Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
66 | Tom Chothia, Dominic Duggan |
Type-Based Distributed Access Control vs. Untyped Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects in Security and Trust ![In: Formal Aspects in Security and Trust, Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers, pp. 203-216, 2005, Springer, 3-540-32628-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Jakob Eriksson, Michalis Faloutsos, Srikanth V. Krishnamurthy |
Routing amid Colluding Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the IEEE International Conference on Network Protocols, ICNP 2007, October 16-19, 2007, Beijing, China, pp. 184-193, 2007, IEEE Computer Society, 1-4244-1588-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham |
A taxonomy of computer worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, WORM 2003, Washington, DC, USA, October 27, 2003, pp. 11-18, 2003, ACM Press, 1-58113-785-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
mobile malicious code, taxonomy, motivation, attackers, computer worms |
42 | Marios Mavronicolas, Vicky Papadopoulou, Anna Philippou, Paul G. Spirakis |
A Network Game with Attackers and a Defender. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithmica ![In: Algorithmica 51(3), pp. 315-341, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Attacks and defenses, Security, Game theory, Graph theory, Nash equilibria |
42 | Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, Daniel Mossé |
Live Baiting for Service-Level DoS Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2008. 27th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, USA, pp. 171-175, 2008, IEEE, 978-1-4244-2026-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Ming-Hour Yang, Chien-Si Chiu, Shiuhpyng Shieh |
Tracing Mobile Attackers in Wireless Ad-Hoc Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Third International Conference on Internet and Web Applications and Services, ICIW 2008, 8-13 June 2008, Athens, Greece, pp. 7-12, 2008, IEEE Computer Society, 978-0-7695-3163-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Terence K. T. Law, John C. S. Lui, David K. Y. Yau |
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 16(9), pp. 799-813, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
attack traffic filtering, minimum stable time, DDoS attack, traceback |
42 | Shravan K. Rayanchu, Gautam Barua |
Tracing Attackers with Deterministic Edge Router Marking (DERM). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, First International Conference, ICDCIT 2004, Bhubaneswar, India, December 22-24, 2004, Proceedings, pp. 400-409, 2004, Springer, 3-540-24075-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Musard Balliu, Isabella Mastroeni |
A weakest precondition approach to active attacks analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 59-71, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
robustness, non-interference, declassification, program semantics, active attackers |
35 | Yinuo Du, Baptiste Prébot, Xiaoli Xi, Cleotilde Gonzalez |
A Cyber-War Between Bots: Human-Like Attackers are More Challenging for Defenders than Deterministic Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 56th Hawaii International Conference on System Sciences, HICSS 2023, Maui, Hawaii, USA, January 3-6, 2023, pp. 856-865, 2023, ScholarSpace, 978-0-9981331-6-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
35 | Kelly Shortridge, Ryan Petrich |
Lamboozling Attackers: A New Generation of Deception: Software engineering teams can exploit attackers' human nature by building deception environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 19(5), pp. 26-59, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
34 | Marios Mavronicolas, Burkhard Monien, Vicky G. Papadopoulou |
How Many Attackers Can Selfish Defenders Catch? ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), Proceedings, 7-10 January 2008, Waikoloa, Big Island, HI, USA, pp. 470, 2008, IEEE Computer Society, 0-7695-3075-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
34 | K. T. Law, John C. S. Lui, David K. Y. Yau |
You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: 10th International Workshop on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS 2002), 11-16 October 2002, Fort Worth, Texas, USA, pp. 433-, 2002, IEEE Computer Society, 0-7695-1840-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Jing Chen, Huanguo Zhang, Junhui Hu |
An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia International Conference on Modelling and Simulation ![In: Second Asia International Conference on Modelling and Simulation, AMS 2008, Kuala Lumpur, Malaysia, May 13-15, 2008, pp. 59-64, 2008, IEEE Computer Society, 978-0-7695-3136-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sensor network, routing, security model |
