Sample-Efficient Strategies for Learning in the Presence of Noise. Search on Bibsonomy J. ACM The full citation details ... 1999 DBLP  DOI  BibTeX  RDF learning with malicious noise, PAC learning
Displaying result #1 - #100 of 7297 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license