|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 96 occurrences of 81 keywords
|
|
|
Results
Found 128 publication records. Showing 128 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
68 | Frédéric Cuppens, Sylvain Gombault, Thierry Sans |
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
IDMEF, counter-measures, anti-correlation, Intrusion detection, correlation, response |
46 | Elena Trichina, Antonio Bellezza |
Implementation of Elliptic Curve Cryptography with Built-In Counter Measures against Side Channel Attacks. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
30 | Yu Fu 0005, Benafsh Husain, Richard R. Brooks |
Analysis of Botnet Counter-Counter-Measures. |
CISR |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Jacques Quisquater, David Samyde |
ElectroMagnetic Analysis (EMA): Measures and Counter-Measures for Smart Cards. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
electromagnetic and power analysis, DPA, smartcard, SPA, tamper resistance, DEMA, SEMA |
21 | Elena Trichina, Domenico De Seta, Lucia Germani |
Simplified Adaptive Multiplicative Masking for AES. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Karel Pärlin, Taneli Riihonen, Vincent Le Nir, Marc Adrat |
Physical-Layer Reliability of Drones and Their Counter-Measures: Full Versus Half Duplex. |
IEEE Trans. Wirel. Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | |
Retraction Note: Intrusion detection based on machine learning in the internet of things, attacks and counter measures. |
J. Supercomput. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Jean-Luc Dugelay |
A Review on Malicious Facial Image Processing and Possible Counter-Measures. |
ICPRAM |
2024 |
DBLP BibTeX RDF |
|
19 | Awais Khan 0007, Khalid Mahmood Malik, James Ryan, Mikul Saravanan |
Battling voice spoofing: a review, comparative analysis, and generalizability evaluation of state-of-the-art voice spoofing counter measures. |
Artif. Intell. Rev. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | |
Intrusion detection based on machine learning in the internet of things, attacks and counter measures. |
J. Supercomput. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Mohammad Kamrul Hasan, Taher M. Ghazal, Rashid A. Saeed, Bishwajeet Pandey, Hardik A. Gohel, Ala' A. Eshmawi, Sayed Abdel-Khalek, Hula Mahmoud Alkhassawneh |
A review on security threats, vulnerabilities, and counter measures of 5G enabled Internet-of-Medical-Things. |
IET Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Mohasinina Binte Kamal, Mohammad Farajollahi, Hamidreza Nazaripouya, Hamed Mohsenian Rad |
Cyberattacks Against Event-Based Analysis in Micro-PMUs: Attack Models and Counter Measures. |
IEEE Trans. Smart Grid |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Noor Ahmad Hazari, Ahmed Oun, Mohammed Y. Niamat |
Machine Learning Vulnerability Analysis of FPGA-based Ring Oscillator PUFs and Counter Measures. |
ACM J. Emerg. Technol. Comput. Syst. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Karen Renaud, Suzanne Prior |
The "three M's" counter-measures to children's risky online behaviors: mentor, mitigate and monitor. |
Inf. Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Christophe Nègre |
Side Channel Counter-measures based on Randomized AMNS Modular Multiplication. |
SECRYPT |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Bin Hu, Yijian Wu, Xin Peng 0001, Jun Sun 0001, Nanjie Zhan, Jun Wu |
Assessing Code Clone Harmfulness: Indicators, Factors, and Counter Measures. |
SANER |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Lisa Gussek, Lisa Schned, Manuel Wiesche |
Obsolescence in IT Work: Causes, Consequences and Counter-Measures. |
Wirtschaftsinformatik |
2021 |
DBLP BibTeX RDF |
|
19 | Yazdan Ahmad Qadri, Rashid Ali 0001, Arslan Musaddiq, Fadi Al-Turjman 0001, Dae Wan Kim, Sung Won Kim |
The limitations in the state-of-the-art counter-measures against the security threats in H-IoT. |
Clust. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Pardeep Kaur, Shalli Rani |
A Comprehensive Study of Attacks on the IoT and its Counter Measures Using Blockchain. |
Integration of WSN and IoT for Smart Cities |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Raoudha Rahmeni, Anis Ben Aicha, Yassine Ben Ayed |