33 | M. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy |
On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICON ![In: Proceedings of the 16th International Conference on Networks, ICON 2008, December 12-14, 2008, held at India Habitat Centre, New Delhi, India, pp. 1-6, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Wei Yu 0003, Zhu Ji, K. J. Ray Liu |
Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 2(2), pp. 240-253, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Fumiaki Nagano, Kohei Tatara, Kouichi Sakurai, Toshihiro Tabata |
An Intrusion Detection System using Alteration of Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 243-248, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
Network Game with Attacker and Protector Entities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 16th International Symposium, ISAAC 2005, Sanya, Hainan, China, December 19-21, 2005, Proceedings, pp. 288-297, 2005, Springer, 3-540-30935-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel |
Denial-of-service resilience in peer-to-peer file sharing systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2005, June 6-10, 2005, Banff, Alberta, Canada, pp. 38-49, 2005, ACM, 1-59593-022-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
file pollution, network-targeted attacks, peer-to-peer, denial of service |
33 | Roberto Giacobazzi, Isabella Mastroeni |
Abstract non-interference: parameterizing non-interference by abstract interpretation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Proceedings of the 31st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2004, Venice, Italy, January 14-16, 2004, pp. 186-197, 2004, ACM, 1-58113-729-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
abstract interpretation, language-based security, non-interference, abstract domains |
29 | Bruce Schneier |
Empathy and Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(5), pp. 88, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
security, attackers, Empathy, morality |
29 | Mike Andrews, James A. Whittaker |
Computer Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(5), pp. 68-71, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
defense in depth, computer security, attackers, firewalls, vulnerability |
26 | Matthew Carpenter, Tom Liston, Ed Skoudis |
Hiding Virtualization from Attackers and Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(3), pp. 62-65, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Karin Sallhammar, Svein J. Knapskog, Bjarne E. Helvik |
Using Stochastic Game Theory to Compute the Expected Behavior of Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January - 4 February 2005, Trento, Italy, pp. 102-105, 2005, IEEE Computer Society, 0-7695-2263-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Juan José Salazar González |
Extending Cell Suppression to Protect Tabular Data against Several Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inference Control in Statistical Databases ![In: Inference Control in Statistical Databases, From Theory to Practice, pp. 34-58, 2002, Springer, 3-540-43614-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Tyler Moore 0001, Richard Clayton 0001 |
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 256-272, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel 0001 |
Self Adaptive High Interaction Honeypots Driven by Game Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSS ![In: Stabilization, Safety, and Security of Distributed Systems, 11th International Symposium, SSS 2009, Lyon, France, November 3-6, 2009. Proceedings, pp. 741-755, 2009, Springer, 978-3-642-05117-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Virginia N. L. Franqueira, Raul H. C. Lopes, Pascal van Eck |
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 66-73, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hypergraph, attack graph, vulnerability assessment, network attack |
24 | Mao Lin Huang, Jie Liang 0004, Quang Vinh Nguyen |
A Visualization Approach for Frauds Detection in Financial Market. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 13th International Conference on Information Visualisation, IV 2009, 15-17 July 2009, Barcelona, Spain, pp. 197-202, 2009, IEEE Computer Society, 978-0-7695-3733-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Ahren Studer, Adrian Perrig |
The Coremelt Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 37-52, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Jie Yu 0008, Chengfang Fang, Liming Lu, Zhoujun Li 0001 |
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Scalable Information Systems, 4th International ICST Conference, Infoscale 2009, Hong Kong, June 10-11, 2009, Revised Selected Papers, pp. 175-191, 2009, Springer, 978-3-642-10484-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Trust, DDoS Attacks, Lightweight, Application layer |
