Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
84 | James Bret Michael |
On the Response Policy of Software Decoys: Conducting Software-Based Deception in the Cyber Battlespace. |
COMPSAC |
2002 |
DBLP DOI BibTeX RDF |
|
75 | Tobin Jackson, Delbert Hart |
Data decoys for confidentiality in a distributed computation: matrix multiplication. |
ACM Southeast Regional Conference |
2004 |
DBLP DOI BibTeX RDF |
data decoys, distributed computation, confidentiality |
59 | Marco Vassura, Luciano Margara, Piero Fariselli, Rita Casadio |
A Graph Theoretic Approach to Protein Structure Selection. |
WILF |
2007 |
DBLP DOI BibTeX RDF |
|
59 | Ko-Hsin Liang, Kuei-Ming Wang |
Using simulation and evolutionary algorithms to evaluate the design of mix strategies of decoy and jammers in anti-torpedo tactics. |
WSC |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo |
Automating the injection of believable decoys to detect snooping. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
decoys, honeyflow, honeytoken, trap-based defense, deception, traffic generation |
40 | Yaohang Li |
A Population-Based Approach for Diversified Protein Loop Structure Sampling. |
ICCS (1) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Martin Paluszewski, Pawel Winter |
Protein Decoy Generation Using Branch and Bound with Efficient Bounding. |
WABI |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Hetunandan Kamisetty, Eric P. Xing, Christopher James Langmead |
Free Energy Estimates of All-Atom Protein Structures Using Generalized Belief Propagation. |
RECOMB |
2007 |
DBLP DOI BibTeX RDF |
Decoy Detection, Protein Structure, Probabilistic Graphical Models, Free Energy |
40 | Dimitris Gavrilis, Ioannis Chatzis, Evangelos Dermatas |
Flash Crowd Detection Using Decoy Hyperlinks. |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Nicolas Christin, Andreas S. Weigend, John Chuang |
Content availability, pollution and poisoning in file sharing peer-to-peer networks. |
EC |
2005 |
DBLP DOI BibTeX RDF |
peer-to-peer networks, file sharing, content protection |
31 | R. Rajgaria, Scott R. McAllister, Christodoulos A. Floudas |
Distance Dependent Protein Force Field via Linear Optimization. |
Encyclopedia of Optimization |
2009 |
DBLP DOI BibTeX RDF |
Potential model, High resolution decoys, Protein design potential, Protein structure prediction, Force field, Linear optimization |
25 | Huy Quang Ngo, Mingyu Guo, Hung X. Nguyen |
Optimizing Cyber Response Time on Temporal Active Directory Networks Using Decoys. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Maytha Alshammari, Jing He 0002, Willy Wriggers |
AlphaFold2 Model Refinement Using Structure Decoys. |
BCB |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Senmiao Wang, Hua Zhang 0001, Su-Juan Qin, Wenmin Li 0001, Tengfei Tu, Ana Shen, Wentao Liu |
KRProtector: Detection and Files Protection for IoT Devices on Android Without ROOT Against Ransomware Based on Decoys. |
IEEE Internet Things J. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Jalaj Pateria, Laxmi Ahuja, Subhranil Som |
Critical Path to Place Decoys in Deception Biota. |
Int. J. Perform. Eng. |
2022 |
DBLP DOI BibTeX RDF |
|
25 | Reed M. Stein, Ying Yang, Trent E. Balius, Matt J. O'Meara, Jiankun Lyu, Jennifer Young, Khanh G. Tang, Brian K. Shoichet, John J. Irwin |
Property-Unmatched Decoys in Docking Benchmarks. |
J. Chem. Inf. Model. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Gennady M. Verkhivker, Steve Agajanian, Deniz Yasar Oztas, Grace Gupta |
Allosteric Control of Structural Mimicry and Mutational Escape in the SARS-CoV-2 Spike Protein Complexes with the ACE2 Decoys and Miniprotein Inhibitors: A Network-Based Approach for Mutational Profiling of Binding and Signaling. |
J. Chem. Inf. Model. |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Tony A. Wood, Mitchell Khoo, Elad Michael, Chris Manzie, Iman Shames |
Temporal Logic Planning for Minimum-Time Positioning of Multiple Threat-Seduction Decoys. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
25 | Palvi Aggarwal, Yinuo Du, Kuldeep Singh 0005, Cleotilde Gonzalez |
Decoys in Cybersecurity: An Exploratory Study to Test the Effectiveness of 2-sided Deception. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
25 | Xiaoguang Wang, Xiaoping Wang, Xiaoben Lei, Guanghui Gao, Jun Du |
Research on Fire Control Modeling Problems of UAV Swarms' Air Combat Under the Decoys Influence. |
ICCAIS |
2021 |
DBLP DOI BibTeX RDF |
