|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3452 occurrences of 1510 keywords
|
|
|
Results
Found 7297 publication records. Showing 7297 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
30 | Fabiano Atalla, Daniel Miranda, Jussara M. Almeida, Marcos André Gonçalves, Virgílio A. F. Almeida |
Analyzing the impact of churn and malicious behavior on the quality of peer-to-peer web search. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
malicious behavior, peer-to-peer systems, web search engines, churn |
30 | Idris M. Atakli, Hongbing Hu, Yu Chen 0002, Wei-Shinn Ku, Zhou Su |
Malicious node detection in wireless sensor networks using weighted trust evaluation. |
SpringSim |
2008 |
DBLP DOI BibTeX RDF |
hierarchical topology, malicious node detection, wireless sensor networks, network security |
30 | Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch |
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. |
TRUST |
2008 |
DBLP DOI BibTeX RDF |
Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle |
30 | David P. Woodruff |
Revisiting the Efficiency of Malicious Two-Party Computation. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
malicious model, efficiency, expander graphs, secure function evaluation |
29 | Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu |
How to Secure Your Email Address Book and Beyond. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
self-spreading malicious emails, self-replicating malicious emails, email address book, encryption |
26 | Oly Mistry, Anil Gürsel, Sandip Sen |
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks. |
AAMAS (2) |
2009 |
DBLP BibTeX RDF |
sensor networks, learning, data integrity, reputation |
26 | Sun Choi, Doo-young Kim, Do Hyeon Lee, Jae-Il Jung |
WAP: Wormhole Attack Prevention Algorithm in Mobile Ad Hoc Networks. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
wormhole tunnel, ad hoc networks, wormhole attack, route discovery, qualnet |
26 | Hiroaki Kikuchi, Masato Terada, Naoya Fukuno, Norihisa Doi |
Estimation of Behavior of Scanners Based on ISDAS Distributed Sensors. |
OTM Conferences (2) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic |
Noxes: a client-side solution for mitigating cross-site scripting attacks. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Mudhakar Srivatsa, Li Xiong 0001, Ling Liu 0001 |
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. |
WWW |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Ke Chen 0005, Gang Chen 0001, Jinxiang Dong |
An Immunity-Based Intrusion Detection Solution for Database Systems. |
WAIM |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo |
On Securing RTP-Based Streaming Content with Firewalls. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
streaming content, Network security, firewall |
26 | Alan A. Jorgensen |
Testing with hostile data streams. |
ACM SIGSOFT Softw. Eng. Notes |
2003 |
DBLP DOI BibTeX RDF |
Adobe Acrobat Reader, software testing, steganography, random testing, buffer overflow, internet security, buffer overrun |
26 | Nak Hee Seong, Dong Hyuk Woo, Hsien-Hsin S. Lee |
Security refresh: prevent malicious wear-out and increase durability for phase-change memory with dynamically randomized address mapping. |
ISCA |
2010 |
DBLP DOI BibTeX RDF |
dynamic address remapping, security, phase change memory, wear leveling |
26 | Alper Tugay Mizrak, Stefan Savage, Keith Marzullo |
Detecting Malicious Packet Losses. |
IEEE Trans. Parallel Distributed Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Weiping Wang 0003, Jinhong Xu, Jianxin Wang 0001 |
Detection and location of malicious nodes based on source coding and multi-path transmission in WSN. |
HPCC |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan White, Brajendra Panda |
Automatic Identification of Critical Data Items in a Database to Mitigate the Effects of Malicious Insiders. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Boris Rozenberg, Ehud Gudes, Yuval Elovici, Yuval Fledel |
Method for Detecting Unknown Malicious Executables. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Vincenza Carchiolo, Alessandro Longheu, Michele Malgeri, Giuseppe Mangioni |
The effect of malicious peers in a gossip-based reputation system. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
peer-to-peer, trust, reputation, gossip |
26 | Mihai Christodorescu, Somesh Jha, Christopher Kruegel |