24 | Hai Zhang, Xuyang Zhu, Wenming Guo |
TCP portscan detection based on single packet flows and entropy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 1056-1060, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
TCP portscan, single packet flows, entropy |
24 | Jared Cordasco, Susanne Wetzel |
An attacker model for MANET routing security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the Second ACM Conference on Wireless Network Security, WISEC 2009, Zurich, Switzerland, March 16-19, 2009, pp. 87-94, 2009, ACM, 978-1-60558-460-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, routing, ad-hoc, manet, attacker model |
24 | Zhenhai Duan, Xin Yuan 0001, Jaideep Chandrashekar |
Controlling IP Spoofing through Interdomain Packet Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(1), pp. 22-36, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Infrastructure Protection, Routing Protocols, BGP, DDoS, Network-level security and protection, IP Spoofing |
24 | Nan Zhang 0004, Wei Yu 0002, Xinwen Fu, Sajal K. Das 0001 |
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 14th International Conference on Parallel and Distributed Systems, ICPADS 2008, Melbourne, Victoria, Australia, December 8-10, 2008, pp. 501-508, 2008, IEEE Computer Society, 978-0-7695-3434-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Shouhuai Xu |
Collaborative Attack vs. Collaborative Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 217-228, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
collaborative attack, collaborative defense, cyber security, cyber attack |
24 | Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song |
Distributed Evasive Scan Techniques and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 157-174, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
scan detection, distributed scanning, information-hiding, evasion |
24 | William Conner, Klara Nahrstedt |
Securing peer-to-peer media streaming systems from selfish and malicious behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Middleware (Doctoral Symposium) ![In: Middleware 2007, ACM/IFIP/USENIX 8th International Middleware Conference, Newport Beach, CA, USA, November 26-30, 2007, Doctoral Symposium Proceedings, pp. 13, 2007, ACM, 978-1-59593-933-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security, multimedia, peer-to-peer, accounting |
24 | H. Vicky Zhao, K. J. Ray Liu |
Behavior forensics for scalable multiuser collusion: fairness versus effectiveness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(3), pp. 311-329, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | H. Vicky Zhao, K. J. Ray Liu |
Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Forensics Secur. ![In: IEEE Trans. Inf. Forensics Secur. 1(4), pp. 440-456, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Cliff Changchun Zou, Ryan Cunningham |
Honeypot-Aware Advanced Botnet Construction and Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings, pp. 199-208, 2006, IEEE Computer Society, 0-7695-2607-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Arjun Nambiar, Matthew K. Wright |
Salsa: a structured approach to large-scale anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 17-26, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
privacy, networks, peer-to-peer networks, anonymous communications |
24 | Linfeng Zhang, Anthony G. Persaud, Alan Johnson, Yong Guan |
Detection of stepping stone attack under delay and chaff perturbations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCCC ![In: Proceedings of the 25th IEEE International Performance Computing and Communications Conference, IPCCC 2006, April 10-12, 2006, Phoenix, Arizona, USA, 2006, IEEE, 1-4244-0198-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 |
Applications of Homomorphic Functions to Software Obfuscation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISI ![In: Intelligence and Security Informatics, International Workshop, WISI 2006, Singapore, April 9, 2006, Proceedings, pp. 152-153, 2006, Springer, 3-540-33361-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Shirley Gaw, Edward W. Felten |
Password management strategies for online accounts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 2nd Symposium on Usable Privacy and Security, SOUPS 2006, Pittsburgh, Pennsylvania, USA, July 12-14, 2006, pp. 44-55, 2006, ACM, 1-59593-448-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
password reuse, security, survey, password, user behavior, password management |
24 | Byung Ryong Kim, Ki-Chang Kim |
A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 476-485, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Marina Gelastou, Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
