The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (26) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (50) 1997 (54) 1998 (92) 1999 (127) 2000 (178) 2001 (306) 2002 (406) 2003 (624) 2004 (899) 2005 (1333) 2006 (1490) 2007 (1528) 2008 (1585) 2009 (1275) 2010 (673) 2011 (702) 2012 (813) 2013 (804) 2014 (989) 2015 (1073) 2016 (1206) 2017 (1461) 2018 (1759) 2019 (2206) 2020 (2727) 2021 (2982) 2022 (3370) 2023 (3864) 2024 (1050)
Publication types (Num. hits)
article(15280) book(15) data(11) incollection(195) inproceedings(19901) phdthesis(378) proceedings(22)
Venues (Conferences, Journals, ...)
CoRR(4079) IACR Cryptol. ePrint Arch.(1244) IEEE Access(507) RAID(446) CCS(308) IEEE Trans. Inf. Forensics Sec...(260) Comput. Secur.(249) USENIX Security Symposium(224) IEEE Trans. Smart Grid(198) GLOBECOM(197) ICC(193) FSE(187) ACSAC(184) CHES(178) Sensors(170) ARES(166) More (+10 of total 3761)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11110 occurrences of 2965 keywords

Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
30Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular
30Shouhuai Xu Collaborative Attack vs. Collaborative Defense. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborative attack, collaborative defense, cyber security, cyber attack
30Hilmi Günes Kayacik, Nur Zincir-Heywood Using self-organizing maps to build an attack map for forensic analysis. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF KDD 99 intrusion detection datasets, neural networks, intrusion detection, self-organizing map
30Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Zili Shao, Qingfeng Zhuge, Yi He 0001, Edwin Hsing-Mean Sha Defending Embedded Systems Against Buffer Overflow via Hardware/Software. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Walter Hohl, Xuejia Lai, Thomas Meier 0001, Christian Waldvogel Security of Iterated Hash Functions Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
30Somitra Kumar Sanadhya, Palash Sarkar 0001 A new hash family obtained by modifying the SHA-2 family. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, cryptanalysis
30Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Forensics and Evidence, internet attacks, website systems
30Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web Attacks, Anomaly Detection, Dynamic Analysis, Code Instrumentation
30Yao Zhao 0001 Geometrically robust video watermarking based on wavelet transform. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF geometrical transform attacks, optimal whitening filter, wavelet transform, watermarking
30Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF internal collisions, AES, side channel attacks, birthday paradox
30Johannes Blömer, Jean-Pierre Seifert Fault Based Cryptanalysis of the Advanced Encryption Standard (AES). Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Secure Banking, Smart Cards, AES, Fault Attacks, Implementation Issues
30Xiaobing Zhang, Shyhtsun Felix Wu, Zhi Fu, Tsung-Li Wu Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It. Search on Bibsonomy ICNP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF malicious packet dropping, dropping attack, severe damage, Internet environment, statistical analysis module, session delay, Internet, statistical analysis, transport protocols, packet switching, position, router, TCP performance, telecommunication security, hacker, detection performance, packet reorderings, denial of service attacks
30Haizhi Xu, Steve J. Chapin Improving address space randomization with a dynamic offset randomization technique. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF address space randomization, code islands, derandomization attacks, intrusion mitigation, randomization, denial-of-service attacks
30Sergei P. Skorobogatov Optically Enhanced Position-Locked Power Analysis. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF semi-invasive attacks, optical probing, side-channel attacks, power analysis
30Gilles Piret, Jean-Jacques Quisquater A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Block Ciphers, AES, Side-channel Attacks, Fault Attacks
30Roberto Maria Avanzi Countermeasures against Differential Power Analysis for Hyperelliptic Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Smart cards, Side-channel attacks, Public-key cryptography, Differential power analysis (DPA), Timing attacks, Hyperelliptic curves
30Marc Joye, Sung-Ming Yen The Montgomery Powering Ladder. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Montgomery powering ladder, constrained environments, cryptographic implementations, side-channel attacks, fault attacks, Exponentiation algorithms
