Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Amit Purohit, Vishnu Navda, Tzi-cker Chiueh |
Tracing the Root of "Rootable" Processes. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Haizhi Xu, Wenliang Du, Steve J. Chapin |
Detecting Exploit Code Execution in Loadable Kernel Modules. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ajay Gupta 0002, Daniel C. DuVarney |
Using Predators to Combat Worms and Viruses: A Simulation-Based Study. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Steven Noel, Eric Robertson 0001, Sushil Jajodia |
Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xinzhou Qin, Wenke Lee |
Attack Plan Recognition and Prediction Using Causal Networks. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | J. J. Brennan, Mindy Rudell, Donald B. Faatz, Carson Zimmerman |
Visualizing Enterprise-Wide Security (VIEWS). |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jingyu Zhou, Giovanni Vigna |
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kalyan S. Perumalla, Srikanth Sundaragopalan |
High-Fidelity Modeling of Computer Network Worms. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Dingbang Xu, Peng Ning |
Alert Correlation through Triggering Events and Common Resources. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Shai Rubin, Somesh Jha, Barton P. Miller |
Automatic Generation and Analysis of NIDS Attacks. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Zhuowei Li 0001, Amitabha Das |
Visualizing and Identifying Intrusion Context from System Calls Trace. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Marvin Schaefer |
If A1 is the Answer, What was the Question? An Edgy Na?f's Retrospective on Promulgating the Trusted Computer Systems Evaluation Criteria. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ninghui Li, John C. Mitchell, Derrick Tong |
Securing Java RMI-Based Distributed Applications. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Fu-Hau Hsu, Tzi-cker Chiueh |
CTCP: A Transparent Centralized TCP/IP Architecture for Network Security. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Hailin Wu, Andrew Burt, Ramki Thurimella |
Making Secure TCP Connections Resistant to Server Failures. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Patrick M. Widener, Karsten Schwan, Fabián E. Bustamante |
Differential Data Protection for Dynamic Distributed Application. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Eugene H. Spafford |
A Failure to Learn from the Past. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Ramaswamy Chandramouli |
A Policy Validation Framework for Enterprise Authorization Specification. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Holger Peine, Reinhard Schwarz |
A Multi-View Tool for Checking the Security Semantics of Router Configurations. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Lance Spitzner |
Honeypots: Catching the Insider Threat. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Cuppens, Alexandre Miège |
Modelling Contexts in the Or-BAC Model. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti |
How to unwittingly sign non-repudiable documents with Java applications. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Peter G. Neumann, Richard J. Feiertag |
PSOS Revisited. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Bruschi, A. Ornaghi, Emilia Rosti |
S-ARP: a Secure Address Resolution Protocol. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Kulesh Shanmugasundaram, Nasir D. Memon |
Automatic Reassembly of Document Fragments via Context Based Statistical Models. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi |
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Bayesian network based detection, Missed alarms, Intrusion detection, Event correlation, False alarms |
1 | Zhaole Chen, Moon-Chuen Lee |
An IP Traceback Technique against Denial-of-Service Attacks. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Meng Yu 0001, Peng Liu 0005, Wanyu Zang |
Multi-Version Attack Recovery for Workflow System. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Stephen D. Wolthusen |
Goalkeeper: Close-In Interface Protection. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn |
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Steven Noel, Sushil Jajodia, Brian O'Berry, Michael Jacobs 0001 |
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Scott E. Coull, Joel W. Branch, Boleslaw K. Szymanski, Eric Breimer |
Intrusion Detection: A Bioinformatics Approach. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Intrusion detection, bioinformatics, pattern matching, sequence alignment, masquerade detection |
1 | Jacob Zimmermann, Ludovic Mé, Christophe Bidan |
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Matthew M. Williamson |
Design, Implementation and Test of an Email Virus Throttle. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Iachello |
Protecting Personal Data: Can IT Security Management Standards Help? |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
