The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Countermeasures with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1996 (15) 1997-1998 (15) 1999-2000 (17) 2001 (26) 2002 (38) 2003 (53) 2004 (74) 2005 (110) 2006 (118) 2007 (123) 2008 (125) 2009 (119) 2010 (51) 2011 (64) 2012 (80) 2013 (74) 2014 (87) 2015 (85) 2016 (78) 2017 (100) 2018 (128) 2019 (136) 2020 (165) 2021 (195) 2022 (156) 2023 (178) 2024 (36)
Publication types (Num. hits)
article(917) book(3) incollection(31) inproceedings(1433) phdthesis(62)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1065 occurrences of 522 keywords

Results
Found 2446 publication records. Showing 2446 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
21Jeffrey Horton, Jennifer Seberry Companion Viruses and the Macintosh: Threats and Countermeasures. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
21Adam L. Young, Moti Yung Cryptovirology: Extortion-Based Security Threats and Countermeasures. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
21Edward G. Coffman Jr., Leonard Kleinrock Computer scheduling methods and their countermeasures. Search on Bibsonomy AFIPS Spring Joint Computing Conference The full citation details ... 1968 DBLP  DOI  BibTeX  RDF
19Chester Rebeiro, Mainack Mondal, Debdeep Mukhopadhyay Pinpointing Cache Timing Attacks on AES. Search on Bibsonomy VLSI Design The full citation details ... 2010 DBLP  DOI  BibTeX  RDF AES, Side Channel Attacks, Countermeasures, Cache Attacks
19Qunli Wu, Hong Zheng, Xue Tan The Problems of Unification and Coordination in the Development of E-Government in China. Search on Bibsonomy IFITA (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF unified planning, e-government, countermeasures
19Sergio Castillo-Perez, Joaquín García-Alfaro Evaluation of Two Privacy-Preserving Protocols for the DNS. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Privacy Information Retrieval, Privacy, Countermeasures, Domain Name System, IT Security
19Abdullah M. Alnajim, Malcolm Munro An Anti-Phishing Approach that Uses Training Intervention for Phishing Websites Detection. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anti-Phishing countermeasures, online fraud, online banking security, Phishing, e-commerce security
19Moti Yung How to Guard the Guards Themselves. Search on Bibsonomy FCT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Key Evolving Cryptosystems, Proactive Cryptosystems, Public Key cryptography, Attacks, Leakage, Countermeasures, Physical Security, Threshold cryptosystems, Cryptographic Keys
19Jean-Sébastien Coron, Ilya Kizhvatov Analysis of the split mask countermeasure for embedded systems. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, DPA, side channel analysis, countermeasures, masking
19Maciej Nikodem Boundary Scan Security Enhancements for a Cryptographic Hardware. Search on Bibsonomy EUROCAST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IEEE 1149, side-channel attacks, countermeasures, boundary scan
19Rung Ching Chen, Chia-Fen Hsieh, Yung-Fa Huang A new method for intrusion detection on hierarchical wireless sensor networks. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack behaviors, wireless sensor networks, intrusion detection, anomaly detection, countermeasures
19Nwokedi C. Idika, Brandeis H. Marshall, Bharat K. Bhargava Maximizing network security given a limited budget. Search on Bibsonomy Richard Tapia Celebration of Diversity in Computing Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network hardening, network security, countermeasures, attack graphs, security measures
19Jean-Sébastien Coron, Ilya Kizhvatov An Efficient Method for Random Delay Generation in Embedded Software. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF random delays, Side channel attacks, countermeasures
19Catherine H. Gebotys, Brian A. White EM analysis of a wireless Java-based PDA. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EM analysis, Side-channel analysis, countermeasures, power attacks
19Daniel J. Bernstein, Tanja Lange 0001, Reza Rezaeian Farashahi Binary Edwards Curves. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Edwards curves, complete addition law, Montgomery ladder, countermeasures against side-channel attacks, Elliptic curves, binary fields
19Daniel J. Bernstein, Tanja Lange 0001 Inverted Edwards Coordinates. Search on Bibsonomy AAECC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Edwards coordinates, inverted Edwards coordinates, side-channel countermeasures, unified addition formulas, strongly unified addition formulas, Elliptic curves, addition, explicit formulas, doubling
19Daniel J. Bernstein, Tanja Lange 0001 Faster Addition and Doubling on Elliptic Curves. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-scalar multiplication, side-channel countermeasures, unified addition formulas, complete addition formulas, performance evaluation, Elliptic curves, register allocation, scalar multiplication, efficient implementation, addition, explicit formulas, doubling