30Chou Chen Yang, Hung-Wen Yang, Hui-Chuan Huang A robust and secure data transmission scheme based on identity-based cryptosystem for ad hoc networks. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF impersonate destination node attacks, packet forgery attacks, ad hoc networks, elliptic curve cryptography, hash chains, collision attacks, identity-based cryptosystem
30Itai Dinur, Adi Shamir Generic Analysis of Small Cryptographic Leaks. Search on Bibsonomy FDTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cube attacks, robust cube attacks, cryptanalysis, AES, side channel attacks, Serpent
29Artem Vorobiev, Jun Han 0004, Nargiza Bekmamedova An Ontology Framework for Managing Security Attacks and Defences in Component Based Software Systems. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Ming Luo, Tao Peng 0002, Christopher Leckie CPU-based DoS attacks against SIP servers. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Kai Xing, Fang Liu 0025, Xiuzhen Cheng 0001, David Hung-Chang Du Real-Time Detection of Clone Attacks in Wireless Sensor Networks. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Daniel S. Yeung, Shuyuan Jin, Xizhao Wang Covariance-Matrix Modeling and Detecting Various Flooding Attacks. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Anjali Sardana, Ramesh Chandra Joshi Simulation of Dynamic Honeypot Based Redirection to Counter Service Level DDoS Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Cliff Changchun Zou, Nick G. Duffield, Donald F. Towsley, Weibo Gong Adaptive Defense Against Various Network Attacks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Anthony Y. Fu, Xiaotie Deng, Liu Wenyin, Greg Little The methodology and an application to fight against Unicode attacks. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF secure web identity, spam, phishing, Unicode
29Johannes Blömer, Volker Krummel Fault Based Collision Attacks on AES. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Yoav Weiss, Elena Gabriela Barrantes Known/Chosen Key Attacks against Software Instruction Set Randomization. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Mudhakar Srivatsa, Arun Iyengar, Jian Yin 0002, Ling Liu 0001 A Middleware System for Protecting Against Application Level Denial of Service Attacks. Search on Bibsonomy Middleware The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Angelos Stavrou, Angelos D. Keromytis Countering DoS attacks with stateless multipath overlays. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key agreement, spread-spectrum communications
29Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwon 0002 Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Eli Biham, Orr Dunkelman, Nathan Keller New Combined Attacks on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29David Molnar, Matt Piotrowski, David Schultz, David A. Wagner 0001 The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Rasool Jalili, Fatemeh Imani-Mehr, Morteza Amini, Hamid Reza Shahriari Detection of Distributed Denial of Service Attacks Using Statistical Pre-processor and Unsupervised Neural Networks. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Thomas L. Martin, Michael S. Hsiao, Dong S. Ha 0001, Jayan Krishnaswami Denial-of-Service Attacks on Battery-powered Mobile Computers. Search on Bibsonomy PerCom The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Albert Levi, Erhan Çetintas, Murat Aydos, Çetin Kaya Koç, M. Ufuk Çaglayan Relay Attacks on Bluetooth Authentication and Solutions. Search on Bibsonomy ISCIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Siddika Berna Örs, Elisabeth Oswald, Bart Preneel Power-Analysis Attacks on an FPGA - First Experimental Results. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29James E. Just, James C. Reynolds, Larry A. Clough, Melissa Danforth, Karl N. Levitt, Ryan Maglich, Jeff Rowe Learning Unknown Attacks - A Start. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Eli Biham New Types of Cryptanalytic Attacks Using related Keys (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
29Yingying Chen 0001, Konstantinos Kleisouris, Xiaoyan Li, Wade Trappe, Richard P. Martin A security and robustness performance analysis of localization algorithms to signal strength attacks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF signal strength attacks, sensor networks, Localization, robustness, susceptibility