|
25 | Yang Young Lu, Wenbo Guo 0002, Xinyu Xing, William Stafford Noble |
DANCE: Enhancing saliency maps using decoys. |
ICML |
2021 |
DBLP BibTeX RDF |
|
25 | Abiodun Esther Omolara, Aman Jantan, Oludare Isaac Abiodun, Humaira Arshad, Kemi Victoria Dada, Etuh Emmanuel |
HoneyDetails: A prototype for ensuring patient's information privacy and thwarting electronic health record threats based on decoys. |
Health Informatics J. |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Jingjing Zhang, Zhiqiang Hao, Shuwei Yin, Guanglin Li 0003 |
GreenCircRNA: a database for plant circRNAs that act as miRNA decoys. |
Database J. Biol. Databases Curation |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Julius Ibenthal, Luc Meyer, Hélène Piet-Lahanier, Michel Kieffer |
Target search and tracking using a fleet of UAVs in presence of decoys and obstacles. |
CDC |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Supravat Dey, Abhyudai Singh |
Propagation of stochastic gene expression in the presence of decoys. |
CDC |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Mohammad Sujan Miah, Marcus Gutierrez, Oscar Veliz, Omkar Thakoor, Christopher Kiekintveld |
Concealing Cyber-Decoys using Two-Sided Feature Deception Games. |
HICSS |
2020 |
DBLP BibTeX RDF |
|
25 | Tatiana R. Ringenberg, Julia Taylor Rayz, Kathryn C. Seigfried-Spellar |
Using Fuzzy Sets to Assess Differences in Online Grooming Conversations with Victims, Decoys, and Law Enforcement. |
NAFIPS |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Jonathan Voris, Yingbo Song, Malek Ben Salem 0001, Shlomo Hershkop, Salvatore J. Stolfo |
Active authentication using file system decoys and user behavior modeling: results of a large scale study. |
Comput. Secur. |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Iman Shames, Anna Dostovalova, Jijoong Kim, Hatem Hmam |
Task allocation and motion control for threat-seduction decoys. |
CDC |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Tulha Al-Salah, Liang Hong, Sachin Shetty |
Attack Surface Expansion Using Decoys to Protect Virtualized Infrastructure. |
EDGE |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Michael D. Ekstrand, Vaibhav Mahant |
Sturgeon and the Cool Kids: Problems with Random Decoys for Top-N Recommender Evaluation. |
FLAIRS |
2017 |
DBLP BibTeX RDF |
|
25 | William M. Hedgcock, Raghunath Singh Rao, Haipeng (Allan) Chen |
Choosing to Choose: The Effects of Decoys and Prior Choice on Deferral. |
Manag. Sci. |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Haiyou Deng, Ya Jia, Yang Zhang 0040 |
3DRobot: automated generation of diverse and well-packed protein structure decoys. |
Bioinform. |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Julien Audiffren, Liva Ralaivola |
Indistinguishable Bandits Dueling with Decoys on a Poset. |
CoRR |
2016 |
DBLP BibTeX RDF |
|
25 | Milad Nasr, Amir Houmansadr |
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory. |
CCS |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Jinyang Yan, Yonggang Lu, Jing He 0002 |
Selecting near-native structures from decoys using maximal cliques. |
BIBM |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Mahendra Awale, Jean-Louis Reymond |
Similarity Mapplet: Interactive Visualization of the Directory of Useful Decoys and ChEMBL in High Dimensional Chemical Spaces. |
J. Chem. Inf. Model. |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Jan Gugenheimer, Alexander De Luca, Hayato Hess, Stefan Karg, Dennis Wolf 0002, Enrico Rukzio |
ColorSnakes: Using Colored Decoys to Secure Authentication in Sensitive Contexts. |
MobileHCI |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis |
Computational Decoys for Cloud Security. |
Secure Cloud Computing |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Fenghua He, Long Wang 0009, Longbiao Ma, Silun Zhang |
Guidance law design for intercepting a target with multiple decoys. |
ICCA |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Zhongyang Zheng, Junzhi Li, Jie Li 0012, Ying Tan 0002 |
Avoiding decoys in multiple targets searching problems using swarm robotics. |
IEEE Congress on Evolutionary Computation |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Amir Houmansadr, Edmund L. Wong, Vitaly Shmatikov |
No Direction Home: The True Cost of Routing Around Decoys. |
NDSS |
2014 |
DBLP BibTeX RDF |
|
25 | Ville Mattila, Kai Virtanen, Lasse Muttilainen, Juha Jylhä, Ville Väisänen |