19David Jao, S. Ramesh Raju, Ramarathnam Venkatesan Digit Set Randomization in Elliptic Curve Cryptography. Search on Bibsonomy SAGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF randomized representations, non-adjacent form representations, side channel attack countermeasures, elliptic curve cryptography
19Sebastian Gajek, Lijun Liao, Jörg Schwenk Breaking and fixing the inline approach. Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF inline approach, wrapping attacks, countermeasures, XML signature
19Dmitrij Lagutin, Hannu H. Kari Controlling Incoming Connections Using Certificates and Distributed Hash Tables. Search on Bibsonomy NEW2AN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rights delegation, DoS countermeasures, certificates, Session management, rights management
19Jerry den Hartog, Erik P. de Vink Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2004 DBLP  DOI  BibTeX  RDF systematic hardening, simulation, side-channel attack, DPA, power analysis, smartcard, countermeasures, fault analysis
17Yves Younan, Frank Piessens, Wouter Joosen Protecting Global and Static Variables from Buffer Overflow Attacks. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Thomas Weise 0001, Michael Zapf Evolving distributed algorithms with genetic programming: election. Search on Bibsonomy GEC Summit The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LGP, RBGP, SGP, eRBGP, extended rule-based genetic programming, fraglets, indirect memory access, positional epistasis, rule-based genetic programming, standard genetic programming, distributed systems, genetic programming, learning classifier systems, LCS, election, epistasis, linear genetic programming
17Wael Kanoun, Nora Cuppens-Boulahia, Frédéric Cuppens, Samuel Dubus, Antony Martin Success Likelihood of Ongoing Attacks for Intrusion Detection and Response Systems. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Douglas Stebila, Berkant Ustaoglu Towards Denial-of-Service-Resilient Key Agreement Protocols. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Nicolás Macia, Paula Venosa, Luis Marrone Requirements for troubleshooting wi-fi network security through location technologies. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF signalprint, network security, monitoring, location, wifi
17Paolo Maistri, Régis Leveugle Double-Data-Rate Computation as a Countermeasure against Fault Analysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Artemios G. Voyiatzis, Dimitrios N. Serpanos The security of the Fiat-Shamir scheme in the presence of transient hardware faults. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack
17Duo Liu, Zhiyong Tan, Yiqi Dai New Elliptic Curve Multi-scalar Multiplication Algorithm for a Pair of Integers to Resist SPA. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Kun Peng, Feng Bao 0001 Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PBD shuffling, AAAP attack, optimisation, correction
17Ming Luo, Tao Peng 0002, Christopher Leckie CPU-based DoS attacks against SIP servers. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao Malware Behavior Analysis in Isolated Miniature Network for Revealing Malware's Network Activity. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Krutartha Patel, Sri Parameswaran LOCS: a low overhead profiler-driven design flow for security of MPSoCs. Search on Bibsonomy CODES+ISSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tensilica, architecture, mpsoc, execution profile, code injection
17Tanya G. Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shankar Sastry 0001 Testbed Implementation of a Secure Flooding Time Synchronization Protocol. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Onur Aciiçmez, Werner Schindler A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Instruction-Cache Attack, MicroArchitectural Analysis, RSA, Stochastic Process, Side Channel Analysis, Montgomery Multiplication
17Thomas Plos Susceptibility of UHF RFID Tags to Electromagnetic Analysis. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EPC Generation, 2 standard, ultra-high frequency (UHF), differential electromagnetic analysis (DEMA), radio-frequency identification (RFID), Side-channel analysis (SCA)
17Manuel Koschuch, Johann Großschädl, Udo Payer, Matthias Hudler, Michael Krüger Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance Evaluation, Network Security, Elliptic Curve Cryptography, Side-Channel Analysis, Efficient Implementation
17Hervé Debar, Yohann Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia Enabling automated threat response through the use of a dynamic security policy. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Ryuiti Koike, Naoshi Nakaya, Yuji Koi Development of System for the Automatic Generation of Unknown Virus Extermination Software. Search on Bibsonomy SAINT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17John Krumm Inference Attacks on Location Tracks. Search on Bibsonomy Pervasive The full citation details ... 2007 DBLP  DOI  BibTeX  RDF inference attack, privacy, location, location tracks