Mining specifications of malicious behavior. |
ISEC |
2008 |
DBLP DOI BibTeX RDF |
behavior-based detection, malspec, differential analysis |
26 | Jingbo Zhang, Rongcai Zhao, Jianmin Pang, Wen Fu |
Formal Abstraction of Semantics for Detecting Malicious Code. |
CSSE (2) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Xiaoxiao Wang 0001, Mohammad Tehranipoor, Jim Plusquellic |
Detecting Malicious Inclusions in Secure Hardware: Challenges and Solutions. |
HOST |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Marc Mouffron, Frederic Rousseau 0002, Huafei Zhu |
Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Squared Euclidean Distance, Stand-alone and simulation-based model, Secure two-party computation |
26 | M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq |
Extended thymus action for improving response of AIS based NID system against malicious traffic. |
IEEE Congress on Evolutionary Computation |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Syed A. Khayam, Hayder Radha |
Using Session-Keystroke Mutual Information to Detect Self-Propagating Malicious Codes. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Xu Su, Rajendra V. Boppana |
On identifying malicious nodes in ad hoc networks. |
IWCMC |
2007 |
DBLP DOI BibTeX RDF |
ad hoc networks, secure routing protocols |
26 | Gian Paolo Jesi, David Hales, Maarten van Steen |
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service. |
SASO |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Yingpeng Sang, Hong Shen 0001 |
Privacy Preserving Set Intersection Protocol Secure against Malicious Behaviors. |
PDCAT |
2007 |
DBLP DOI BibTeX RDF |
privacy preserva- tion, distributed datasets, cryptographic protocol, zero-knowledge proof, set intersection |
26 | Velik Bellemin, Tadashi Araragi |
CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack. |
DepCoS-RELCOMEX |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Ioannis Xydas, Georgios Miaoulis, Pierre-François Bonnefoi, Dimitri Plemenos, Djamchid Ghazanfarpour |
3D Graph Visualisation of Web Normal and Malicious Traffic. |
IV |
2006 |
DBLP DOI BibTeX RDF |
Web visualisation, web attacks, surveillance aid, neural networks, intrusion detection, network security, expert systems, anomaly detection, web security |
26 | Sirish A. Kondi, Yoginder S. Dandass |
Scanning workstation memory for malicious codes using dedicated coprocessors. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
FPGA, intrusion detection, coprocessor, signature matching |
26 | Erhan J. Kartaltepe, Shouhuai Xu |
Towards Blocking Outgoing Malicious Impostor Emails. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
|
26 | István Zsolt Berta |
Using Multiple Smart Cards for Signing Messages at Malicious Terminals. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Xing Jin, S.-H. Gary Chan, Wai-Pun Ken Yiu, Yongqiang Xiong, Qian Zhang 0001 |
Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming. |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Felipe S. Martins, Márcio Maia, Rossana M. de Castro Andrade, Aldri L. dos Santos, José Neuman de Souza |
Detecting Malicious Manipulation in Grid Environments. |
SBAC-PAD |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Boyun Zhang, Jianping Yin, Jingbo Hao |
Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. |
FSKD (1) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Marco Vieira, Henrique Madeira |
Detection of Malicious Transactions in DBMS. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Waldir Ribeiro Pires Júnior, Thiago H. de Paula Figueiredo, Hao Chi Wong, Antonio Alfredo Ferreira Loureiro |
Malicious Node Detection in Wireless Sensor Networks. |
IPDPS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Bobi Gilburd, Assaf Schuster, Ran Wolff 0001 |
Privacy-Preserving Data Mining on Data Grids in the Presence of Malicious Participants. |
HPDC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Joel Sommers, Vinod Yegneswaran, Paul Barford |
A framework for malicious workload generation. |
Internet Measurement Conference |
2004 |
DBLP DOI BibTeX RDF |
traffic generation, network intrusions |
26 | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné |
Host Revocation Authority: A Way of Protecting Mobile Agents from Malicious Hosts. |
ICWE |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Oscar Esparza, Miguel Soriano, Jose L. Muñoz, Jordi Forné |
