The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jeff Yan, Pook Leong Cho Enhancing Collaborative Spam Detection with Bloom Filters. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Michael Korman, David Walluck An Internet Voting System Supporting User Privacy. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ashish Gehani, Surendar Chandra PAST: Probabilistic Authentication of Sensor Timestamps. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Peter G. Neumann Risks of Untrustworthiness. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kun Bai, Peng Liu 0005 Towards Database Firewall: Mining the Damage Spreading Patterns. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dixie B. Baker Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson A Framework for a Collaborative DDoS Defense. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dinei A. F. Florêncio, Cormac Herley KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Boniface Hicks, Kiyan Ahmadizadeh, Patrick D. McDaniel From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Guanhua Yan, Stephan J. Eidenbenz Bluetooth Worms: Models, Dynamics, and Defense Implications. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Wei Yu 0002, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao 0001 On Detecting Camouflaging Worm. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mourad Debbabi, Mohamed Mostafa Saleh, Chamseddine Talhi, Sami Zhioua Java for Mobile Devices: A Security Study. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Weidong Cui, Randy H. Katz, Wai-tian Tan Design and Implementation of an Extrusion-based Break-In Detector for Personal Computers. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jonathon T. Giffin, Mihai Christodorescu, Louis Kruger Strengthening Software Self-Checksumming via Self-Modifying Code. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Speaker Biographies. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 21st Annual Computer Security Applications Conference (ACSAC 2005), 5-9 December 2005, Tucson, AZ, USA Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  BibTeX  RDF
1Paul A. Karger Multi-Level Security Requirements for Hypervisors. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jun Li 0001, Xun Kang mSSL: Extending SSL to Support Data Sharing Among Collaborative Clients. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Gaurav S. Kc, Angelos D. Keromytis e-NeXSh: Achieving an Effectively Non-Executable Stack and Heap via System-Call Policing. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Myong H. Kang, Ira S. Moskowitz, Stanley Chincheck The Pump: A Decade of Covert Fun. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Wesam Lootah, William Enck, Patrick D. McDaniel TARP: Ticket-based Address Resolution Protocol. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Tutorial Committee. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Fareed Zaffar, Gershon Kedem, Ashish Gehani Paranoid: A Global Secure File Access Control System. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zhenkai Liang, R. Sekar 0001 Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ramón Cáceres, Ronald Perez, Stefan Berger, John Linwood Griffin, Leendert van Doorn Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Copyright. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Stig Andersson, Andrew J. Clark, George M. Mohay, Bradley L. Schatz, Jacob Zimmermann A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen Uniform Application-level Access Control Enforcement of Organizationwide Policies. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Amit Vasudevan, Ramesh Yerraballi Stealth Breakpoints. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Paul Ammann, Joseph Pamula, Julie A. Street, Ronald W. Ritchey A Host-Based Approach to Network Attack Chaining Analysis. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1David Elliott Bell Looking Back at the Bell-La Padula Model. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 How Does Information Assurance R&D Impact Information Assurance in Practice? Follow the money - Where does it Go - What is our ROI? Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Brian D. Snow We Need Assurance! Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Anas Abou El Kalam, Yves Deswarte Privacy Requirements Implemented with a JavaCard. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yongzheng Wu, Roland H. C. Yap A User-level Framework for Auditing and Monitoring. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Steven Noel, Sushil Jajodia Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yiru Li, Anil Somayaji Securing Email Archives through User Modeling. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1John P. Jones, Daniel F. Berger, Chinya V. Ravishankar Layering Public Key Distribution Over Secure DNS using Authenticated Delegation. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Fanglu Guo, Yang Yu, Tzi-cker Chiueh Automated and Safe Vulnerability Assessment. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Program Committee. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Meng Yu 0001, Wanyu Zang, Peng Liu 0005 Defensive Execution of Transactional Processes against Attacks. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ramaswamy Chandramouli, Scott Rose An Integrity Verification Scheme for DNS Zone file based on Security Impact Analysis. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sundararaman Jeyaraman, Umut Topkara Have the cake and eat it too - Infusing usability into text-password based authentication systems. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1David A. Wheeler Countering Trusting Trust through Diverse Double-Compiling. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Robin Sommer, Vern Paxson Exploiting Independent State For Network Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Vivek Haldar, Deepak Chandra, Michael Franz Dynamic Taint Propagation for Java. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Ashish Kamra, Evimaria Terzi, Athena Vakali Intrusion Detection in RBAC-administered Databases. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Message from Conference Chair. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Paul Rubel, Michael Ihde, Steven A. Harp, Charles N. Payne Generating Policies for Defense in Depth. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Danilo Bruschi, Lorenzo Cavallaro, Andrea Lanzi, Mattia Monga Replay Attack in TCG Specification and Solution. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1David Whyte, Paul C. van Oorschot, Evangelos Kranakis Detecting Intra-enterprise Scanning Worms based on Address Resolution. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Title Page. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jason Waddle, David A. Wagner 0001 Fault Attacks on Dual-Rail Encoded Systems. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1John Black, Martin Cochran, Ryan W. Gardner Lessons Learned: A Security Analysis of the Internet Chess Club. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Conference Committee. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jennifer Chong, Partha P. Pal, Michael Atighetchi, Paul Rubel, Franklin Webber Survivability Architecture of a Mission Critical System: The DPASA Example. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sara Sinclair, Sean W. Smith PorKI: Making User PKI Safe on Machines of Heterogeneous Trustworthiness. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hilmi Günes Kayacik, Nur Zincir-Heywood, Malcolm I. Heywood Evolving Successful Stack Overflow Attacks for Vulnerability Testing. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Norman Feske, Christian Helmuth A Nitpicker's guide to a minimal-complexity secure GUI. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mary Ellen Zurko User-Centered Security: Stepping Up to the Grand Challenge. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Corrado Leita, Ken Mermoud, Marc Dacier ScriptGen: an automated script generation tool for honeyd. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Simon N. Foley, Abe Singer, Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis, John P. McDermott, Julie Thorpe, Paul C. van Oorschot, Anil Somayaji, Richard Ford, Mark Bush, Alex Boulatov Highlights from the 2005 New Security Paradigms Workshop. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Reviewers. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dingbang Xu, Peng Ning Privacy-Preserving Alert Correlation: A Concept Hierarchy Based Approach. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Marla Collier How to Develop a Career in Information Assurance and How to Advance in this Field. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Benjamin Schwarz, Hao Chen 0003, David A. Wagner 0001, Jeremy Lin, Wei Tu, Geoff Morrison, Jacob West Model Checking An Entire Linux Distribution for Security Violations. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Wei Wang 0266, Thomas E. Daniels Building Evidence Graphs for Network Forensics Analysis. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jingmin Zhou, Adam J. Carlson, Matt Bishop Verify Results of Network Intrusion Alerts Using Lightweight Protocol Analysis. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xiaoyuan Suo, Ying Zhu 0001, G. Scott Owen Graphical Passwords: A Survey. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Rennie deGraaf, John Aycock, Michael J. Jacobson Jr. Improved Port Knocking with Strong Authentication. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jan Jürjens Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sandeep Kumar, Terence Sim, Rajkumar Janakiraman, Sheng Zhang 0007 Using Continuous Biometric Verification to Protect Interactive Login Sessions. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  BibTeX  RDF
1Tzi-cker Chiueh, Dhruv Pilania Design, Implementation, and Evaluation of A Repairable Database Management System. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian Open-Source Applications of TCPA Hardware. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Christopher Krügel, William K. Robertson, Giovanni Vigna Detecting Kernel-Level Rootkits Through Binary Analysis. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Guofei Gu, Monirul Islam Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley Worm Detection, Early Warning and Response Based on Local Victim Information. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala Static Analyzer of Vicious Executables (SAVE). Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mudhakar Srivatsa, Ling Liu 0001 Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy 0001, Tudor Leu A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Steven B. Lipner The Trustworthy Computing Security Development Lifecycle. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Dick Brackney, Terrance Goan, Allen Ott, Lockheed Martin The Cyber Enemy Within ... Countering the Threat from Malicious Insiders. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mohammad A. Al-Kahtani, Ravi S. Sandhu Mohammad A. Al-Kahtani, Ravi Sandhu. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Sye Loong Keoh, Emil Lupu, Morris Sloman PEACE: A Policy-Based Establishment of Ad-hoc Communities. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ezedin Barka, Ravi S. Sandhu Role-Based Delegation Model/ Hierarchical Roles (RBDM1). Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves Reasoning About Complementary Intrusion Evidence. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. Smetters Securing a Remote Terminal Application with a Mobile Trusted Device. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Marshall D. Abrams The Relationship of System & Product Specifications and Evaluations. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Carla Marceau, Simon N. Foley Themes and Highlights of the New Security Paradigms Workshop 2004. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Julie Thorpe, Paul C. van Oorschot Towards Secure Design Choices for Implementing Graphical Passwords. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. Memon Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuji Yamaoka Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Steven M. Bellovin A Look Back at "Security Problems in the TCP/IP Protocol Suite". Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Emilie Lundin Barse, Erland Jonsson Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Neil C. Rowe Designing Good Deceptions in Defense of Information Systems. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya Security Policies to Mitigate Insider Threat in the Document Control Domain. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Nathanael Paul, David Evans 0001 .NET Security: Lessons Learned and Missed from Java. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1001 - #1100 of 1667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license