29Ton van Deursen, Sasa Radomirovic Algebraic Attacks on RFID Protocols. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID, Formal verification, security protocols, attacks, algebraic methods
29Vivaksha J. Jariwala, Devesh C. Jinwala A taxonomy of security attacks on the advanced encryption standard. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF advanced encryption standard, attacks, cipher
29Aaron Walters, David Zage, Cristina Nita-Rotaru A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, adaptivity, overlay networks, insider attacks
29Smriti Kumar Sinha, Azzedine Benameur A formal solution to rewriting attacks on SOAP messages. Search on Bibsonomy SWS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF context-free signature, context-sensitive signature, regular tree grammar, xml rewriting attacks, security, formal methods, soap
29Thomas Popp, Stefan Mangard, Elisabeth Oswald Power Analysis Attacks and Countermeasures. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DPA-resistant logic styles, countermeasures, power analysis attacks
29Nicolas T. Courtois, Blandine Debraize Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF algebraic attacks on block ciphers, Gröbner bases, design of S-boxes, Rijndael, algebraic immunity, Serpent, multivariate equations
29Andrey Bogdanov Linear Slide Attacks on the KeeLoq Block Cipher. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF KeeLoq, hopping codes, rolling codes, identify friend-or-foe, cryptanalysis, authentication protocols, linear cryptanalysis, key generation, slide attacks
29Mauro Barni, Angela D'Angelo, Neri Merhav Expanding the class of watermark de-synchronization attacks. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF local warping, random bending, watermark desynchronization, geometric attacks, robust watermarking
29Ryad Benadjila, Olivier Billet, Stanislas Francfort Drm to counter side-channel attacks? Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF white-box, AES, side-channel attacks, DRM
29Jeong Ok Kwon, Kouichi Sakurai, Dong Hoon Lee 0001 Efficient Password-Authenticated Key Exchange for Three-Party Secure Against Undetectable On-Line Dictionary Attacks. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile network security, Cryptography, dictionary attacks, password-authenticated key exchange, round complexity
29Sheng Zhang 0004, Yi Ouyang 0001, James Ford, Fillia Makedon Analysis of a low-dimensional linear model under recommendation attacks. Search on Bibsonomy SIGIR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF shilling attacks, recommender systems, collaborative filtering, anomaly detection
29Katsuyuki Okeya, Tetsu Iwata Side Channel Attacks on Message Authentication Codes. Search on Bibsonomy ESAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Selective Forgery, MACs, Side Channel Attacks, DPA, SPA
29Ilaria Venturini Oracle Attacks and Covert Channels. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Oracle attacks, Watermarking, Covert channels
29Yee Wei Law, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, clustering, MAC protocols, jamming, denial-of-service attacks
29Dong-Guk Han, Jongin Lim 0001, Kouichi Sakurai On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XTR Public Key Cryptosystem, Data-bit DPA, Address-bit DPA, doubling attack, Side Channel Attacks, SPA
29Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 On Effectiveness of Link Padding for Statistical Traffic Analysis Attacks. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF packet interarrival times, traffic analysis attacks, statistical analysis, statistical pattern recognition
29Dirk Ourston, Sara Matzner, William Stump, Bryan Hopkins Applications of Hidden Markov Models to Detecting Multi-Stage Network Attacks. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Coordinated Internet attacks, rare data, multi-stage network intrusions, partial data, Hidden Markov Models, noise
29Yuval Ishai, Amit Sahai, David A. Wagner 0001 Private Circuits: Securing Hardware against Probing Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, provable security, side channel attacks, secure multi-party computation, circuit complexity
29Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF attack resistant, mobile agents, intrusion detection systems, DoS attacks
29Nicolas T. Courtois Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF overdefined systems of multivariate equations, MQ problem, Gröbner bases, ciphertext-only attacks, Toyocrypt-HR1, Toyocrypt-HS1, Cryptrec, stream ciphers, nonlinear filtering, pseudo-random generators, Multivariate cryptography, XL algorithm