17Yoo-Jin Baek, Ihor Vasyltsov How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Guillaume Fumaroli, Emmanuel Mayer, Renaud Dubois First-Order Differential Power Analysis on the Duplication Method. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF zero attack, differential power analysis, spectral analysis, Side-channel analysis
17Stephen Mark Glass, Vallipuram Muthukkumarasamy A Study of the TKIP Cryptographic DoS Attack. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario. Search on Bibsonomy CP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17François Macé, François-Xavier Standaert, Jean-Jacques Quisquater Information Theoretic Evaluation of Side-Channel Resistant Logic Styles. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Stefan Tillich, Johann Großschädl Power Analysis Resistant AES Implementation with Instruction Set Extensions. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF embedded RISC processor, SPARC V8 architecture, SCA resistance, Advanced Encryption Standard, power analysis, instruction set extensions
17Nathan S. Evans, Chris GauthierDickey, Christian Grothoff Routing in the Dark: Pitch Black. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jude Angelo Ambrose, Roshan G. Ragel, Sri Parameswaran RIJID: Random Code Injection to Mask Power Analysis based Side Channel Attacks. Search on Bibsonomy DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Aggeliki Tsohou, Marianthi Theoharidou, Spyros Kokolakis, Dimitris Gritzalis Addressing Cultural Dissimilarity in the Information Security Management Outsourcing Relationship. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Information Security Management Outsourcing, Organizational Culture
17Katsuyuki Okeya, Tsuyoshi Takagi Security analysis of CRT-based cryptosystems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem
17Catherine H. Gebotys A table masking countermeasure for low-energy secure embedded systems. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Balachander Krishnamurthy, Craig E. Wills Cat and mouse: content delivery tradeoffs in web access. Search on Bibsonomy WWW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF content blocking, web registration, privacy, anonymity
17Toru Akishita, Tsuyoshi Takagi Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smart cards, DPA, elliptic curve cryptosystems, power analysis, modular multiplication
17Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti Defense trees for economic evaluation of security investments. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Christoph Herbst, Elisabeth Oswald, Stefan Mangard An AES Smart Card Implementation Resistant to Power Analysis Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DPA resistance, smart card, AES
17Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli Assessing the Risk of an Information Infrastructure Through Security Dependencies. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mitigation plan, ranking, risk assessment, vulnerability, countermeasure
17Sam Supakkul, Lawrence Chung Applying a Goal-Oriented Method for Hazard Analysis: A Case Study. Search on Bibsonomy SERA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Ali Abbas, Abdulmotaleb El-Saddik, Ali Miri A Comprehensive Approach to Designing Internet Security Taxonomy. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17François-Xavier Standaert, Eric Peeters, Cédric Archambeau, Jean-Jacques Quisquater Towards Security Limits in Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Stefano Bistarelli, Marco Dall'Aglio, Pamela Peretti Strategic Games on Defense Trees. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Game Theory, Risk Analysis
17Sigrid Gürgens, Carsten Rudolph, Holger Vogt On the security of fair non-repudiation protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Fair non-repudiation, Security protocols, Protocol analysis, Protocol design
17Takamichi Saito Anti-SPAM System: Another Way of Preventing SPAM. Search on Bibsonomy DEXA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Abhinav Sarje, Deependra Choudhari, Shravan K. Rayanchu A Route Secure Parallel Dispatch Model for Mobile Agents Security. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Tae-Jun Park, Mun-Kyu Lee, Dowon Hong, Kyoil Chung A DPA Countermeasure by Randomized Frobenius Decomposition. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Tanja Lange 0001, Pradeep Kumar Mishra SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Catherine H. Gebotys, C. C. Tiu, X. Chen A Countermeasure for EM Attack of a Wireless PDA. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Brian Whitworth, Elizabeth Whitworth Spam and the Social-Technical Gap. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Shelby Evans, David V. Heinbuch, Elizabeth Kyule, John Piorkowski, James Wallner Risk-based Systems Security Engineering: Stopping Attacks with Intention. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Mordor, attack intentions, threat assessment, profiles, security systems
17Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
17Catherine H. Gebotys Low energy security optimization in embedded cryptographic systems. Search on Bibsonomy CODES+ISSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF embedded, smart cards, power analysis, countermeasure