Acoustic features exploration and examination for voice spoofing counter measures with boosting machine learning techniques. |
KES |
2020 |
DBLP DOI BibTeX RDF |
|
19 | Marc Pic, Gaël Mahfoudi, Anis Trabelsi |
Remote KYC: Attacks and Counter-Measures. |
EISIC |
2019 |
DBLP DOI BibTeX RDF |
|
19 | Shirina Samreen |
Packet Dropping Counter Measures in a MANET Through Reliable Routing Protocol Leveraging a Trust Management Framework. |
Int. J. Mob. Comput. Multim. Commun. |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Ha Dao, Johan Mazel, Kensuke Fukuda |
Understanding abusive web resources: characteristics and counter-measures of malicious web resources and cryptocurrency mining. |
AINTEC |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Abid Jamil, Kashif Asif, Rehan Ashraf, Sheraz Mehmood, Ghulam Mustafa |
A comprehensive study of cyber attacks & counter measures for web systems. |
ICFNDS |
2018 |
DBLP DOI BibTeX RDF |
|
19 | Liangxiao Xin |
Cascading attacks in Wi-Fi networks: demonstration and counter-measures |
|
2018 |
RDF |
|
19 | Kiran Garimella, Orestis Kostakis, Michael Mathioudakis |
Ad-blocking: A Study on Performance, Privacy and Counter-measures. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
19 | Matthias Gabel, Jeremias Mechler |
Secure Database Outsourcing to the Cloud: Side-Channels, Counter-Measures and Trusted Execution. |
CBMS |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Kiran Garimella, Orestis Kostakis, Michael Mathioudakis |
Ad-blocking: A Study on Performance, Privacy and Counter-measures. |
WebSci |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Volker Stich, Moritz Schröter, Felix Jordan, Lucas Wenger, Matthias Blum |
Assessment of Counter-Measures for Disturbance Management in Manufacturing Environments. |
APMS (1) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Célestin Matte |
Wi-Fi Tracking: Fingerprinting Attacks and Counter-Measures. (Traçage Wi-Fi: Attaques par Prise d'Empreinte et Contre-Mesures). |
|
2017 |
RDF |
|
19 | Claude Carlet, Sylvain Guilley |
Complementary dual codes for counter-measures to side-channel attacks. |
Adv. Math. Commun. |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Díaz López, Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez |
Dynamic counter-measures for risk-based access control systems: An evolutive approach. |
Future Gener. Comput. Syst. |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Valentin Burger, Matthias Hirth, Tobias Hoßfeld, Phuoc Tran-Gia |
Principles of information neutrality and counter measures against biased information. |
GI-Jahrestagung |
2016 |
DBLP BibTeX RDF |
|
19 | Erick Leon, Stefan D. Bruda |
Counter-Measures against Stack Buffer Overflows in GNU/Linux Operating Systems. |
ANT/SEIT |
2016 |
DBLP DOI BibTeX RDF |
|
19 | Claude Carlet, Sylvain Guilley |
Complementary Dual Codes for Counter-measures to Side-Channel Attacks. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
19 | Pedro Tome, Ramachandra Raghavendra, Christoph Busch 0001, Santosh Tirunagari, Norman Poh, B. H. Shekar, Diego Gragnaniello, Carlo Sansone, Luisa Verdoliva, Sébastien Marcel |
The 1st Competition on Counter Measures to Finger Vein Spoofing Attacks. |
ICB |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Christophe Bacara, Valentin Lefils, Julien Iguchi-Cartigny, Gilles Grimaud, Jean-Philippe Wary |
Virtual Keyboard Logging Counter-Measures Using Human Vision Properties. |
HPCC/CSS/ICESS |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Sven Dittes, Nils Urbach, Frederik Ahlemann, Stefan Smolnik, Thomas Müller 0018 |
Why don't you stick to them? Understanding factors influencing and counter-measures to combat deviant behavior towards organizational IT standards. (PDF / PS) |
Wirtschaftsinformatik |
2015 |
DBLP BibTeX RDF |
|
19 | Ali Ayyaz, Urwa Muaz, Shahid Awan, Muhammad Naeem Ayyaz |
Simulation Model for Counter-Measures against Aedes Aegypti. |
FIT |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Sindhu Shivshankar, Sujni Paul |
E-Learning Environment - The Security and Privacy Challenges Focusing on the Counter Measures. |
DeSE |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Hao Qin 0005 |