The Power of the Defender. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 26th International Conference on Distributed Computing Systems Workshops (ICDCS 2006 Workshops), 4-7 July 2006, Lisboa, Portugal, pp. 37, 2006, IEEE Computer Society, 0-7695-2541-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Xinwen Fu, Wei Yu 0002, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham |
On Recognizing Virtual Honeypots and Countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 211-218, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
A Graph-Theoretic Network Security Game. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings, pp. 969-978, 2005, Springer, 3-540-30900-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Yuseung Sohn, Misung Cho, Giwon On, Kijoon Chae |
A Secure User Authentication Method in Networked Intelligent Manufacturing Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 4th International Conference on Cyberworlds (CW 2005), 23-25 November 2005, Singapore, pp. 123-129, 2005, IEEE Computer Society, 0-7695-2378-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Gregory J. Conti, Kulsoom Abdullah |
Passive visual fingerprinting of network attack tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VizSEC ![In: 1st ACM Workshop on Visualization and Data Mining for Computer Security, VizSEC/DMSEC 2004, Washington, DC, USA, October 29, 2004, pp. 45-54, 2004, ACM, 1-58113-974-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
application fingerprinting, network attack visualization, operating system fingerprinting, passive fingerprinting, visual fingerprinting, information visualization |
24 | Dong Yu 0001, Deborah A. Frincke |
A Novel Framework for Alert Correlation and Understanding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 452-466, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam |
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 15-19 April 2002, Fort Lauderdale, FL, USA, CD-ROM/Abstracts Proceedings, 2002, IEEE Computer Society, 0-7695-1573-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
attack resistant, mobile agents, intrusion detection systems, DoS attacks |
18 | Ruiliang Deng, Zongying Shi, Yisheng Zhong |
Reach-Avoid Games With Two Cooperative Attackers: Value Function and Singular Surfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Aerosp. Electron. Syst. ![In: IEEE Trans. Aerosp. Electron. Syst. 60(1), pp. 558-573, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Hironori Uchibori, Katsunari Yoshioka, Kazumasa Omote |
Honeypot Method to Lure Attackers Without Holding Crypto-Assets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 16059-16071, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Suman Sourav, Binbin Chen 0001 |
Exposing Hidden Attackers in Industrial Control Systems Using Micro-Distortions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Smart Grid ![In: IEEE Trans. Smart Grid 15(2), pp. 2089-2101, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ruochen Tai, Liyong Lin, Rong Su 0001 |
On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Autom. Control. ![In: IEEE Trans. Autom. Control. 69(3), pp. 1898-1905, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Kim Hammar, Rolf Stadler |
Learning Near-Optimal Intrusion Responses Against Dynamic Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Netw. Serv. Manag. ![In: IEEE Trans. Netw. Serv. Manag. 21(1), pp. 1158-1177, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Md Rayhanur Rahman, Setu Kumar Basak, Rezvan Mahdavi-Hezaveh, Laurie A. Williams |
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.01865, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Hangsheng Zhang, Jiqiang Liu, Jinsong Dong |
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.11126, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Gideon Samid |
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 129, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
18 | Davinder Kaur, Suleyman Uslu, Mimoza Durresi, Arjan Durresi |
Artificial intelligence control for trust-based detection of attackers in 5G social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Intell. ![In: Comput. Intell. 40(1), February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Palvi Aggarwal, Saeefa Rubaiyet Nowmi, Yinuo Du, Cleotilde Gonzalez |
Evidence of Cognitive Biases in Cyber Attackers from An Empirical Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 57th Hawaii International Conference on System Sciences, HICSS 2024, Hilton Hawaiian Village Waikiki Beach Resort, Hawaii, USA, January 3-6, 2024, pp. 934-943, 2024, ScholarSpace, 978-0-9981331-7-1. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
18 | Haoxiang Ma, Shuo Han 0002, Charles A. Kamhoua, Jie Fu |