personal data protection, IS17799, multilateral security, privacy, HIPAA, information security management |
1 | Christopher Krügel, Darren Mutz, William K. Robertson, Fredrik Valeur |
Bayesian Event Classification for Intrusion Detection. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Dirk Balfanz |
Usable Access Control for the World Wide Web. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Clark Weissman |
MLS-PCA: A High Assurance Security Architecture for Future Avionics. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Eric Bryant, James P. Early, Rajeev Gopalakrishna, Gregory Roth, Eugene H. Spafford, Keith Watson, Paul Williams, Scott Yost |
Poly2 Paradigm: A Secure Network Service Architecture. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Michael Clifford, Daniel Faigin, Matt Bishop, Tasneem G. Brutch |
Miracle Cures and Toner Cartridges: Finding Solutions to the Spam Problem. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Raj Mohan, Timothy E. Levin, Cynthia E. Irvine |
An Editor for Adaptive XML-Based Policy Management of IPsec. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tye Stallard, Karl N. Levitt |
Automated Analysis for Digital Forensic Science: Semantic Integrity Checking. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Zili Shao, Qingfeng Zhuge, Yi He 0001, Edwin Hsing-Mean Sha |
Defending Embedded Systems Against Buffer Overflow via Hardware/Software. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Darren Mutz, Giovanni Vigna, Richard A. Kemmerer |
An Experience Developing an IDS Stimulator for the Black-Box Testing of Network Intrusion Detection Systems. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Software Testing, Intrusion Detection, Traffic Generation, Evasion Attacks |
1 | Zhenkai Liang, V. N. Venkatakrishnan, R. Sekar 0001 |
Isolated Program Execution: An Application Transparent Approach for Executing Untrusted Programs. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Cristina L. Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou 0001, Kenneth E. Rowe |
Log Correlation for Intrusion Detection: A Proof of Concept. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | |
19th Annual Computer Security Applications Conference (ACSAC 2003), 8-12 December 2003, Las Vegas, NV, USA |
ACSAC |
2003 |
DBLP BibTeX RDF |
|
1 | Jeff Jianxin Yan |
Security Design in Online Games. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | James P. Early, Carla E. Brodley, Catherine Rosenberg |
Behavioral Authentication of Server Flows. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Groß 0001 |
Security Analysis of the SAML Single Sign-on Browser/Artifact Profile. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | O. Sami Saydjari, Carla Marceau |
Themes and Highlights of the New Security Paradigms Workshop 2003. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Xunhua Wang, Mohammad Hossain Heydari, Hua Lin |
An Intrusion-Tolerant Password Authentication System. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance |
1 | Nathan Carey, George M. Mohay, Andrew J. Clark |
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Emilie Lundin Barse, Håkan Kvarnström, Erland Jonsson |
Synthesizing Test Data for Fraud Detection Systems. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | David Carman, Daniel Coffin, Bruno Dutertre, Vipin Swarup, Ronald J. Watro |
Forum Session: Security for Wireless Sensor Networks. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | John Viega |
Practical Random Number Generation in Software. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson |
Scalable and Efficient PKI for Inter-Organizational Communication. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer |
A Stateful Intrusion Detection System for World-Wide Web Servers. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Security, World-Wide Web, Intrusion Detection |
1 | Frank Adelstein, Matthew Stillerman, Dexter Kozen |
Malicious Code Detection for Open Firmware. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Richard A. Kemmerer |
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
A Model for Attribute-Based User-Role Assignment. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Michael J. Covington, Prahlad Fogla, Zhiyuan Zhan, Mustaque Ahamad |
A Context-Aware Security Architecture for Emerging Applications. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Tuomas Aura, Michael Roe, Jari Arkko |
Security of Internet Location Management. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Florian P. Buchholz, Thomas E. Daniels, James P. Early, Rajeev Gopalakrishna, R. Patrick Gorman, Benjamin A. Kuperman, Sofie Nystrom, Addam Schroll, Andrew Smith |
Digging For Worms, Fishing For Answers. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Ronald W. Ritchey, Brian O'Berry, Steven Noel |
Representing TCP/IP Connectivity For Topological Analysis of Network Security. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Schmid, Frank Hill, Anup K. Ghosh |
