Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jeff Yan, Pook Leong Cho |
Enhancing Collaborative Spam Detection with Bloom Filters. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Aggelos Kiayias, Michael Korman, David Walluck |
An Internet Voting System Supporting User Privacy. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Gehani, Surendar Chandra |
PAST: Probabilistic Authentication of Sensor Timestamps. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Peter G. Neumann |
Risks of Untrustworthiness. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kun Bai, Peng Liu 0005 |
Towards Database Firewall: Mining the Damage Spreading Patterns. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dixie B. Baker |
Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson |
A Framework for a Collaborative DDoS Defense. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Dinei A. F. Florêncio, Cormac Herley |
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Boniface Hicks, Kiyan Ahmadizadeh, Patrick D. McDaniel |
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Guanhua Yan, Stephan J. Eidenbenz |
Bluetooth Worms: Models, Dynamics, and Defense Implications. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Wei Yu 0002, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao 0001 |
On Detecting Camouflaging Worm. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua |
Java for Mobile Devices: A Security Study. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Weidong Cui, Randy H. Katz, Wai-tian Tan |
Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger |
Strengthening Software Self-Checksumming via Self-Modifying Code. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Speaker Biographies. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA |
ACSAC |
2005 |
DBLP BibTeX RDF |
|
1 | Paul A. Karger |
Multi-Level Security Requirements for Hypervisors. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jun Li 0001, Xun Kang |
mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Gaurav S. Kc, Angelos D. Keromytis |
e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck |
The Pump: A Decade of Covert Fun. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Wesam Lootah, William Enck, Patrick D. McDaniel |
TARP: Ticket-based Address Resolution Protocol. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Tutorial Committee. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Fareed Zaffar, Gershon Kedem, Ashish Gehani |
Paranoid: A Global Secure File Access Control System. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zhenkai Liang, R. Sekar 0001 |
Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn |
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Copyright. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Stig Andersson, Andrew J. Clark, George M. Mohay, Bradley L. Schatz, Jacob Zimmermann |
A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen |
Uniform Application-level Access Control Enforcement of Organizationwide Policies. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Amit Vasudevan, Ramesh Yerraballi |
Stealth Breakpoints. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Paul Ammann, Joseph Pamula, Julie A. Street, Ronald W. Ritchey |
A Host-Based Approach to Network Attack Chaining Analysis. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David Elliott Bell |
Looking Back at the Bell-La Padula Model. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
How Does Information Assurance R&D Impact Information Assurance in Practice? Follow the money - Where does it Go - What is our ROI? |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Brian D. Snow |
We Need Assurance! |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Anas Abou El Kalam, Yves Deswarte |
Privacy Requirements Implemented with a JavaCard. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yongzheng Wu, Roland H. C. Yap |
A User-level Framework for Auditing and Monitoring. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Steven Noel, Sushil Jajodia |
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Yiru Li, Anil Somayaji |
Securing Email Archives through User Modeling. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | John P. Jones, Daniel F. Berger, Chinya V. Ravishankar |
Layering Public Key Distribution Over Secure DNS using Authenticated Delegation. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Fanglu Guo, Yang Yu, Tzi-cker Chiueh |
Automated and Safe Vulnerability Assessment. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Program Committee. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Meng Yu 0001, Wanyu Zang, Peng Liu 0005 |
Defensive Execution of Transactional Processes against Attacks. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ramaswamy Chandramouli, Scott Rose |
An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sundararaman Jeyaraman, Umut Topkara |
Have the cake and eat it too - Infusing usability into text-password based authentication systems. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David A. Wheeler |
Countering Trusting Trust through Diverse Double-Compiling. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Robin Sommer, Vern Paxson |
Exploiting Independent State For Network Intrusion Detection. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Vivek Haldar, Deepak Chandra, Michael Franz |
Dynamic Taint Propagation for Java. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali |
Intrusion Detection in RBAC-administered Databases. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Message from Conference Chair. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Paul Rubel, Michael Ihde, Steven A. Harp, Charles N. Payne |
Generating Policies for Defense in Depth. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga |
Replay Attack in TCG Specification and Solution. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | David Whyte, Paul C. van Oorschot, Evangelos Kranakis |