Protocols for Malicious Host Revocation. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Mikhail Nesterenko, Anish Arora |
Dining Philosophers that Tolerate Malicious Crashes. |
ICDCS |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Matthew Schmid, Frank Hill, Anup K. Ghosh |
Protecting Data from Malicious Software. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Mohammad A. Al-Hashimi, Huay-min H. Pu, Nohpill Park, Fabrizio Lombardi |
Dependability under Malicious Agreement in N-modular Redundancy-on-Demand Systems. |
NCA |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Fabrizio Lombardi, Nohpill Park, Mohammad A. Al-Hashimi, Huay-min H. Pu |
Modeling the Dependability of N-Modular Redundancy on Demand under Malicious Agreement. |
PRDC |
2001 |
DBLP DOI BibTeX RDF |
|
25 | Seth Gilbert, Rachid Guerraoui, Calvin C. Newport |
Of Malicious Motes and Suspicious Sensors: On the Efficiency of Malicious Interference in Wireless Networks. |
OPODIS |
2006 |
DBLP DOI BibTeX RDF |
|
25 | Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye |
Preventing drive-by download via inter-module communication monitoring. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download |
25 | Yumin Yuan, Da Li, Liwen Tian, Haishan Zhu |
Certificateless Signature Scheme without Random Oracles. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Malicious KGC attack, Random oracle, Certificateless signatures |
25 | Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
malicious script, shellcode, emulation, Drive-by download |
25 | Piyi Yang, Zhenfu Cao, Xiaolei Dong |
Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
certificateless threshold encryption, malicious KGC attack, standard model, chosen ciphertext attack |
25 | Weiqing Sun, R. Sekar 0001, Zhenkai Liang, V. N. Venkatakrishnan |
Expanding Malware Defense by Securing Software Installations. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
Untrusted code, Software installation, Malicious code, Sandboxing |
25 | Michael P. O'Mahony, Barry Smyth |
Collaborative web search: a robustness analysis. |
Artif. Intell. Rev. |
2007 |
DBLP DOI BibTeX RDF |
Malicious attack, Robustness, Personalisation, Collaborative web search |
25 | Nima Haghpanah, Masoud Akhoondi, Mehdi Kargar, Ali Movaghar 0001 |
Trusted secure routing for ad hoc networks. |
MOBIWAC |
2007 |
DBLP DOI BibTeX RDF |
incentive approach, reputation, malicious nodes, selfish behavior |
25 | Shejie Lu, Jun Li, Zhiyuan Liu, Guohua Cui |
A Secure Data Transmission Protocol for Mobile Ad Hoc Networks. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
secure data transmission, malicious behavior judgment, Ad Hoc network, intrusion detection |
25 | Natalya Fedotova, Marco Bertucci, Luca Veltri |
Reputation Management Techniques in DHT-Based Peer-to-Peer Networks. |
ICIW |
2007 |
DBLP DOI BibTeX RDF |
DHT-based overlay networks, reputation evaluation techniques, applicability, attacks, malicious node |
25 | Jie Xu 0007, Erica Y. Yang, Keith H. Bennett |
A Practical Approach to Secure Web Services. |
ISORC |
2006 |
DBLP DOI BibTeX RDF |
Attack tolerance, malicious attacks, Web services, privacy protection, distributed information retrieval |
25 | Vinh The Lam, Spyros Antonatos, Periklis Akritidis, Kostas G. Anagnostakis |
Puppetnets: misusing web browsers as a distributed attack infrastructure. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
web security, malicious software, distributed attacks |
25 | Michael P. O'Mahony, Neil J. Hurley, Guenole C. M. Silvestre |
Detecting noise in recommender system databases. |
IUI |
2006 |
DBLP DOI BibTeX RDF |
malicious attacks, robustness, performance measures, noise detection, collaborative recommender systems |
25 | Huafei Zhu, Feng Bao 0001, Tieyan Li, Ying Qiu |
More on Shared-Scalar-Product Protocols. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Malicious model, shared-scalar-product protocol, provably secure |
25 | Richard Ford, Sarah Gordon |
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
business models, worm, virus, spyware, malicious code, adware |
25 | Rajesh Yalamanchili, Brajendra Panda |
Transaction Fusion: A Model for Data Recovery from Information Attacks. |
J. Intell. Inf. Syst. |
2004 |
DBLP DOI BibTeX RDF |
malicious transaction, affected transaction, fused transaction, damage assessment and recovery, schedule |
