The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attacker with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1993 (16) 1994-1998 (28) 1999 (18) 2000 (16) 2001 (29) 2002 (57) 2003 (70) 2004 (105) 2005 (165) 2006 (200) 2007 (200) 2008 (222) 2009 (161) 2010 (35) 2011 (23) 2012 (21) 2013 (18) 2014 (18) 2015 (29) 2016 (26) 2017 (28) 2018 (36) 2019 (45) 2020 (46) 2021 (53) 2022 (59) 2023 (52) 2024 (9)
Publication types (Num. hits)
article(374) incollection(1) inproceedings(1403) phdthesis(7)
Venues (Conferences, Journals, ...)
CoRR(68) CCS(43) ACSAC(28) ARES(26) CRYPTO(24) Information Hiding(22) CHES(21) S&P(20) EUROCRYPT(18) AsiaCCS(16) ESORICS(15) ICICS(15) RAID(15) Selected Areas in Cryptography(15) Financial Cryptography(14) FSE(14) More (+10 of total 693)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1649 occurrences of 810 keywords

Results
Found 1785 publication records. Showing 1785 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
97Yongjin Kim, Ahmed Helmy Attacker traceback with cross-layer monitoring in wireless multi-hop networks. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks
80Serge Fehr, Christian Schaffner Randomness Extraction Via delta -Biased Masking in the Presence of a Quantum Attacker. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
76Jaafar Almasizadeh, Mohammad Abdollahi Azgomi A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion process, semi-Markov chain (SMC), Security, modeling, evaluation, attacker, system, discrete-time Markov chain (DTMC)
73Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Network security, anomaly detection, security evaluation, Markov Reward Models
69Nazim Benaïssa Modelling Attacker's Knowledge for Cascade Cryptographic Protocols. Search on Bibsonomy ABZ The full citation details ... 2008 DBLP  DOI  BibTeX  RDF model for attacker, formal methods, cryptography
62Peng Liu 0005, Wanyu Zang, Meng Yu 0001 Incentive-based modeling and inference of attacker intent, objectives, and strategies. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Attacker intent and strategy modeling, attack strategy inference, game theory
55Jared Cordasco, Susanne Wetzel An attacker model for MANET routing security. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, routing, ad-hoc, manet, attacker model
52Yongjin Kim ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DoS, DDoS, Traceback
52Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna Validating Security Protocols under the General Attacker. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52Guido Boella, Leendert W. N. van der Torre An Attacker Model for Normative Multi-agent Systems. Search on Bibsonomy CEEMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Andriy Panchenko 0001, Lexi Pimenidis Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Liang Xie 0002, Sencun Zhu Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attacker identification, message dropping attacks, Overlay networks, attack detection
42Siddharth Maru, Timothy X. Brown Denial of service vulnerabilities in the 802.16 protocol. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF encryption, denial of service, traffic analysis, IEEE 802.16, sensing, jamming, broadband wireless access
38Mark Rounds, Norman Pendegraft Diversity in Network Attacker Motivation: A Literature Review. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Daniel Ramsbrock, Robin Berthier, Michel Cukier Profiling Attacker Behavior Following SSH Compromises. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
38Peng Liu 0005, Wanyu Zang Incentive-based modeling and inference of attacker intent, objectives, and strategies. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF attack prediction, game theory, computer security
35Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DNS spoofing, MITM attacks, SIP, VoIP security
35Mike Phillips, Manuela M. Veloso Robust Supporting Role in Coordinated Two-Robot Soccer Attack. Search on Bibsonomy RoboCup The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Ting He 0001, Lang Tong Detecting Encrypted Stepping-Stone Connections. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Ryad Benadjila, Olivier Billet, Stanislas Francfort Drm to counter side-channel attacks? Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF white-box, AES, side-channel attacks, DRM
35Sid Stamm, Zulfikar Ramzan, Markus Jakobsson Drive-By Pharming. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Salil S. Kanhere, Anjum Naveed A Novel Tuneable Low-Intensity Adversarial Attack. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
35Neil C. Rowe Designing Good Deceptions in Defense of Information Systems. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Ha Yoon Song, Han-gyoo Kim Cooperative Routers against DoS Attacks. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
33Masaki Kuwano, Momoka Okuma, Satoshi Okada, Takuho Mitsunaga The Attacker Might Also Do Next: ATT&CK Behavior Forecasting by Attacker-based Collaborative Filtering and Graph Databases. Search on Bibsonomy J. Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
33Thanh Hong Nguyen, Amulya Yadav The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty? Search on Bibsonomy GameSec The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
33Yashika Verma, Biswabandan Panda Avenger: Punishing the Cross-Core Last-Level Cache Attacker and Not the Victim by Isolating the Attacker. Search on Bibsonomy SEED The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
33Abbas Arghavani, Mahdi Arghavani, Mahmood Ahmadi, Paul Crane Attacker-Manager Game Tree (AMGT): A new framework for visualizing and analysing the interactions between attacker and network security manager. Search on Bibsonomy Comput. Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Ioanna Kantzavelou, Sokratis K. Katsikas A Generic Intrusion Detection Game Model in IT Security. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF internal attacker, Intrusion Detection, noncooperative Game Theory
31Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford An Attacker-Defender Game for Honeynets. Search on Bibsonomy COCOON The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
31Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou 0001 A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, model checking, Denial of Service
31Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Srinivasan Venkatesh 0002, Lokesh Bhatia Marking Technique to Isolate Boundary Router and Attacker. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF network security, Internet Protocol traceback, Denial-of-service attacks
31Kun Liu 0001, Chris Giannella, Hillol Kargupta An Attacker's View of Distance Preserving Maps for Privacy Preserving Data Mining. Search on Bibsonomy PKDD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis Network Game with Attacker and Protector Entities. Search on Bibsonomy ISAAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Yongjin Kim, Ahmed Helmy SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
31Erland Jonsson, Tomas Olovsson A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF operational security, modeling, metric, Computer security, attacks, intrusion
28Charles L. Cartledge, Michael L. Nelson Analysis of graphs for digital preservation suitability. Search on Bibsonomy HT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF robustness, resilience, small world
28Jaafar Almasizadeh, Mohammad Abdollahi Azgomi Intrusion Process Modeling for Security Quantification. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Wei Sun, Xiangwei Kong, Dequan He, Xingang You Information Security Game Analysis with Penalty Parameter. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Zonghua Zhang, Farid Naït-Abdesselam, Xiaodong Lin 0001, Pin-Han Ho A model-based semi-quantitative approach for evaluating security of enterprise networks. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, risk assessment, security evaluation
28Leevar Williams, Richard Lippmann, Kyle Ingols GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack path, visualization, network, recommendation, vulnerability, treemap, security metrics, attack graph, exploit, adversary model
28Arvind Seshadri, Mark Luk, Adrian Perrig SAKE: Software Attestation for Key Establishment in Sensor Networks. Search on Bibsonomy DCOSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software attestation, sensor networks, Key establishment
28Hilmi Günes Kayacik, Nur Zincir-Heywood Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Joseph H. Silverman, William Whyte Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Ee-Chien Chang, Ren Shen, Francis Weijian Teo Finding the original point set hidden among chaff. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF biometric privacy protection, fingerprint template, online parking, secure sketch
28Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia Secure Biometric Authentication for Weak Computational Devices. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF authentication, biometrics, smart cards, cryptographic hash functions
28Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider Belief in Information Flow. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi StackOFFence: A Technique for Defending Against Buffer Overflow Attacks. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. Search on Bibsonomy S&P The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Bilal Rizvi, Emmanuel Fernández-Gaucherand Effectiveness of Advanced and Authenticated Packet Marking Scheme for Traceback of Denial of Service Attacks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Xunhua Wang, Mohammad Hossain Heydari, Hua Lin An Intrusion-Tolerant Password Authentication System. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance
28Scott A. Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David A. Wagner 0001 A Cryptanalysis of the High-Bandwidth Digital Content Protection System. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Adam L. Young, Moti Yung Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption
28William H. Cunningham Optimal Attach and Reinforcement of a Network Search on Bibsonomy J. ACM The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
24Heng He, Ruixuan Li 0001, Guoqiang Gao, Zhiyong Xu 0003, Weijun Xiao An Integrated System Solution for Secure P2P Content Distribution Based on Network Coding. Search on Bibsonomy NAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF P2P content distribution, homomorphic hash, attacker identification, network coding, pollution attacks
24Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF flow-based attacker detection, spam mail sending hosts, botnet, DDoS attack, NetFlow
24Jesus Molina, Michel Cukier Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF filesystem data, attacker behavior, SSH compromise, Intrusion detection systems, honeypots, empirical analysis
24Martin Craig Serpell, Alistair R. Clark, Jim E. Smith, Andrea T. Staggemeier Pre-processing Optimisation Applied to the Classical Integer Programming Model for Statistical Disclosure Control. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cell Suppression Problem, Classical Model, Pre-processing Optimisation, External Attacker, Statistical Disclosure Control
24Norman Pendegraft, Mark Rounds, Deborah A. Frincke A simulation model of IS security. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF system attacker interaction, system user interaction, simulation
24Xinyu Yang, Ting Ma A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6. Search on Bibsonomy FGCN (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Vasileios Karyotis, Symeon Papavassiliou On the malware spreading over non-propagative wireless ad hoc networks: the attacker's perspective. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack strategies, malware spreading, ad hoc networks
24Nikita Borisov An Analysis of Parallel Mixing with Attacker-Controlled Inputs. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24René Rydhof Hansen A Hardest Attacker for Leaking References. Search on Bibsonomy ESOP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
21Serdar Cabuk, Carla E. Brodley, Clay Shields IP Covert Channel Detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Network covert channels, channel detection, information hiding
21Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets Chernoff-Type Direct Product Theorems. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Challenge-response protocols, Parallel repetition with threshold, Direct product theorem
21Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information theft detection, Intrusion detection, information theory, malware analysis
21Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter 0001 Filter-resistant code injection on ARM. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF alphanumeric shellcode, filter-resistance, turing completeness
21Yao Liu 0007, Michael K. Reiter, Peng Ning False data injection attacks against state estimation in electric power grids. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack, power grids, state estimation
21Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda All your contacts are belong to us: automated identity theft attacks on social networks. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF social network security, identity theft
21Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka QR-TAN: Secure Mobile Transaction Authentication. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das 0001 Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. Search on Bibsonomy PerCom Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Razvi Doomun, Thaier Hayajneh, Prashant Krishnamurthy, David Tipper SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino Preventing velocity-based linkage attacks in location-aware applications. Search on Bibsonomy GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF location-aware social networks, location privacy
21Musard Balliu, Isabella Mastroeni A weakest precondition approach to active attacks analysis. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF robustness, non-interference, declassification, program semantics, active attackers
21Danesh Irani, Steve Webb, Kang Li 0001, Calton Pu Large Online Social Footprints - An Emerging Threat. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Norman Pendegraft, Mark Rounds A Simulation of Various Variable Hacker Populations. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta Bit-Free Collision: Application to APOP Attack. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit-free collision, APOP, hash function, MD5, MD4
21Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute Simulating cyber-attacks for fun and profit. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack
21Adedayo Adetoye, Atta Badii A Policy Model for Secure Information Flow. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Peng Ning, An Liu, Wenliang Du Mitigating DoS attacks against broadcast authentication in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Sensor networks, broadcast authentication, DoS attacks
21H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu Game-theoretic analysis of maximum-payoff multiuser collusion. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Aleksandra Korolova, Rajeev Motwani 0001, Shubha U. Nabar, Ying Xu 0002 Link privacy in social networks. Search on Bibsonomy CIKM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF link privacy, privacy in data mining, social networks, anonymization, link analysis
21Cormac Herley, Dinei A. F. Florêncio Protecting Financial Institutions from Brute-Force Attacks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Aleksandra Korolova, Rajeev Motwani 0001, Shubha U. Nabar, Ying Xu 0002 Link Privacy in Social Networks. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Steve Kremer, Antoine Mercier 0002, Ralf Treinen Proving Group Protocols Secure Against Eavesdroppers. Search on Bibsonomy IJCAR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Gabriele Gianini, Ernesto Damiani A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study. Search on Bibsonomy Secure Data Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Wei He, Chunhe Xia, Haiquan Wang, Cheng Zhang, Yi Ji A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. Search on Bibsonomy CSSE (6) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21He Wei, Chunhe Xia, Haiquan Wang, Zhang Cheng, Ji Yi A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Gabriele Gianini, Ernesto Damiani Cloaking games in location based services. Search on Bibsonomy SWS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF game theory, location based services, k-anonymity
21Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Luca Breveglieri, Paolo Ienne, Israel Koren Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands 0001 Termination-Insensitive Noninterference Leaks More Than Just a Bit. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
21Anh-Quynh Nguyen, Yoshiyasu Takefuji A novel approach for a file-system integrity monitor tool of Xen virtual machine. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Xen virtual machine, intrusion detection, Linux, rootkit
21David J. Martin 0001, Daniel Kifer, Ashwin Machanavajjhala, Johannes Gehrke, Joseph Y. Halpern Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. Search on Bibsonomy ICDE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Jan Tore Sørensen Survival by Deception. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Donggang Liu, Qi Dong 0001 Detecting Misused Keys in Wireless Sensor Networks. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Paul Resnick, Rahul Sami The influence limiter: provably manipulation-resistant recommender systems. Search on Bibsonomy RecSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF manipulation-resistance, recommender system, shilling
21Wil Michiels, Paul Gorissen Mechanism for software tamper resistance: an application of white-box cryptography. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software tamper resistance, white-box cryptography, software protection
21Ghada Alnifie, Robert Simon A multi-channel defense against jamming attacks in wireless sensor networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
21Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets Chernoff-Type Direct Product Theorems. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1785 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license