Detecting Intra-enterprise Scanning Worms based on Address Resolution. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Title Page. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jason Waddle, David A. Wagner 0001 |
Fault Attacks on Dual-Rail Encoded Systems. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | John Black, Martin Cochran, Ryan W. Gardner |
Lessons Learned: A Security Analysis of the Internet Chess Club. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Conference Committee. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jennifer Chong, Partha P. Pal, Michael Atighetchi, Paul Rubel, Franklin Webber |
Survivability Architecture of a Mission Critical System: The DPASA Example. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sara Sinclair, Sean W. Smith |
PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood |
Evolving Successful Stack Overflow Attacks for Vulnerability Testing. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Norman Feske, Christian Helmuth |
A Nitpicker's guide to a minimal-complexity secure GUI. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mary Ellen Zurko |
User-Centered Security: Stepping Up to the Grand Challenge. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Corrado Leita, Ken Mermoud, Marc Dacier |
ScriptGen: an automated script generation tool for honeyd. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov |
Highlights from the 2005 New Security Paradigms Workshop. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Reviewers. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dingbang Xu, Peng Ning |
Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Marla Collier |
How to Develop a Career in Information Assurance and How to Advance in this Field. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Schwarz, Hao Chen 0003, David A. Wagner 0001, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West |
Model Checking An Entire Linux Distribution for Security Violations. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Wei Wang 0266, Thomas E. Daniels |
Building Evidence Graphs for Network Forensics Analysis. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jingmin Zhou, Adam J. Carlson, Matt Bishop |
Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen |
Graphical Passwords: A Survey. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Rennie deGraaf, John Aycock, Michael J. Jacobson Jr. |
Improved Port Knocking with Strong Authentication. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jan Jürjens |
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sandeep Kumar, Terence Sim, Rajkumar Janakiraman, Sheng Zhang 0007 |
Using Continuous Biometric Verification to Protect Interactive Login Sessions. |
ACSAC |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA |
ACSAC |
2004 |
DBLP BibTeX RDF |
|
1 | Tzi-cker Chiueh, Dhruv Pilania |
Design, Implementation, and Evaluation of A Repairable Database Management System. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian |
Open-Source Applications of TCPA Hardware. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Krügel, William K. Robertson, Giovanni Vigna |
Detecting Kernel-Level Rootkits Through Binary Analysis. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Guofei Gu, Monirul Islam Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley |
Worm Detection, Early Warning and Response Based on Local Victim Information. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala |
Static Analyzer of Vicious Executables (SAVE). |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Mudhakar Srivatsa, Ling Liu 0001 |
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya |
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy 0001, Tudor Leu |
A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Steven B. Lipner |
The Trustworthy Computing Security Development Lifecycle. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Dick Brackney, Terrance Goan, Allen Ott, Lockheed Martin |
The Cyber Enemy Within ... Countering the Threat from Malicious Insiders. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
Mohammad A. Al-Kahtani, Ravi Sandhu. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Sye Loong Keoh, Emil Lupu, Morris Sloman |
PEACE: A Policy-Based Establishment of Ad-hoc Communities. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Ezedin Barka, Ravi S. Sandhu |
Role-Based Delegation Model/ Hierarchical Roles (RBDM1). |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves |
Reasoning About Complementary Intrusion Evidence. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. Smetters |
Securing a Remote Terminal Application with a Mobile Trusted Device. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé |
A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Marshall D. Abrams |
The Relationship of System & Product Specifications and Evaluations. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Carla Marceau, Simon N. Foley |
Themes and Highlights of the New Security Paradigms Workshop 2004. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Julie Thorpe, Paul C. van Oorschot |
Towards Secure Design Choices for Implementing Graphical Passwords. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. Memon |
Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuji Yamaoka |
Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Steven M. Bellovin |
A Look Back at "Security Problems in the TCP/IP Protocol Suite". |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Emilie Lundin Barse, Erland Jonsson |
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Neil C. Rowe |
Designing Good Deceptions in Defense of Information Systems. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya |
Security Policies to Mitigate Insider Threat in the Document Control Domain. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer |
An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Nathanael Paul, David Evans 0001 |
.NET Security: Lessons Learned and Missed from Java. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|