25 | Ruiqi Hu, Aloysius K. Mok |
Detecting Unknown Massive Mailing Viruses Using Proactive Methods. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
malicious executable detection, intrusion detection, virus detection |
25 | Jason C. Hung, Kuan-Cheng Lin, Anthony Y. Chang, Nigel H. Lin, Louis H. Lin |
A Behavior-Based Anti-Worm System. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
Lambent Anti-Worm System (LAWS), Malicious worm, Mobile Agent, Intrusion Detection System (IDS) |
25 | Volker Roth 0002, Vania Conan |
Encrypting Java Archives and Its Application to Mobile Agent Security. |
AgentLink |
2001 |
DBLP DOI BibTeX RDF |
Java Archives, encryption, mobile agent security, malicious hosts |
25 | Junho Choi, Hayoung Kim, Chang Choi, Pankoo Kim |
Efficient Malicious Code Detection Using N-Gram Analysis and SVM. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
SVM, N-Gram, Malicious Code Detection |
25 | Jungsuk Song, Daisuke Inoue, Masashi Eto, Hyung Chan Kim, Koji Nakao |
An Empirical Study of Spam : Analyzing Spam Sending Systems and Malicious Web Servers. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
spam sending systems, malicious Web servers, clustering, spam |
25 | Shui Cao, Xueguang Zhou, Yan Sun, Huanguo Zhang |
Research on Chinese Key Words Mining with Malicious Jamming in English. |
IFITA (3) |
2009 |
DBLP DOI BibTeX RDF |
keyword mining, malicious jamming in English, Chinese information processing, data base technology, network security |
25 | Dongju Ryu, Minsoo Kim 0002, Yongmin Kim 0005 |
An Automatic Identification of a Damaged Malicious File Using HMM against Anti-Forensics. |
NCM (1) |
2008 |
DBLP DOI BibTeX RDF |
Anti-Forensics, Damaged Malicious File, File Recovery, Identification File Type, Forensics |
25 | Xiaobing Zhang, Shyhtsun Felix Wu, Zhi Fu, Tsung-Li Wu |
Malicious Packet Dropping: How It Might Impact the TCP Performance and How We Can Detect It. |
ICNP |
2000 |
DBLP DOI BibTeX RDF |
malicious packet dropping, dropping attack, severe damage, Internet environment, statistical analysis module, session delay, Internet, statistical analysis, transport protocols, packet switching, position, router, TCP performance, telecommunication security, hacker, detection performance, packet reorderings, denial of service attacks |
25 | Nagesh Vasanthavada, Peter N. Marinos |
Synchronization of Fault-Tolerant Clocks in the Presence of Malicious Failures. |
IEEE Trans. Computers |
1988 |
DBLP DOI BibTeX RDF |
fault-tolerant clocks, clock partitions, clock-receiver triggering, phase-detector operating range, averaging rule, simulations, fault tolerant computing, logic testing, synchronisation, synchronisation, clocks, malicious failures |
21 | Dan Alistarh, Seth Gilbert, Rachid Guerraoui, Zarko Milosevic 0001, Calvin C. Newport |
Securing every bit: authenticated broadcast in radio networks. |
SPAA |
2010 |
DBLP DOI BibTeX RDF |
wireless networks, broadcast, byzantine faults |
21 | Loubna Mekouar, Youssef Iraqi, Raouf Boutaba |
A contribution-based service differentiation scheme for peer-to-peer systems. |
Peer-to-Peer Netw. Appl. |
2009 |
DBLP DOI BibTeX RDF |
Trust, Availability, Reputation, Peer-to-peer systems, Involvement, Contribution |
21 | Bhaskar Mehta, Wolfgang Nejdl |
Unsupervised strategies for shilling detection and robust collaborative filtering. |
User Model. User Adapt. Interact. |
2009 |
DBLP DOI BibTeX RDF |
PCA, Collaborative filtering, Dimensionality reduction, Robust statistics, PLSA, Shilling |
21 | Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter 0001 |
Filter-resistant code injection on ARM. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
alphanumeric shellcode, filter-resistance, turing completeness |
21 | Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Farooq |
IMAD: in-execution malware analysis and detection. |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
classification, malware, system call |
21 | Visvasuresh Victor Govindaswamy, Gergely V. Záruba, G. Balasekaran |
Receiver Window Modified Random Early Detection queues with RECHOKe. |
CCECE |
2009 |
DBLP DOI BibTeX RDF |
|
21 | YoungHan Choi, TaeGhyoon Kim, Seokjin Choi, Cheolwon Lee |
Automatic Detection for JavaScript Obfuscation Attacks in Web Pages through String Pattern Analysis. |
FGIT |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Donggang Liu, Peng Ning, An Liu, Cliff Wang, Wenliang Du |