Optimizing locations of decoys for protecting surface-based radar against anti-radiation missile with multi-objective ranking and selection. |
WSC |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Gregory Levitin, Kjell Hausken |
Defence resource distribution between protection and decoys for constant resource stockpiling pace. |
J. Oper. Res. Soc. |
2013 |
DBLP DOI BibTeX RDF |
|
25 | James B. Dunbar Jr., Richard D. Smith, Kelly L. Damm-Ganamet, Aqeel Ahmed, Emilio Xavier Esposito, James Delproposto, Krishnapriya Chinnaswamy, You-Na Kang, Ginger Kubish, Jason E. Gestwicki, Jeanne A. Stuckey, Heather A. Carlson |
CSAR Data Set Release 2012: Ligands, Affinities, Complexes, and Docking Decoys. |
J. Chem. Inf. Model. |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Paola Carrillo-Bustamante, Can Kesmir, Rob J. De Boer |
Virus Encoded MHC-Like Decoys Diversify the Inhibitory KIR Repertoire. |
PLoS Comput. Biol. |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Francois Berenger, Rojan Shrestha, Yong Zhou, David Simoncini, Kam Y. J. Zhang |
Durandal: Fast exact clustering of protein decoys. |
J. Comput. Chem. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Shuai Cheng Li 0001, Dongbo Bu, Ming Li 0001 |
Clustering 100, 000 Protein Structure Decoys in Minutes. |
IEEE ACM Trans. Comput. Biol. Bioinform. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. Prabhu, Angelos D. Keromytis, Salvatore J. Stolfo |
A system for generating and injecting indistinguishable network decoys. |
J. Comput. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Young Hee Park, Salvatore J. Stolfo |
Software decoys for insider threat. |
AsiaCCS |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Max Schuchard, John Geddes, Christopher Thompson 0002, Nicholas Hopper |
Routing around decoys. |
CCS |
2012 |
DBLP DOI BibTeX RDF |
|
25 | Bin Rao, Shunping Xiao, XueSong Wang 0003 |
Joint tracking and discrimination of exoatmospheric active decoys using nine-dimensional parameter-augmented EKF. |
Signal Process. |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Pralay Mitra, Debnath Pal |
Using correlated parameters for improved ranking of protein-protein docking decoys. |
J. Comput. Chem. |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Steven K. Burger, David C. Thompson 0002, Paul W. Ayers |
Quantum Mechanics/Molecular Mechanics Strategies for Docking Pose Refinement: Distinguishing between Binders and Decoys in Cytochrome c Peroxidase. |
J. Chem. Inf. Model. |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Izhar Wallach, Navdeep Jaitly, Kong T. Nguyen, Matthieu Schapira, Ryan H. Lilien |
Normalizing Molecular Docking Rankings using Virtually Generated Decoys. |
J. Chem. Inf. Model. |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Francois Berenger, Yong Zhou, Rojan Shrestha, Kam Y. J. Zhang |
Entropy-accelerated exact clustering of protein decoys. |
Bioinform. |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Siv Midtun Hollup, Michael I. Sadowski, Inge Jonassen, William R. Taylor |
Exploring the limits of fold discrimination by structural alignment: A large scale benchmark using decoys of known fold. |
Comput. Biol. Chem. |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis |
Detecting Traffic Snooping in Tor Using Decoys. |
RAID |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Jingfen Zhang, Dong Xu |
Fast Algorithm for Clustering a Large Number of Protein Structural Decoys. |
BIBM |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Wen-feng Dong, Quan Liu, Zhong-kuan Cheng, Zi-kai Pan |
The Deceptive Effect of Blinking Decoys on ARMs. |
ICAIC (1) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Zelong Wang, Fengxia Yan, Feng He 0001, Jubo Zhu |
Missile target automatic recognition from its decoys based on image time-series. |
Pattern Recognit. |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Nobuyuki Uchikoga, Takatsugu Hirokawa |
Analysis of protein-protein docking decoys using interaction fingerprints: application to the reconstruction of CaM-ligand complexes. |
BMC Bioinform. |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Shuai Cheng Li 0001, Yen Kaow Ng |
Calibur: a tool for clustering large numbers of protein decoys. |
BMC Bioinform. |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Dengguo Wei, Hao Zheng, Naifang Su, Minghua Deng, Luhua Lai |
Binding Energy Landscape Analysis Helps to Discriminate True Hits from High-Scoring Decoys in Virtual Screening. |
