The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CODASPY"( http://dblp.L3S.de/Venues/CODASPY )

URL (DBLP): http://dblp.uni-trier.de/db/conf/codaspy

Publication years (Num. hits)
2011 (29) 2012 (32) 2013 (43) 2014 (44) 2015 (43) 2016 (41) 2017 (43) 2018 (48) 2019 (36) 2020 (45) 2021 (41) 2022 (48) 2023 (33)
Publication types (Num. hits)
inproceedings(513) proceedings(13)
Venues (Conferences, Journals, ...)
CODASPY(526)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 526 publication records. Showing 526 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Robert Brotzman, Danfeng Zhang, Mahmut T. Kandemir, Gang Tan Ghost Thread: Effective User-Space Cache Side Channel Protection. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jerome Dinal Herath, Ping Yang 0002, Guanhua Yan Real-Time Evasion Attacks against Deep Learning-Based Anomaly Detection from Distributed System Logs. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Gunjan Batra, Vijayalakshmi Atluri, Jaideep Vaidya, Shamik Sural Incremental Maintenance of ABAC Policies. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Thusitha Dayaratne, Carsten Rudolph, Ariel Liebman, Mahsa Salehi We Can Pay Less: Coordinated False Data Injection Attack Against Residential Demand Response in Smart Grids. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Xinyu Lei, Guan-Hua Tu, Tian Xie, Sihan Wang BFastPay: A Routing-free Protocol for Fast Payment in Bitcoin Network. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Seoyeon Kang, Sujeong Lee, Yumin Kim, Seong-Kyun Mok, Eun-Sun Cho OBFUS: An Obfuscation Tool for Software Copyright and Vulnerability Protection. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Lim Wei Ming Shawn, Purnima Murali Mohan, Peter Kok Keong Loh, Vivek Balachandran Blockchain-based Proof of Existence (PoE) Framework using Ethereum Smart Contracts. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Khosro Salmani, Ken Barker 0001 Don't fool yourself with Forward Privacy, Your queries STILL belong to us! Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Anupam Joshi, Barbara Carminati, Rakesh M. Verma (eds.) CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021 Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Yiwen Hu, Sihan Wang, Guan-Hua Tu, Li Xiao 0001, Tian Xie, Xinyu Lei, Chi-Yu Li 0001 Security Threats from Bitcoin Wallet Smartphone Applications: Vulnerabilities, Attacks, and Countermeasures. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Washington Garcia, Animesh Chhotaray, Joseph I. Choi, Suman Kalyan Adari, Kevin R. B. Butler, Somesh Jha Brittle Features of Device Authentication. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Clara Bertolissi, Maribel Fernández, Bhavani Thuraisingham Graph-Based Specification of Admin-CBAC Policies. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Adamu Hussaini, Bassam Zahran, Aisha I. Ali-Gombe Object Allocation Pattern as an Indicator for Maliciousness - An Exploratory Analysis. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Bassam Zahran, Adamu Hussaini, Aisha I. Ali-Gombe IIoT-ARAS: IIoT/ICS Automated Risk Assessment System for Prediction and Prevention. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Aleieldin Salem Towards Accurate Labeling of Android Apps for Reliable Malware Detection. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Priyam Biswas, Nathan Burow, Mathias Payer Code Specialization through Dynamic Feature Observation. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ankur Chattopadhyay, Abdikadar Ali, Danielle Thaxton Assessing the Alignment of Social Robots with Trustworthy AI Design Guidelines: A Preliminary Research Study. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Lamine Noureddine, Annelie Heuser, Cassius Puodzius, Olivier Zendra SE-PAC: A Self-Evolving PAcker Classifier against rapid packers evolution. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Ambareen Siraj, Nigamanth Sridhar, John A. Drew Hamilton, Latifur Khan, Siddharth Kaza, Maanak Gupta, Sudip Mittal Is there a Security Mindset and Can it be Taught? Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Vivek Balachandran, Melissa Wan Jun Chua Neutralizing Hostile Drones with Surveillance Drones. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Danfeng (Daphne) Yao Measurable and Deployable Security: Gaps, Successes, and Opportunities. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Jiacheng Li, Ninghui Li, Bruno Ribeiro 0001 Membership Inference Attacks and Defenses in Classification Models. Search on Bibsonomy CODASPY The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