Sécurité pratique de systèmes de cryptographie quantique : étude d'attaques et développement de contre-mesures. (Practical security of quantum cryptography system : study of side channel attacks and developments of counter-measures). |
|
2015 |
RDF |
|
19 | André Anjos, Murali Mohan Chakka, Sébastien Marcel |
Motion-based counter-measures to photo attacks in face recognition. |
IET Biom. |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Neha Gupta 0005, Ponnurangam Kumaraguru |
Exploration of gaps in Bitly's spam detection and relevant counter measures. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
19 | Belal Amro |
Mobile Agent Systems, Recent Security Threats and Counter Measures. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
19 | Sanchita Mal-Sarkar, Aswin Raghav Krishna, Anandaroop Ghosh, Swarup Bhunia |
Hardware trojan attacks in FPGA devices: threat analysis and effective counter measures. |
ACM Great Lakes Symposium on VLSI |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Claude Carlet, Sylvain Guilley |
Complementary Dual Codes for Counter-Measures to Side-Channel Attacks. |
ICMCTA |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Louis-François Pau |
Business and social evaluation of denial of service attacks of communications networks in view of scaling economic counter-measures. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
19 | Ivana Chingovska, J. Yang, Zhen Lei 0001, Dong Yi, Stan Z. Li, Olga Kähm, Christian Glaser, Naser Damer, Arjan Kuijper, Alexander Nouak, Jukka Komulainen, Tiago Freitas Pereira, Shubham Gupta, Shubham Khandelwal, Shubham Bansal, Ayush K. Rai, Tarun Krishna, Dushyant Goyal, Muhammad-Adeel Waris, Honglei Zhang, Iftikhar Ahmad 0001, Serkan Kiranyaz, Moncef Gabbouj, Roberto Tronci, Maurizio Pili, Nicola Sirena, Fabio Roli, Javier Galbally, Julian Fiérrez, Allan da Silva Pinto, Hélio Pedrini, W. S. Schwartz, Anderson Rocha 0001, André Anjos, Sébastien Marcel |
The 2nd competition on counter measures to 2D face spoofing attacks. |
ICB |
2013 |
DBLP DOI BibTeX RDF |
|
19 | K. Munivara Prasad, A. Rama Mohan Reddy, M. Ganesh Karthik |
Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots |
CoRR |
2012 |
DBLP BibTeX RDF |
|
19 | Swapan Purkait |
Phishing counter measures and their effectiveness - literature review. |
Inf. Manag. Comput. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Urs Hunkeler, James Colli-Vignarelli, Catherine Dehollain |
Effectiveness of GPS-jamming and counter-measures. |
ICL-GNSS |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Steffen Ortmann, Peter Langendörfer, Stephan Kornemann |
WiSec 2011 demo: demonstrating self-contained on-node counter measures for various jamming attacks in WSN. |
ACM SIGMOBILE Mob. Comput. Commun. Rev. |
2011 |
DBLP DOI BibTeX RDF |
|
19 | André Anjos, Sébastien Marcel |
Counter-measures to photo attacks in face recognition: A public database and a baseline. |
IJCB |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Murali Mohan Chakka, André Anjos, Sébastien Marcel, Roberto Tronci, Daniele Muntoni, Gianluca Fadda, Maurizio Pili, Nicola Sirena, Gabriele Murgia, Marco Ristori, Fabio Roli, Junjie Yan, Dong Yi, Zhen Lei 0001, Zhiwei Zhang, Stan Z. Li, William Robson Schwartz, Anderson Rocha 0001, Hélio Pedrini, Javier Lorenzo-Navarro, Modesto Castrillón Santana, Jukka Määttä, Abdenour Hadid, Matti Pietikäinen |
Competition on counter measures to 2-D facial spoofing attacks. |
IJCB |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Howard Li, Alexandru Popa 0002, Carl Thibault, Michael Trentini, Mae L. Seto |
A software framework for multi-agent control of multiple autonomous underwater vehicles for underwater mine counter-measures. |
AIS |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Thomas J. Schoepf |
Counter-Measures for Relay Failures due to Dynamic Welding: A Robust Engineering Design. |
IEICE Trans. Electron. |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Hongbin Kong, Gang Xue, Shaowen Yao 0001 |
Essence of Inconsistent Ontology and Counter Measures. |
DBTA |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay |
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
19 | In-Jung Kim, Cheol Won Lee, Eul-Gyu Im |