Protecting Data from Malicious Software. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Matthew M. Williamson |
Throttling Viruses: Restricting propagation to defeat malicious mobile code. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Karl N. Levitt |
Intrusion Detection: Current Capabilities and Future Directions. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Paul A. Karger, Roger R. Schell |
Thirty Years Later: Lessons from the Multics Security Evaluation. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Dale M. Johnson |
Wireless Security: Vulnerabilities and Countermeasures. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Marcel Waldvogel |
GOSSIB vs. IP Traceback Rumors. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Axel Kern |
Advanced Features for Enterprise-Wide Role-Based Access Control. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Toth, Christopher Krügel |
Evaluating the Impact of Automated Intrusion Response Mechanisms. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | O. Sami Saydjari |
LOCK : An Historical Perspective. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Victoria Ungureanu |
Regulating E-Commerce through Certified Contracts. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Michael Weber, Matthew Schmid, Michael Schatz, David Geyer |
A Toolkit for Detecting and Analyzing Malicious Software. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Bogdan C. Popescu, Maarten van Steen, Andrew S. Tanenbaum |
A Security Architecture for Object-Based Distributed Systems. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Cristina Serban, O. Sami Saydjari |
Themes and Highlights of the New Security Paradigms Workshop 2002. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Michael Clifford |
Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Herbert Leitold, Arno Hollosi, Reinhard Posch |
Security Architecture of the Austrian Citizen Card Concept. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | John Haggerty, Qi Shi 0001, Madjid Merabti |
Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Duane Hybertson, A. Reedy, S. Chapin, M. Kirwan Jr. |
Enterprise Engineering And Security: Enterprise Frameworks and Architectures, and IA Patterns. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Malcolm Corney, Olivier Y. de Vel, Alison Anderson, George M. Mohay |
Gender-Preferential Text Mining of E-mail Discourse. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Andrew D. Marshall |
A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed NIST RBAC Standard. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Dustin Lee, Jeff Rowe, Calvin Ko, Karl N. Levitt |
Detecting and Defending against Web-Server Fingerprinting. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Daniel E. Geer Jr., John Harthorne |
Penetration Testing: A Duet. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Peng Liu 0005 |
Architectures for Intrusion Tolerant Database Systems. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | |
18th Annual Computer Security Applications Conference (ACSAC 2002), 9-13 December 2002, Las Vegas, NV, USA |
ACSAC |
2002 |
DBLP BibTeX RDF |
|
1 | Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas |
Controlled Physical Random Functions. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Hanno Langweg |
With Gaming Technology towards Secure User Interfaces. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Donghua Xu, Chenghuai Lu, André L. M. dos Santos |
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Mary Ellen Zurko, Charlie Kaufman, Katherine Spanbauer, Chuck Bassett |
Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With A Security Decision. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richard A. Kemmerer |
Composable Tools For Network Discovery and Security Analysis. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
Network Modeling and Analysis, Network Discovery and Validation, Network Security |
1 | John R. Douceur, Atul Adya, Josh Benaloh, William J. Bolosky, Gideon Yuval |
A Secure Directory Service based on Exclusive Encryption. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Schaad, Jonathan D. Moffett |
A Framework for Organisational Control Principles. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Weijiang Yu, Aloysius K. Mok |
Enforcing Resource Bound Safety for Mobile SNMP Agents. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Roberto Barbieri, Danilo Bruschi, Emilia Rosti |
Voice over IPsec: Analysis and Solutions. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Scott, Jack W. Davidson |
Safe Virtual Execution Using Software Dynamic Translation. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Probst, Wolfgang Eßmayr, Edgar R. Weippl |
Reusable Components for Developing Security-Aware Application. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Geetanjali Sampemane, Prasad Naldurg, Roy H. Campbell |
Access Control for Active Spaces. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|