1Eduardo Anaya, Jimil Patel, Prerak Shah, Vrushank Shah, Yuan Cheng 0002 A Performance Study on Cryptographic Algorithms for IoT Devices. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Stuart Millar, Niall McLaughlin, Jesús Martínez del Rincón, Paul Miller 0003, Ziming Zhao 0001 DANdroid: A Multi-View Discriminative Adversarial Network for Obfuscated Android Malware Detection. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Nisha Panwar, Shantanu Sharma 0001, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian IoT Expunge: Implementing Verifiable Retention of IoT Data. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Marco Pernpruner, Roberto Carbone, Silvio Ranise, Giada Sciarretta The Good, the Bad and the (Not So) Ugly of Out-of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Bhavani M. Thuraisingham Can AI be for Good in the Midst of Cyber Attacks and Privacy Violations?: A Position Paper. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Keita Kayaba, Hidenobu Oguri, Yuji Yamaoka Evaluation of Secure Remote Offering Service for Information Bank. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Isaac Polinsky, Kyle Martin, William Enck, Michael K. Reiter n-m-Variant Systems: Adversarial-Resistant Software Rejuvenation for Cloud-Based Web Applications. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sharmin Afrose, Sazzadur Rahaman, Danfeng (Daphne) Yao A Comprehensive Benchmark on Java Cryptographic API Misuses. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Markus Hittmeir, Rudolf Mayer, Andreas Ekelhart A Baseline for Attribute Disclosure Risk in Synthetic Data. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yi Xie 0008, Joshua Holmes, Gaby G. Dagher ZeroLender: Trustless Peer-to-Peer Bitcoin Lending Platform. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kees Leune, Sung Kim Service-Oriented Modeling for Cyber Threat Analysis. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chibuike Ugwuoke, Zekeriya Erkin, Marcel J. T. Reinders, Reginald L. Lagendijk PREDICT: Efficient Private Disease Susceptibility Testing in Direct-to-Consumer Model. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jiyu Chen, David Wang, Hao Chen 0003 Explore the Transformation Space for Adversarial Images. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Richard Matovu, Abdul Serwadda, Argenis V. Bilbao, Isaac Griswold-Steiner Defensive Charging: Mitigating Power Side-Channel Attacks on Charging Smartphones. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dimitris Deyannis, Eva Papadogiannaki, Giorgos Kalivianakis, Giorgos Vasiliadis, Sotiris Ioannidis TrustAV: Practical and Privacy Preserving Malware Analysis in the Cloud. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Fabian Franzen, Manuel Andreas, Manuel Huber 0001 FridgeLock: Preventing Data Theft on Suspended Linux with Usable Memory Encryption. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Anoop Singhal, Srivathsan Srinivasagopalan, Rakesh M. Verma Developing A Compelling Vision for Winning the Cybersecurity Arms Race. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Aritra Dhar, Ivan Puddu, Kari Kostiainen, Srdjan Capkun ProximiTEE: Hardened SGX Attestation by Proximity Verification. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ahmed Alshehri, Jacob Granley, Chuan Yue Attacking and Protecting Tunneled Traffic of Smart Home Devices. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yunus Kucuk, Guanhua Yan Deceiving Portable Executable Malware Classifiers into Targeted Misclassification with Practical Adversarial Examples. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Vassil Roussev, Bhavani Thuraisingham, Barbara Carminati, Murat Kantarcioglu (eds.) CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, New Orleans, LA, USA, March 16-18, 2020. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Katsuya Matsuoka, Mhd Irvan, Ryosuke Kobayashi, Rie Shigetomi Yamaguchi A Score Fusion Method by Neural Network in Multi-Factor Authentication. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Johannes Feichtner, Stefan Gruber Understanding Privacy Awareness in Android App Descriptions Using Deep Learning. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Florian Nuding, Rudolf Mayer Poisoning Attacks in Federated Learning: An Evaluation on Traffic Sign Classification. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Bo Zhang 0051, Boxiang Dong, Haipei Sun, Wendy Hui Wang AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sazzadur Rahaman, Ya Xiao, Sharmin Afrose, Ke Tian, Miles Frantz, Na Meng 0001, Barton P. Miller, Fahad Shaon, Murat Kantarcioglu, Danfeng (Daphne) Yao Deployment-quality and Accessible Solutions for Cryptography Code Development. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Peeyush Gupta, Yin Li 0001, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma 0001 Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Clara Bertolissi, Maribel Fernández, Bhavani Thuraisingham Admin-CBAC: An Administration Model for Category-Based Access Control. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Huangyi Ge, Sze Yiu Chau, Bruno Ribeiro 0001, Ninghui Li Random Spiking and Systematic Evaluation of Defenses Against Adversarial Examples. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yunhui Long, Le Xu, Carl A. Gunter A Hypothesis Testing Approach to Sharing Logs with Confidence. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Haoti Zhong, Cong Liao, Anna Cinzia Squicciarini, Sencun Zhu, David J. Miller 0001 Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Angeliki Aktypi, Kübra Kalkan, Kasper Bonne Rasmussen SeCaS: Secure Capability Sharing Framework for IoT Devices in a Structured P2P Network. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Edoardo Serra, Anu Shrestha, Francesca Spezzano, Anna Cinzia Squicciarini DeepTrust: An Automatic Framework to Detect Trustworthy Users in Opinion-based Systems. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Thang Hoang, Rouzbeh Behnia, Yeongjin Jang, Attila A. Yavuz MOSE: Practical Multi-User Oblivious Storage via Secure Enclaves. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Hoai Viet Nguyen, Luigi Lo Iacono CREHMA: Cache-aware REST-ful HTTP Message Authentication. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Chen Chen, Jaewoo Lee Rényi Differentially Private ADMM for Non-Smooth Regularized Optimization. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Steven Mackey, Ivan Mihov, Alex Nosenko, Francisco Vega, Yuan Cheng 0002 A Performance Comparison of WireGuard and OpenVPN. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Stanislav Dashevskyi, Yury Zhauniarovich, Olga Gadyatskaya, Aleksandr Pilgun, Hamza Ouhssain Dissecting Android Cryptocurrency Miners. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ruijia (Roger) Hu, Wyatt Dorris, Nishant Vishwamitra, Feng Luo 0001, Matthew Costello On the Impact of Word Representation in Hate Speech and Offensive Language Detection and Explanation. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Jiadong Sun, Xia Zhou, Wenbo Shen, Yajin Zhou, Kui Ren 0001 PESC: A Per System-Call Stack Canary Design for Linux Kernel. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Ivo Sluganovic, Mihael Liskij, Ante Derek, Ivan Martinovic Tap-Pair: Using Spatial Secrets for Single-Tap Device Pairing of Augmented Reality Headsets. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Devyani Vij, Vivek Balachandran, Tony Thomas, Roopak Surendran GRAMAC: A Graph Based Android Malware Classification Mechanism. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Mohammad Shameel bin Mohammad Fadilah, Vivek Balachandran, Peter K. K. Loh, Melissa Wan Jun Chua DRAT: A Drone Attack Tool for Vulnerability Assessment. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Sami Kairajärvi, Andrei Costin, Timo Hämäläinen 0002 ISAdetect: Usable Automated Detection of CPU Architecture and Endianness for Executable Binary Files and Object Code. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Kiavash Satvat, Maliheh Shirvanian, Mahshid Hosseini, Nitesh Saxena CREPE: A Privacy-Enhanced Crash Reporting System. Search on Bibsonomy CODASPY The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Dave (Jing) Tian, Joseph I. Choi, Grant Hernandez, Patrick Traynor, Kevin R. B. Butler A Practical Intel SGX Setting for Linux Containers in the Cloud. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Philip W. L. Fong Results in Workflow Resiliency: Complexity, New Formulation, and ASP Encoding. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Flavio Toffalini, Martín Ochoa, Jun Sun 0001, Jianying Zhou 0001 Careful-Packing: A Practical and Scalable Anti-Tampering Software Protection enforced by Trusted Computing. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maribel Fernández, Ian Mackie, Bhavani Thuraisingham Specification and Analysis of ABAC Policies via the Category-based Metamodel. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gaurav Panwar, Satyajayant Misra, Roopa Vishwanathan BlAnC: Blockchain-based Anonymous and Decentralized Credit Networks. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Houtan Faridi, Srivathsan Srinivasagopalan, Rakesh M. Verma Parameter Tuning and Confidence Limits of Malware Clustering. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Gail-Joon Ahn, Bhavani Thuraisingham, Murat Kantarcioglu, Ram Krishnan (eds.) Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, CODASPY 2019, Richardson, TX, USA, March 25-27, 2019 Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Amit Tambe, Yan Lin Aung, Ragav Sridharan, Martín Ochoa, Nils Ole Tippenhauer, Asaf Shabtai, Yuval Elovici Detection of Threats to IoT Devices using Scalable VPN-forwarded Honeypots. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tobias F. Pfeffer, Thomas Göthel, Sabine Glesner Efficient and Precise Information Flow Control for Machine Code through Demand-Driven Secure Multi-Execution. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Ryan Sheatsley, Patrick D. McDaniel, A. Selcuk Uluagac Curie: Policy-based Secure Data Exchange. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Sharad Mehrotra, Shantanu Sharma 0001, Jeffrey D. Ullman Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ryosuke Kobayashi, Nobuyuki Saji, Nobuo Shigeta, Rie Shigetomi Yamaguchi Large Scale PoC Experiment with 57, 000 people to Accumulate Patterns for Lifestyle Authentication. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Zhibo Sun, Carlos E. Rubio-Medrano, Ziming Zhao 0001, Tiffany Bao, Adam Doupé, Gail-Joon Ahn Understanding and Predicting Private Interactions in Underground Forums. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kailiang Ying, Priyank Thavai, Wenliang Du TruZ-View: Developing TrustZone User Interface for Mobile OS Using Delegation Integration Model. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yuseok Jeon, Junghwan Rhee, Chung Hwan Kim, Zhichun Li, Mathias Payer, Byoungyoung Lee, Zhenyu Wu PoLPer: Process-Aware Restriction of Over-Privileged Setuid Calls in Legacy Applications. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Peiying Wang, Shijie Jia 0001, Bo Chen, Luning Xia, Peng Liu 0005 MimosaFTL: Adding Secure and Practical Ransomware Defense Strategy to Flash Translation Layer. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Hasan Faik Alan, Jasleen Kaur 0001 Client Diversity Factor in HTTPS Webpage Fingerprinting. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Augustee Meshram, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri ABACaaS: Attribute-Based Access Control as a Service. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ronny Chevalier, Stefano Cristalli, Christophe Hauser, Yan Shoshitaishvili, Ruoyu Wang 0001, Christopher Kruegel, Giovanni Vigna, Danilo Bruschi, Andrea Lanzi BootKeeper: Validating Software Integrity Properties on Boot Firmware Images. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Mathias Morbitzer, Manuel Huber 0001, Julian Horsch Extracting Secrets from Encrypted Virtual Machines. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Michalis Diamantaris, Elias P. Papadopoulos, Evangelos P. Markatos, Sotiris Ioannidis, Jason Polakis REAPER: Real-time App Analysis for Augmenting the Android Permission System. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yihe Zhang, Hao Zhang 0023, Xu Yuan 0001 Toward Efficient Spammers Gathering in Twitter Social Networks. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maryam Fanaeepour, Ashwin Machanavajjhala PrivStream: Differentially Private Event Detection on Data Streams. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Laleh Eskandarian, Dilara Akdogan, Duygu Karaoglan Altop, Albert Levi SKA-CaNPT: Secure Key Agreement using Cancelable and Noninvertible Biometrics based on Periodic Transformation. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wakana Maeda, Yuji Yamaoka Custom-made Anonymization by Data Analysis Program Provided by Recipient. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Asmaa Sallam, Elisa Bertino Result-Based Detection of Insider Threats to Relational Databases. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Tatsuhiko Yasumatsu, Takuya Watanabe 0001, Fumihiro Kanei, Eitaro Shioji, Mitsuaki Akiyama, Tatsuya Mori Understanding the Responsiveness of Mobile App Developers to Software Library Updates. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Cory Thoma, Adam J. Lee, Alexandros Labrinidis Behind Enemy Lines: Exploring Trusted Data Stream Processing on Untrusted Systems. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maanak Gupta, James O. Benson, Farhan Patwa, Ravi S. Sandhu Dynamic Groups and Attribute-Based Access Control for Next-Generation Smart Cars. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nisha Panwar, Shantanu Sharma 0001, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian Verifiable Round-Robin Scheme for Smart Homes. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi 0002 Deep Neural Networks Classification over Encrypted Data. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Alina Matyukhina, Natalia Stakhanova, Mila Dalla Preda, Celine Perley Adversarial Authorship Attribution in Open-Source Projects. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Blake Anderson, Andrew Chi, Scott Dunlop, David A. McGrew Limitless HTTP in an HTTPS World: Inferring the Semantics of the HTTPS Protocol without Decryption. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 526 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license