Changes of Cyber-Terrorism: Autonomous Terrors and Counter-Measures. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
autogenous terror, cyber terrorism, CERT, ISAC |
19 | Yihong Zhou, Dapeng Wu 0001, Scott Nettles |
On MAC-layer denial of service attacks in IEEE 802.11 ad hoc networks: analysis and counter measures. |
Int. J. Wirel. Mob. Comput. |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Frédéric Cuppens, Fabien Autrel, Yacine Bouzida, Joaquín García 0001, Sylvain Gombault, Thierry Sans |
Anti-correlation as a criterion to select appropriate counter-measures in an intrusion detection framework. |
Ann. des Télécommunications |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Zhimin Huang, Shuqin Cai |
Developing Medium and Small Technological Enterprises in China: Informatization Issues and Counter-Measures. |
Int. J. Enterp. Inf. Syst. |
2005 |
DBLP DOI BibTeX RDF |
|
19 | David A. J. Pearce, Alister G. Burr, Timothy C. Tozer |
Capacity of TDMA cellular systems with slow Rayleigh fading counter-measures. |
PIMRC |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Les Labuschagne, Jan H. P. Eloff |
Activating dynamic counter measures to reduce risk. |
SEC |
1996 |
DBLP BibTeX RDF |
|
19 | Tony Ballardie, Jon Crowcroft |
Multicast-specific security threats and counter-measures. |
NDSS |
1995 |
DBLP DOI BibTeX RDF |
|
18 | Hua Wang, Yao Guo 0001, Xiangqun Chen |
DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet |
Silicon-level Solutions to Counteract Passive and Active Attacks. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Daniel Boteanu, Edouard Reich, José M. Fernandez 0001, John McHugh |
Implementing and testing dynamic timeout adjustment as a dos counter-measure. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
degradation of service, denial of service, SYN flood |
18 | Mohamed Abdelhafez, George F. Riley, Robert G. Cole, Nam Phamdo |
Modeling and Simulations of TCP MANET Worms. |
PADS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Ryad Benadjila, Olivier Billet, Stanislas Francfort |
Drm to counter side-channel attacks? |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
white-box, AES, side-channel attacks, DRM |
18 | Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won |
Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
Damage Propagation, Information Security control system (ISMS), Forecast, Intrusion, Weather Forecasting |
15 | Pierre-Marc Bureau, José M. Fernandez 0001 |
Optimising Networks Against Malware. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Yannick Monnet, Marc Renaudin, Régis Leveugle, Christophe Clavier, Pascal Moitrel |
Case Study of a Fault Attack on Asynchronous DES Crypto-Processors. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Colin D. Walter |
Longer Keys May Facilitate Side Channel Attacks. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem |
12 | Dongkook Park, Chrysostomos Nicopoulos, Jongman Kim, Narayanan Vijaykrishnan, Chita R. Das |
Exploring Fault-Tolerant Network-on-Chip Architectures. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Gergely Tóth, Zoltán Hornák |
Measuring Anonymity in a Non-adaptive, Real-Time System. |
Privacy Enhancing Technologies |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Sorina Dumitrescu, Xiaolin Wu 0001, Zhe Wang 0022 |
Detection of LSB Steganography via Sample Pair Analysis. |
Information Hiding |
2002 |
DBLP DOI BibTeX RDF |
|
9 | Florian Deissenboeck, Lars Heinemann, Benjamin Hummel, Elmar Jürgens |
Flexible architecture conformance assessment with ConQAT. |
ICSE (2) |
2010 |
DBLP DOI BibTeX RDF |
|
9 | Matt Webster, Grant Malcolm |
Detection of metamorphic and virtualization-based malware using algebraic specification. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Ying-Wei Kuo, Shou-Hsuan Stephen Huang |
Detecting Stepping-Stone Connection Using Association Rule Mining. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Fabio Tango, Marco Botta |
Evaluation of Distraction in a Driver-Vehicle-Environment Framework: An Application of Different Data-Mining Techniques. |
ICDM |
2009 |
DBLP DOI BibTeX RDF |
Adaptive-Network-based Fuzzy Inference System, Neural Networks, Machine Learning, Fuzzy Logic, Distraction, Traffic Safety |
9 | Michael Klafft, Tobias Kräntzer, Ulrich Meissen, Agnès Voisard |