17Pieter Spronck, Ida G. Sprinkhuizen-Kuyper, Eric O. Postma Enhancing the Performance of Dynamic Scripting in Computer Games. Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Susumu Konno, Yukio Iwaya, Toru Abe, Tetsuo Kinoshita Design of Network Management Support System based on Active Information Resource. Search on Bibsonomy AINA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack
17Nevine Maurice Ebeid, M. Anwar Hasan On Randomizing Private Keys to Counteract DPA Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF binary signed-digit representation, smart cards, Differential power analysis, elliptic curve cryptosystems, scalar multiplication
17Adrian Antipa, Daniel R. L. Brown, Alfred Menezes, René Struik, Scott A. Vanstone Validation of Elliptic Curve Public Keys. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Sigrid Gürgens, Carsten Rudolph, Holger Vogt On the Security of Fair Non-repudiation Protocols. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Mehdi-Laurent Akkar, Louis Goubin A Generic Protection against High-Order Differential Power Analysis. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF High-Order DPA, Smart-cards, Power analysis, DES
17Siddika Berna Örs, Elisabeth Oswald, Bart Preneel Power-Analysis Attacks on an FPGA - First Experimental Results. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Stephen D. Wolthusen Goalkeeper: Close-In Interface Protection. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasant G. Honavar, Les Miller, Robyn R. Lutz A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. Search on Bibsonomy Requir. Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Software fault tree, Mobile agents, Intrusion detection system, Requirements analysis, Coloured Petri nets
17Karl Brincat, Chris J. Mitchell New CBC-MAC Forgery Attacks. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis
17Bengt Carlsson, Rune Gustavsson Arms Race within Information Ecosystems. Search on Bibsonomy CIA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Elisabeth Oswald, Manfred Josef Aigner Randomized Addition-Subtraction Chains as a Countermeasure against Power Attacks. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptosystems, Power Analysis
17Thomas S. Messerges Securing the AES Finalists Against Power Analysis Attacks. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Ahlem Hamdi, Lamia Fourati, Samiha Ayed Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yinhao Jiang, Mir Ali Rezazadeh Baee, Leonie Ruth Simpson, Praveen Gauravaram, Josef Pieprzyk, Tanveer A. Zia, Zhen Zhao 0005, Zung Le Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures. Search on Bibsonomy Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Jueshuai Wang Spillover effects of liquidity management in major economies and China's digital economy-driven countermeasures. Search on Bibsonomy Kybernetes The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yue Wang 0051, Fuping Sun, Xian Wang Defensive Performance Evaluation Methods of the GNSS for Satellite Navigation Countermeasures. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Nimra Tabish, Chaur-Luh Tsai Maritime Autonomous Surface Ships: A Review of Cybersecurity Challenges, Countermeasures, and Future Perspectives. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13David Cemernek, Shafaq Siddiqi, Roman Kern Effects of Class Imbalance Countermeasures on Interpretability. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Lip Yee Por, Ian Ouii Ng, Yen-Lin Chen, Jing Yang, Chin Soon Ku A Systematic Literature Review on the Security Attacks and Countermeasures Used in Graphical Passwords. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Koh Watanabe, Ryota Sakai, Satoshi Tanaka, Makoto Nagata, Hideki Osaka, Atsushi Nakamura, Ifong Wu, Yasushi Matsumoto, Kaoru Gotoh Electromagnetic Interference With the Mobile Communication Devices in Unmanned Aerial Vehicles and Its Countermeasures. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Pooja Ahuja, Preeti Sethi, Naresh Chauhan A comprehensive survey of security threats, detection, countermeasures, and future directions for physical and network layers in cognitive radio networks. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yiwen Ma, Ruohan Cao, Hui Gao 0001, Yueming Lu Physical-Layer Attack Detection and Countermeasures for RIS-Assisted MIMO Systems. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Saman Iftikhar Cyberterrorism as a global threat: a review on repercussions and countermeasures. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Kuan-Chu Lu, I-Hsien Liu, Keng-Hao Chang, Jung-Shian Li VoWi-Fi security threats: Address resolution protocol attack and countermeasures. Search on Bibsonomy IET Networks The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Fuyi Qu, Nachuan Yang, Jun Fu 0001, Hao Liu 0012, Yuzhe Li Stealthy Attack on Remote Control System With Local Controller and Its Countermeasures. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 2446 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license