29Josyula R. Rao, Pankaj Rohatgi, Helmut Scherzer, Stéphane Tinguely Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF commercial and industrial security, COMP128, authentication, security protocols, side channel attacks, smartcards, GSM
29M. Anwarul Hasan Power Analysis Attacks and Algorithmic Approaches to Their Countermeasures for Koblitz Curve Cryptosystems. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2001 DBLP  DOI  BibTeX  RDF elliptic curve scalar multiplication, finite (or Galois) fields, Cryptography, power analysis attacks, Koblitz curves, number system
29Stamatis Karnouskos Dealing with Denial-of-Service Attacks in Agent-enabled Active and Programmable Infrastructures. Search on Bibsonomy COMPSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Intrusion Detection Systems, Active Networks, Agent Technology, Distributed Denial of Service Attacks
29Marc Joye, Jean-Jacques Quisquater Hessian Elliptic Curves and Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptography, Implementation, Smart-cards, Side-channel attacks, Elliptic curves
29Christopher B. McCubbin, Ali Aydin Selçuk, Deepinder P. Sidhu Initialization Vector Attacks on the IPsec Protocol Suite. Search on Bibsonomy WETICE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF IV attacks, cryptanalysis, IPsec, Internet security
29Li Gong Optimal authentication protocols resistant to password guessing attacks. Search on Bibsonomy CSFW The full citation details ... 1995 DBLP  DOI  BibTeX  RDF optimal authentification protocols, user passwords, protocols, message authentication, password guessing attacks
29David R. Raymond, Scott F. Midkiff Denial-of-Service in Wireless Sensor Networks: Attacks and Defenses. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial-of-sleep attacks, security, wireless sensor networks, Denial-of-service attacks
29Natalia Stakhanova, Oleg Stakhanov, Ali A. Ghorbani 0001 A Behavioral Model of Ideologically-motivated "Snowball" Attacks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ideological attacks, conceptual model, cyber attacks
29George Lawton Stronger Domain Name System Thwarts Root-Server Attacks. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF root-server attacks, security, DDoS attacks
28Frédéric Amiel, Karine Villegas, Benoit Feix, Louis Marcel Passive and Active Combined Attacks: Combining Fault Attacks and Side Channel Analysis. Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Fei Hu, Steve Wilson, Yang Xiao 0001 Correlation-Based Security in Time Synchronization of Sensor Networks. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Samer Fayssal, Salim Hariri, Youssif B. Al-Nashif, Guangzhi Qu Anomaly-Based Behavior Analysis of Wireless Network Security. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Anjela Yu. Matrosova, Ekaterina Loukovnikova, Sergei Ostanin, Alexandra Zinchuk, Ekaterina Nikolaeva Test Generation for Single and Multiple Stuck-at Faults of a Combinational Circuit Designed by Covering Shared ROBDD with CLBs. Search on Bibsonomy DFT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Alexander G. Tartakovsky, Boris Rozovskii, Rudolf B. Blazek, Hongjoong Kim A novel approach to detection of intrusions in computer networks via adaptive sequential and batch-sequential change-point detection methods. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Zhenkai Liang, R. Sekar 0001 Fast and automated generation of attack signatures: a basis for building self-protecting servers. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF denial-of-service protection, worm defense, buffer overflow, signature generation, memory error
27Lejla Batina, Nele Mentens, Ingrid Verbauwhede Side-Channel Issues for Designing Secure Hardware Implementations. Search on Bibsonomy IOLTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Stéphanie Delaune, Steve Kremer, Mark Ryan 0001 Composition of Password-Based Protocols. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF composition, security protocols, guessing attacks
27Yu-Chin Cheng, Chi-Sung Laih, Gu Hsin Lai, Chia-Mei Chen, Tsuhan Chen Defending On-Line Web Application Security with User-Behavior Surveillance. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web attacks, Markov model, User behavior, Web security, Web application security
27Muzammil Khan, Attiq Ahmed, Ahmad Raza Cheema Vulnerabilities of UMTS Access Domain Security Architecture. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF UMTS vulnerabilities, DoS attacks on UMTS, Security, UMTS
27Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding
27Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authenticated group key agreement, Dynamic group membership, Heterogeneous networks, Secure group communication, DoS attacks
27Bamshad Mobasher, Robin D. Burke, Runa Bhaumik, Chad Williams Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Profile injection attacks, recommender systems, collaborative filtering, attack detection, shilling
27Praveen Gauravaram, Katsuyuki Okeya An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF M-NMAC, MDx-MAC, Side channel attacks, DPA, HMAC
27Thomas Gamer, Marcus Schöller, Roland Bless An Extensible and Flexible System for Network Anomaly Detection. Search on Bibsonomy Autonomic Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Anomaly Detection, DDoS Attacks, Programmable Networks
27Simon P. Chung, Aloysius K. Mok On Random-Inspection-Based Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random inspection, intrusion detection, computer security, Mimicry attacks
27Wei Li 0012, Xiangyang Xue Content Based Localized Robust Audio Watermarking. Search on Bibsonomy MIPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Localized watermarking, synchronization attacks
27Angelos D. Keromytis, Vishal Misra, Dan Rubenstein SOS: secure overlay services. Search on Bibsonomy SIGCOMM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF network security, overlay networks, denial of service attacks
27Katsuyuki Okeya, Kouichi Sakurai On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Randomized Addition-Subtraction Chains Countermeasure, SPA Attack, Side Channel Attacks, Elliptic Curve Cryptosystems, Timing Attack
26Wei-Hung Lin, Yuh-Rau Wang, Shi-Jinn Horng, Tzong-Wann Kao Digital Image Watermarking for Malicious Attack. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF nongeometric attacks, watermarking, Copyright protection, forward error correction, geometric attacks
26Christoph Herbst, Marcel Medwed Using Templates to Attack Masked Montgomery Ladder Implementations of Modular Exponentiation. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Montgomery Ladder, Base Point Blinding, Smart Cards, RSA, Side- Channel Attacks, Power Analysis, Microcontroller, Template Attacks
26Peizhong Lu, Dan Wang A Geometrical Robust Image Data Hiding Scheme Using FCA-Based Resynchronization. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data hiding, affine transformations, fast correlation attacks, geometrical attacks
26Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain Side Channel Cryptanalysis of a Higher Order Masking Scheme. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Higher Order DPA, Masking Scheme, Side Channel Attacks, Differential Power Analysis, Template Attacks
26Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh A Generalized Method of Differential Fault Attack Against AES Cryptosystem. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks
26Fu-Hau Hsu, Fanglu Guo, Tzi-cker Chiueh Scalable network-based buffer overflow attack detection. Search on Bibsonomy ANCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF CTCP, generalized attack signatures, network-based intrusion detection, payload bypassing, return-into-libc attacks, buffer overflow attacks
26Marc Joye, Christophe Tymen Protections against Differential Analysis for Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Smart-cards, Side-channel attacks, Public-key cryptography, Elliptic curves, Differential power analysis (DPA), Timing attacks
26Danilo Bruschi, Lorenzo Cavallaro, Emilia Rosti Less Harm, Less Worry or How to Improve Network Security by Bounding System Offensiveness. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF system offensiveness, liability problem, intranet security, security tools performance, distributed tools, Internet, Internet, network security, security of data, security architectures, computer network management, security attacks, DoS attacks
26Claus-Peter Schnorr, Serge Vaudenay The Black-Box Model for Cryptographic Primitives. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Generic attacks, Generic attacks, Key words, Cryptographic primitives, Cryptographic primitives
26Anjali Sardana, Ramesh Chandra Joshi Dual-level defense for networks under DDoS attacks. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF entropy, detection, DDoS, Honeypots, characterization
Displaying result #101 - #200 of 35802 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license