Early warning systems in practice: performance of the SAFE system in the field. |
GIS |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, actuators, alerting, early warning systems, domotics |
9 | Milosz Marian Hulboj, Ryszard Erazm Jurga |
CERN Investigation of Network Behaviour and Anomaly Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, computer networks, network monitoring, packet sampling |
9 | John Black, Martin Cochran |
MAC Reforgeability. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Message Authentication Codes, Birthday Attacks |
9 | Ilya Kizhvatov |
Side channel analysis of AVR XMEGA crypto engine. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
cryptography, DPA, side channel analysis |
9 | Werner Schindler, Colin D. Walter |
Optimal Recovery of Secret Keys from Weak Side Channel Traces. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
power analysis, Side channel leakage, optimal strategy |
9 | Hailun Tan, Diethelm Ostry, John Zic, Sanjay K. Jha |
A confidential and DoS-resistant multi-hop code dissemination protocol for wireless sensor networks. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
code dissemination protocols, sensor network security, broadcast authentication, code distribution |
9 | Aurélien Francillon, Claude Castelluccia |
Code injection attacks on harvard-architecture devices. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
harvard architecture, return oriented programming, wireless sensor networks, buffer overflow, embedded devices, computer worms, code injection attacks, gadgets |
9 | Gene Tsudik |
Confronting a mobile adversary in unattended sensor networks. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Marek Ostaszewski, Pascal Bouvry, Franciszek Seredynski |
Adaptive and dynamic intrusion detection by means of idiotypic networks paradigm. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Lothar Fickert, Helmut Malleck, Christian Wakolbinger |
Challenges Concerning the Energy-Dependency of the Telecom Infrastructure. |
CRITIS |
2008 |
DBLP DOI BibTeX RDF |
interdependencies power and information infrastructure, decentralized generation, islanded operation, sensitivity analysis, smart grid, Blackouts |
9 | Kanglin Gao, Mei Dong, Shihu An |
To Accelerate the Establishment of IT Practical Teaching Teams and the Environment in Colleges and Universities. |
CSSE (5) |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Roberto Di Cosmo, Stefano Zacchiroli, Paulo Trezentos |
Package Upgrades In FOSS Distributions: Details And Challenges. |
HotSWUp |
2008 |
DBLP DOI BibTeX RDF |
FOSS, distribution, packages, rollback, upgrade |
9 | Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Luca Breveglieri, Paolo Ienne, Israel Koren |
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. |
DFT |
2008 |
DBLP DOI BibTeX RDF |
|
9 | Colin D. Walter |
Recovering Secret Keys from Weak Side Channel Traces of Differing Lengths. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
Hidden Markov Models, simple power analysis, SPA, Viterbi Algorithm, Forward-Backward Algorithm, Side channel leakage |
9 | Huijuan Yang, Alex ChiChung Kot |
Pattern-Based Data Hiding for Binary Image Authentication by Connectivity-Preserving. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Steven Daniel Webb, Sieteng Soh |
Cheating in networked computer games: a review. |
DIMEA |
2007 |
DBLP DOI BibTeX RDF |
networked computer games, peer-to-peer, client/server, cheating |
9 | Masaomi Kimura, Kouji Tatsuno, Toshiharu Hayasaka, Yuta Takahashi, Tetsuro Aoto, Michiko Ohkura, Fumito Tsuchiya |
The Analysis of Near-Miss Cases Using Data-Mining Approach. |
HCI (4) |
2007 |
DBLP DOI BibTeX RDF |
Safety in drug use, data mining, text mining |
9 | Attila Ondi, Richard Ford |
Modeling malcode with Hephaestus: beyond simple spread. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
Hephaestus, code-red, virus-spread simulation |
9 | Johann Barbier, Kichenakoumar Mayoura |
Steganalysis of Multi Bit Plane Image Steganography. |
IWDW |
2007 |
DBLP DOI BibTeX RDF |
Multi bit plane image steganography, Fisher discriminant, RS steganalysis |
Displaying result #1 - #100 of 128 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|