Optimizing Sensor Allocation Against Attackers With Uncertain Intentions: A Worst-Case Regret Minimization Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Control. Syst. Lett. ![In: IEEE Control. Syst. Lett. 7, pp. 2863-2868, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Amith Manoharan, P. B. Sujit |
NMPC-Based Cooperative Strategy to Lure Two Attackers Into Collision by Two Targets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Control. Syst. Lett. ![In: IEEE Control. Syst. Lett. 7, pp. 496-501, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yuanhua Fu, Zhiming He |
Massive SSDF Attackers Identification in Cognitive Radio Networks by Using Consistent Property. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Veh. Technol. ![In: IEEE Trans. Veh. Technol. 72(8), pp. 11058-11062, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sandeep Patil, Lalita Admuthe, Meenakshi R. Patil |
SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Internet Protoc. Technol. ![In: Int. J. Internet Protoc. Technol. 16(2), pp. 119-130, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Li Liang, Jianan Wang, Fang Deng |
Targets-Attackers-Defenders Game via Pairwise Outcomes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Unmanned Syst. ![In: Unmanned Syst. 11(2), pp. 133-142, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xuewen Dong, Yuanyu Zhang, Yuanxiong Guo, Yanmin Gong 0001, Yulong Shen, Jianfeng Ma 0001 |
PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 22(2), pp. 1143-1156, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yufeng Cai, Wenya Wang, Yicong Chen, Haijun Tan, Ning Xie 0007, Jiangzhou Wang |
Multiple Cooperative Attackers for Tag-Based Physical Layer Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Commun. Mag. ![In: IEEE Commun. Mag. 61(7), pp. 165-171, July 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | S. Lakshmi, E. A. Mary Anita, J. Jenefa |
A Hybrid Approach Against Black Hole Attackers Using Dynamic Threshold Value and Node Credibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 91595-91603, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Chaoqun Yang, Lei Mo, Xianghui Cao, Heng Zhang 0001, Zhiguo Shi 0001 |
A Labeled RFS-Based Framework for Multiple Integrity Attackers Detection and Identification in Cyber-Physical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 10(21), pp. 19244-19256, nov1 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | P. S. Nandhini, S. Kuppuswami, Subramaniam Malliga, R. Devi Priya |
Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 79(6), pp. 6825-6848, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mana Azamat, Johann Schütz, Mathias Uslar |
Use cases also exist for attackers - how to foster the concept of misuse cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Elektrotech. Informationstechnik ![In: Elektrotech. Informationstechnik 140(5), pp. 419-424, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Cong Zhang, Jie Wang 0047, Qingchen Liu, Weiming Fu, Wei Xing Zheng 0001 |
Optimal power control for sensors and DoS attackers over a fading channel network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Frankl. Inst. ![In: J. Frankl. Inst. 360(13), pp. 9355-9377, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ruochen Tai, Liyong Lin, Rong Su 0001 |
Synthesis of optimal covert sensor-actuator attackers for discrete-event systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 151, pp. 110910, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kim Hammar, Rolf Stadler |
Learning Near-Optimal Intrusion Responses Against Dynamic Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.06085, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lei Yuan, Ziqian Zhang, Ke Xue 0001, Hao Yin, Feng Chen 0042, Cong Guan, Lihe Li, Chao Qian 0001, Yang Yu 0001 |
Robust multi-agent coordination via evolutionary generation of auxiliary adversarial attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.05909, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Keane Lucas, Matthew Jagielski, Florian Tramèr, Lujo Bauer, Nicholas Carlini |
Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.13464, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Cansu Dogan, Selim Yilmaz, Sevil Sen |
Assessing the Impact of Mobile Attackers on RPL-based Internet of Things. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2303.16499, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xuandong Zhao, Kexun Zhang, Yu-Xiang Wang 0003, Lei Li 0005 |
Generative Autoencoders as Watermark Attackers: Analyses of Vulnerabilities and Threats. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.01953, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hanyang Hu, Minh Bui, Mo Chen |
Multi-Agent Reach-Avoid Games: Two Attackers Versus One Defender and Mixed Integer Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.13155, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Suman Sourav, Binbin Chen 0001 |