J. Chem. Inf. Model. |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo |
BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. |
RAID |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Michael Levit, Shuangyu Chang, Bruce Buntschuh |
Garbage modeling with decoys for a sequential recognition scenario. |
ASRU |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Jui-Hua Hsieh, Xiang S. Wang, Denise G. Teotico, Alexander Golbraikh, Alexander Tropsha |
Differentiation of AmpC beta-lactamase binders vs. decoys using classification k NN QSAR modeling and application of the QSAR classifier to virtual screening. |
J. Comput. Aided Mol. Des. |
2008 |
DBLP DOI BibTeX RDF |
|
25 | K. R. Akhil, Debasish Ghose, S. Koteswara Rao |
Optimizing deployment of multiple decoys to enhance ship survivability. |
ACC |
2008 |
DBLP DOI BibTeX RDF |
|
25 | S. M. Akramus Salehin, Neco Ventura |
Blocking Unsolicited Voice Calls Using Decoys for the IMS. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Jonathan White, Dale Thompson |
Using Synthetic Decoys to Digitally Watermark Personally-Identifying Data and to Promote Data Security. |
Security and Management |
2006 |
DBLP BibTeX RDF |
|
25 | Hongzhi Li, Yaoqi Zhou |
SCUD: Fast structure clustering of decoys using reference state to remove overall rotation. |
J. Comput. Chem. |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Kevin Walsh, Emin Gün Sirer |
Fighting peer-to-peer SPAM and decoys with object reputation. |
P2PECON@SIGCOMM |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Chaok Seok, J. Ben Rosen, John D. Chodera, Ken A. Dill |
MOPED: Method for optimizing physical energy parameters using decoys. |
J. Comput. Chem. |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Gilad Zlotkin, Jeffrey S. Rosenschein |
The Case of the Lying Postman: Decoys and Deception in Negotiation. |
Ann. Math. Artif. Intell. |
1993 |
DBLP DOI BibTeX RDF |
|
25 | A. Hershaft |
Effectiveness of Imperfect Decoys. |
Oper. Res. |
1968 |
DBLP DOI BibTeX RDF |
|
25 | Laurence E. Fogarty, Robert M. Howe |
Analog simulation of the re-entry of a ballistic missile warhead and multiple decoys. |
AFIPS Spring Joint Computing Conference |
1962 |
DBLP DOI BibTeX RDF |
|
20 | Lingli Deng, Yeping He, Ziyao Xu |
Trusted Reputation Management Service for Peer-to-Peer Collaboration. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
data integrity, virtual machine, P2P, trusted computing, reputation management |
20 | Lingli Deng, Yeping He, Ziyao Xu |
Service Authenticity in P2P File-Sharing. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Paul Dunphy, James Nicholson, Patrick Olivier |
Securing passfaces for description. |
SOUPS |
2008 |
DBLP DOI BibTeX RDF |
passfaces, graphical passwords, description |
20 | Michael O'Leary, Shiva Azadegan, Jay Lakhani |
Development of a Honeynet Laboratory: a Case Study. |
SNPD |
2006 |
DBLP DOI BibTeX RDF |
computer security, Honeynets, security education |
20 | Carlos A. M. Del Carpio, Eiichiro Ichiishi, Michihisa Koyama, Momoji Kubo, Akira Miyamoto |
A Flexibility Index for Analysis of Bio-molecular Complexes. |
IJCNN |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Xinwen Fu, Wei Yu 0002, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham |
On Recognizing Virtual Honeypots and Countermeasures. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
20 | J. Khurshid, Hong Bing-Rong |
Military robots - a glimpse from today and tomorrow. |
ICARCV |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Thomas Herges, Alexander Schug, Wolfgang Wenzel |
Protein Structure Prediction with Stochastic Optimization Methods: Folding and Misfolding the Villin Headpiece. |
ICCSA (3) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Li Zou, Mostafa H. Ammar |
A File-Centric Model for Peer-to-Peer File Sharing Systems. |
ICNP |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Mark Pesses, John Tan, Ryan Hash, Robert Swartz |
Simulation of LWIR Polarimetric Observations of Space Objects. |
AIPR |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Adam Liwo, Jaroslaw Pillardy, Cezary Czaplewski, Jooyoung Lee 0002, Daniel R. Ripoll, Malgorzata Groth, Sylwia Rodziewicz-Motowidlo, Rajmund Kazmierkiewicz, Ryszard J. Wawak, Stanislaw Oldziej, Harold A. Scheraga |
UNRES: a united-residue force field for energy-based prediction of protein structure - orgin and significance of multibody terms. |
RECOMB |
2000 |
DBLP DOI BibTeX RDF |
|