Attack-Resistant Location Estimation in Wireless Sensor Networks. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, localization |
21 | Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham D. Flaxman |
SybilGuard: defending against sybil attacks via social networks. |
IEEE/ACM Trans. Netw. |
2008 |
DBLP DOI BibTeX RDF |
SybilGuard, sybil identity, social networks, sybil attack |
21 | Yan Zhou, W. Meador Inge |
Malware detection using adaptive data compression. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
statistical data compression, machine learning, malware detection |
21 | Vasilis Pappas, Elias Athanasopoulos, Sotiris Ioannidis, Evangelos P. Markatos |
Compromising Anonymity Using Packet Spinning. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Piyush Agrawal, Ratan K. Ghosh, Sajal K. Das 0001 |
Cooperative black and gray hole attacks in mobile ad hoc networks. |
ICUIMC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Li Liang 0003, Qi Qi 0003 |
Cooperative or Vindictive: Bidding Strategies in Sponsored Search Auction. |
WINE |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Gaeil An, Joon S. Park |
Cooperative Component Testing Architecture in Collaborating Network Environment. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Martin Rehák, Michal Pechoucek, Karel Bartos, Martin Grill, Pavel Celeda |
Network Intrusion Detection by Means of Community of Trusting Agents. |
IAT |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Hengfu Yang, Xingming Sun, Bin Wang, Zheng Qin 0001 |
An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection. |
ICCSA (3) |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Hengfu Yang, Xingming Sun |
Semi-Fragile Watermarking for Image Authentication and Tamper Detection Using HVS Model. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Kun Sun 0001, Peng Ning, Cliff Wang |
Secure and resilient clock synchronization in wireless sensor networks. |
IEEE J. Sel. Areas Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Hongmei Liu 0001, Ling Zhu, Jiwu Huang |
A Hybrid Watermarking Scheme for Video Authentication. |
ICIP |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Ching Lin, Vijay Varadharajan |
Trust Based Risk Management for Distributed System Security - A New Approach. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
21 | J. Lane Thames, Randal T. Abler, Ashraf Saad |
Hybrid intelligent systems for network security. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
self-organizing map, intrusion detection systems, Bayesian learning, hybrid-intelligent systems |
21 | Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman |
SybilGuard: defending against sybil attacks via social networks. |
SIGCOMM |
2006 |
DBLP DOI BibTeX RDF |
sybil identity, sybilGuard, social networks, sybil attack |
21 | Ying Zhang 0022, Evan Cooke, Zhuoqing Morley Mao |
Internet-scale malware mitigation: combining intelligence of the control and data plane. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
internet motion sensor, routing anomaly, network security, BGP, computer worms |
21 | Huirong Tian, Shihong Zou, Wendong Wang, Shiduan Cheng |
A Group Based Reputation System for P2P Networks. |
ATC |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Abhijit Bose, Kang G. Shin |
Proactive security for mobile messaging networks. |
Workshop on Wireless Security |
2006 |
DBLP DOI BibTeX RDF |
SMS/MMS, mobile viruses, worms, containment, Instant Messaging (IM), proactive security |
21 | Kevin Kane, James C. Browne |
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks. |
Workshop on Wireless Security |
2006 |
DBLP DOI BibTeX RDF |
peer-to-peer, trust, uncertainty, cooperation, reputation, Ad-hoc, subjective logic |
21 | Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad Verbowski, Helen J. Wang, Jacob R. Lorch |
SubVirt: Implementing malware with virtual machines. |
S&P |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Donggang Liu, Peng Ning, Wenliang Du |
Attack-resistant location estimation in sensor networks. |
IPSN |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Bruce C. Trapnell Jr. |
A Peer-to-Peer Blacklisting Strategy Inspired by Leukocyte-Endothelium Interaction. |
ICARIS |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 7297 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|