Exposing Hidden Attackers in Industrial Control Systems using Micro-distortions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.15926, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Puning Zhao, Zhiguo Wan |
High Dimensional Distributed Gradient Descent with Arbitrary Number of Byzantine Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.13352, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rong Du, Qingqing Ye 0001, Yue Fu, Haibo Hu 0001, Jin Li 0002, Chengfang Fang, Jie Shi |
Differential Aggregation against General Colluding Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2302.09315, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Haoxiang Ma, Shuo Han 0002, Charles A. Kamhoua, Jie Fu |
Optimizing Sensor Allocation against Attackers with Uncertain Intentions: A Worst-Case Regret Minimization Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.05962, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ruochen Tai, Liyong Lin, Rong Su 0001 |
On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.15972, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams |
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 55(12), pp. 241:1-241:36, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Fengxiang Yang, Juanjuan Weng, Zhun Zhong, Hong Liu 0009, Zheng Wang 0007, Zhiming Luo, Donglin Cao, Shaozi Li, Shin'ichi Satoh 0001, Nicu Sebe |
Towards Robust Person Re-Identification by Defending Against Universal Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 45(4), pp. 5218-5235, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mary Ellen Zurko |
Unusable Security for Attackers [From the Editors]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 21(6), pp. 4-7, November - December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Chan Dai Truyen Thai, Thanh T. Tran, De-Thu Huynh |
Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 29(1), pp. 403-412, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Eric Dubois 0004, Ashley Peper, Laura A. Albert |
Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Decis. Anal. ![In: Decis. Anal. 20(3), pp. 202-219, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Gaoxin Qi, Jichao Li, Chi Xu, Gang Chen, Kewei Yang |
Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Entropy ![In: Entropy 25(1), pp. 57, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xu An Wang 0001, Lunhai Pan, Hao Liu, Xiaoyuan Yang 0002 |
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1692, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Yaoqi Yang, Xianglin Wei, Renhui Xu, Weizheng Wang, Laixian Peng, Yangang Wang |
Jointly beam stealing attackers detection and localization without training: an image processing viewpoint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Comput. Sci. ![In: Frontiers Comput. Sci. 17(3), pp. 173704, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Cathryn Peoples, Adrian Moore 0001, Nektarios Georgalas |
The Design of Ethical Service-Level Agreements to Protect Cyber Attackers and Attackees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Emerging Trends in Cybersecurity Applications ![In: Emerging Trends in Cybersecurity Applications, pp. 413-440, 2023, Springer International Publishing, 978-3-031-09639-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Torsten Krauß, Alexandra Dmitrienko |
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, CCS 2023, Copenhagen, Denmark, November 26-30, 2023, pp. 1526-1540, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rong Du, Qingqing Ye 0001, Yue Fu, Haibo Hu 0001, Jin Li 0002, Chengfang Fang, Jie Shi |
Differential Aggregation against General Colluding Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: 39th IEEE International Conference on Data Engineering, ICDE 2023, Anaheim, CA, USA, April 3-7, 2023, pp. 2180-2193, 2023, IEEE, 979-8-3503-2227-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Stanislava Ivanova, Naghmeh Moradpoor |
Fake PLC in the Cloud, We Thought the Attackers Believed that: How ICS Honeypot Deception Gets Impacted by Cloud Deployments? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WFCS ![In: 19th IEEE International Conference on Factory Communication Systems, WFCS 2023, Pavia, Italy, April 26-28, 2023, pp. 1-4, 2023, IEEE, 978-1-6654-6432-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | He Zhu, Ce Li, Haitian Yang, Yan Wang 0081, Weiqing Huang |
Prompt Makes mask Language Models Better Adversarial Attackers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICASSP ![In: IEEE International Conference on Acoustics, Speech and Signal Processing ICASSP 2023, Rhodes Island, Greece, June 4-10, 2023, pp. 1-5, 2023, IEEE, 978-1-7281-6327-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|