The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "SecureComm"( http://dblp.L3S.de/Venues/SecureComm )

URL (DBLP): http://dblp.uni-trier.de/db/conf/securecomm

Publication years (Num. hits)
2005 (51) 2006 (56) 2007 (62) 2008 (43) 2009 (27) 2010 (29) 2011 (36) 2012 (22) 2013 (28) 2015 (49) 2016 (49) 2017 (47) 2018-2022 (44) 2023 (1)
Publication types (Num. hits)
inproceedings(531) proceedings(13)
Venues (Conferences, Journals, ...)
SecureComm(544)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 544 publication records. Showing 544 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nicolas Van Balen, Christopher T. Ball, Haining Wang A Behavioral Biometrics Based Approach to Online Gender Classification. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Russell W. F. Lai, Sherman S. M. Chow Parallel and Dynamic Structured Encryption. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yanhong He, Xianyi Zheng, Ziyuan Zhu, Gang Shi TZ-SSAP: Security-Sensitive Application Protection on Hardware-Assisted Isolated Environment. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mozammel Chowdhury, Junbin Gao, Rafiqul Islam 0002 Biometric Authentication Using Facial Recognition. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Biplob R. Ray, Morshed U. Chowdhury, Jemal H. Abawajy A Multi-protocol Security Framework to Support Internet of Things. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tao Zhang 0014, Xiuhua Wang 0001, Sherman S. M. Chow Privacy-Preserving Multi-pattern Matching. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhengyang Qu, Guanyu Guo, Zhengyue Shao, Vaibhav Rastogi, Yan Chen 0004, Hao Chen 0003, Wangjun Hong AppShield: Enabling Multi-entity Access Control Cross Platforms for Mobile App Management. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zheng Xiao, Cheng Wang 0001, Weili Han, Changjun Jiang Unique on the Road: Re-identification of Vehicular Location-Based Metadata. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jianming Fu, Yan Lin 0003, Xu Zhang 0008 Impact of Environment on Branch Transfer of Software. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fidel Ikundi, Rafiqul Islam 0002, Peter White Platform as a Service (PaaS) in Public Cloud: Challenges and Mitigating Strategy. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhiqiang Li, Lichao Sun 0001, Qiben Yan, Witawas Srisa-an, Zhenxiang Chen DroidClassifier: Efficient Adaptive Mining of Application-Layer Header for Classifying Android Malware. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ivan Homoliak, Martin Teknos, Maros Barabas, Petr Hanácek Exploitation of NetEm Utility for Non-payload-based Obfuscation Techniques Improving Network Anomaly Detection. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nathaniel Lageman, Eric D. Kilmer, Robert J. Walls, Patrick D. McDaniel BinDNN: Resilient Function Matching Using Deep Learning. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lorena González-Manzano, José María de Fuentes, Kim-Kwang Raymond Choo ase-PoW: A Proof of Ownership Mechanism for Cloud Deduplication in Hierarchical Environments. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ling Yang, Fuyang Fang, Xianhui Lu, Wen Tao Zhu, Qiongxiao Wang, Shen Yan, Shiran Pan A Secure and Fast Dispersal Storage Scheme Based on the Learning with Errors Problem. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Juan Ai, Zhu Wang 0005, Xinping Zhou, Changhai Ou POSTER: A Novel Wavelet Denoising Method Based on Robust Principal Component Analysis in Side Channel Attacks. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sang-Yoon Chang, Shaoying Cai, Hwajeong Seo, Yih-Chun Hu Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fei Peng, Le Qin, Min Long POSTER: Non-intrusive Face Spoofing Detection Based on Guided Filtering and Image Quality Analysis. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Assad Umar, Iakovos Gurulian, Keith Mayes, Konstantinos Markantonakis Tokenisation Blacklisting Using Linkable Group Signatures. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yacong Gu, Yao Cheng, Lingyun Ying, Yemian Lu, Qi Li 0002, Purui Su Exploiting Android System Services Through Bypassing Service Helpers. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hui Cui 0001, Robert H. Deng, Xuhua Ding, Yingjiu Li Attribute-Based Encryption with Granular Revocation. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jiangyong Shi, Yuexiang Yang Architecture Support for Controllable VMI on Untrusted Cloud. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yongfeng Li, Jinbin Ouyang, Shanqing Guo, Bing Mao Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mark J. Carman, Kim-Kwang Raymond Choo Tinder Me Softly - How Safe Are You Really on Tinder? Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xing Liu, Sencun Zhu, Wei Wang 0012, Jiqiang Liu Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yao Liu, Ming Xu 0001, Jian Xu 0001, Ning Zheng 0001, Xiaodong Lin 0001 SQLite Forensic Analysis Based on WAL. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shaoyong Du, Yue Gao, Jingyu Hua, Sheng Zhong 0002 Secure Keyboards Against Motion Based Keystroke Inference Attack. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Damien Ligier, Sergiu Carpov, Caroline Fontaine, Renaud Sirdey Privacy Preserving Data Classification Using Inner Product Encryption. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jing Yang 0032, Yuan Ma, Tianyu Chen, Jingqiang Lin, Jiwu Jing Extracting More Entropy for TRNGs Based on Coherent Sampling. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hailiang Fu, Guoqiang Bai 0001, Xingjun Wu A Very Compact Masked S-Box for High-Performance Implementation of SM4 Based on Composite Field. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto Website Forensic Investigation to Identify Evidence and Impact of Compromise. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kamini (Simi) Bajaj A Multi-layer Model to Detect Spam Email at Client Side. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Qinglong Zhang, Zongbin Liu, Cunqing Ma, Changting Li, Lingchen Zhang FROPUF: How to Extract More Entropy from Two Ring Oscillators in FPGA-Based PUFs. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Muqing Liu, Yuanyuan Zhang 0002, Juanru Li, Junliang Shu, Dawu Gu Security Analysis of Vendor Customized Code in Firmware of Embedded Device. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peizhao Hu, Siyu Zhu POSTER: Location Privacy Using Homomorphic Encryption. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1TungNgai Miu, Chenxu Wang, Daniel Xiapu Luo, Jinhe Wang Modeling User Browsing Activity for Application Layer DDoS Attack Detection. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Enrico Bacis, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Marco Rosa, Pierangela Samarati Access Control Management for Secure Cloud Storage. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nicolae Paladi, Christian Gehrmann TruSDN: Bootstrapping Trust in Cloud Network Infrastructure. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tianjun Wu, Yuexiang Yang IacCE: Extended Taint Path Guided Dynamic Analysis of Android Inter-App Data Leakage. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jianbing Ni, Kuan Zhang 0001, Xiaodong Lin 0001, Yong Yu 0002, Xuemin (Sherman) Shen Cloud-Based Privacy-Preserving Parking Navigation Through Vehicular Communications. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peng Chen 0034, Hao Chen 0003 POSTER: Security Analysis of Personal Unmanned Aerial Vehicles. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kai Cao, Yunchun Li, Hailong Yang, Jiqiang Tang, Xiaoxiang Zou POSTER: An Online Prefix-Preserving IP Address Anonymization Algorithm for Passive Measurement Systems. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Oliver Stecklina, Peter Langendörfer, Frank Vater, Thorsten Kranz, Gregor Leander Intrinsic Code Attestation by Instruction Chaining for Embedded Devices. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xiaojun Xiao, Yaping Lin, Wei Zhang 0074, Xin Yao 0002, Qi Gu Authenticating Top-k Results of Secure Multi-keyword Search in Cloud Computing. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chanwoo Bae, Jesung Jung, Jaehyun Nam, Seungwon Shin POSTER: A Collaborative Approach on Behavior-Based Android Malware Detection. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xuejie Ding, Wei-qing Huang, Meng Zhang 0020, Jianlin Zhao POSTER: A Security Adaptive Steganography System Applied on Digital Audio. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carlos Garcia Cordero, Emmanouil Vasilomanolakis, Max Mühlhäuser, Mathias Fischer 0001 Community-Based Collaborative Intrusion Detection. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuan Zhang 0009, Min Yang 0002, Guofei Gu, Hao Chen 0003 FineDroid: Enforcing Permissions with System-Wide Application Execution Context. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Indrajeet Singh, Masoud Akhoondi, Mustafa Y. Arslan, Harsha V. Madhyastha, Srikanth V. Krishnamurthy Resource Efficient Privacy Preservation of Online Social Media Conversations. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuejian Fang, Zilong Wen, Qingni Shen, Yahui Yang, Zhonghai Wu POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Stefan Craß, Gerson Joskowicz, Eva Kühn A Decentralized Access Control Model for Dynamic Collaboration of Autonomous Peers. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dongdong Tian, Xiaohong Li 0001, Jing Hu 0007, Guangquan Xu, Zhiyong Feng 0002 POSTER: API-Level Multi-policy Access Control Enforcement for Android Middleware. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yoann Bertrand, Mireille Blay-Fornarino, Karima Boudaoud, Michel Riveill Generation of Transmission Control Rules Compliant with Existing Access Control Policies. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yongzheng Zhang 0002, Tao Xu, Yipeng Wang 0001, Jianliang Sun, Xiaoyu Zhang 0002 A Markov Random Field Approach to Automated Protocol Signature Inference. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Degang Sun, Xinping Zhou, Zhu Wang 0005, Changhai Ou, Wei-qing Huang, Juan Ai POSTER: Using Improved Singular Value Decomposition to Enhance Correlation Power Analysis. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1André Ebert, Chadly Marouane, Benno Rott, Martin Werner 0001 KeyPocket - Improving Security and Usability for Provider Independent Login Architectures with Mobile Devices. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hugo Gascon, Christian Wressnegger, Fabian Yamaguchi, Daniel Arp, Konrad Rieck Pulsar: Stateful Black-Box Fuzzing of Proprietary Network Protocols. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ahmad Atamli-Reineh, Andrew P. Martin Securing Application with Software Partitioning: A Case Study Using SGX. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jinkun Geng, Daren Ye, Ping Luo, Pin Lv A Novel Clustering Algorithm for Database Anomaly Detection. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vaibhav Rastogi, Zhengyang Qu, Jedidiah McClurg, Yinzhi Cao, Yan Chen 0004 Uranine: Real-time Privacy Leakage Monitoring without System Modification for Android. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xing Zhang 0002, Cancan Jin, Cong Li, Zilong Wen, Qingni Shen, Yuejian Fang, Zhonghai Wu Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Vitaly Ford, Ambareen Siraj POSTER: Reliable and Efficient Protection of Consumer Privacy in Advanced Metering Infrastructure. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dae Wook Kim, Junjie Zhang 0004 You Are How You Query: Deriving Behavioral Fingerprints from DNS Traffic. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mozammel Chowdhury, Junbin Gao, Rafiqul Islam 0002 Human Surveillance System for Security Application. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohsen Alimomeni, Reihaneh Safavi-Naini How to Prevent to Delegate Authentication. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chao Yang 0022, Guangliang Yang 0001, Ashish Gehani, Vinod Yegneswaran, Dawood Tariq, Guofei Gu Using Provenance Patterns to Vet Sensitive Behaviors in Android Apps. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chunqiang Hu, Xiuzhen Cheng 0001, Zhi Tian, Jiguo Yu, Kemal Akkaya, Limin Sun An Attribute-Based Signcryption Scheme to Secure Attribute-Defined Multicast Communications. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lin Yan, Yao Guo 0001, Xiangqun Chen SplitDroid: Isolated Execution of Sensitive Components for Mobile Applications. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Apala Ray, Johan Åkerberg, Mats Björkman, Mikael Gidlund POSTER: An Approach to Assess Security, Capacity and Reachability for Heterogeneous Industrial Networks. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yongbo Li, Fan Yao, Tian Lan, Guru Venkataramani POSTER: Semantics-Aware Rule Recommendation and Enforcement for Event Paths. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ashton Webster, Margaret Gratian, Ryan Eckenrod, Daven Patel, Michel Cukier An Improved Method for Anomaly-Based Network Scan Detection. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mozammel Chowdhury, Junbin Gao, Morshed U. Chowdhury Image Spam Classification Using Neural Network. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gustavo Gonzalez Granadillo, Joaquín García-Alfaro, Hervé Debar Using a 3D Geometrical Model to Improve Accuracy in the Evaluation and Selection of Countermeasures Against Complex Cyber Attacks. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1M. Arif Khan, Rafiqul Islam 0002 Secrecy Rate Based User Selection Algorithms for Massive MIMO Wireless Networks. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Priyabrat Dash, Chris Perkins, Ryan M. Gerdes Remote Activation of Hardware Trojans via a Covert Temperature Channel. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bhavani Thuraisingham, XiaoFeng Wang 0001, Vinod Yegneswaran (eds.) Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yongfeng Li, Tong Shen, Xin Sun, Xuerui Pan, Bing Mao Detection, Classification and Characterization of Android Malware Using API Data Dependency. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Karim Emara, Wolfgang Woerndl, Johann H. Schlichter POSTER: Context-Adaptive User-Centric Privacy Scheme for VANET. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Khandakar Rabbi, Quazi Mamun An Effective t-way Test Data Generation Strategy. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jidong Xiao, Hai Huang 0002, Haining Wang Defeating Kernel Driver Purifier. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Juan D. Parra Rodriguez, Joachim Posegga Why Web Servers Should Fear Their Clients - Abusing Websockets in Browsers for DoS. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ala' F. A. Aburumman, Wei Jye Seo, Md. Rafiqul Islam 0001, Muhammad Khurram Khan, Kim-Kwang Raymond Choo A Secure Cross-Domain SIP Solution for Mobile Ad Hoc Network Using Dynamic Clustering. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lei Yang 0037, Fengjun Li Enhancing Traffic Analysis Resistance for Tor Hidden Services with Multipath Routing. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yueqiang Cheng, Qing Li, Miao Yu, Xuhua Ding, Qingni Shen SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hong Liu, Hongmin Li 0001, Eugene Y. Vasserman Practicality of Using Side-Channel Analysis for Software Integrity Checking of Embedded Systems. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Song Li, Hai-Xin Duan, Zhiliang Wang, Xing Li 0001 Route Leaks Identification by Detecting Routing Loops. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ben Townsend, Jemal H. Abawajy Security Considerations for Wireless Carrier Agonistic Bio-Monitoring Systems. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jidong Xiao, Hai Huang 0002, Haining Wang Kernel Data Attack Is a Realistic Security Threat. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hao Sun 0004, Xiaofeng Wang 0002, Jinshu Su, Peixin Chen RScam: Cloud-Based Anti-Malware via Reversible Sketch. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Geng Tian, Zhiliang Wang, Xia Yin, Zimu Li, Xingang Shi, Ziyi Lu, Chao Zhou, Yang Yu, Dan Wu TADOOP: Mining Network Traffic Anomalies with Hadoop. Search on Bibsonomy SecureComm The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Fei Wang, Liusheng Huang, Zhili Chen, Haibo Miao, Wei Yang 0011 A Novel Web Tunnel Detection Method Based on Protocol Behaviors. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Niels Avonds, Raoul Strackx, Pieter Agten, Frank Piessens Salus: Non-hierarchical Memory Access Rights to Enforce the Principle of Least Privilege. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aude Plateaux, Patrick Lacharme, Vincent Coquet, Sylvain Vernois, Kumar Murty, Christophe Rosenberger An e-payment Architecture Ensuring a High Level of Privacy Protection. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Miao Li, Liangsheng He, Tongjie Yang, Neng Gao, Zongbin Liu, Qinglong Zhang An Efficient Reconfigurable II-ONB Modular Multiplier. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Minghua Wang, Purui Su, Qi Li 0002, Lingyun Ying, Yi Yang 0040, Dengguo Feng Automatic Polymorphic Exploit Generation for Software Vulnerabilities. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jun Jiang, Meining Nie, Purui Su, Dengguo Feng VCCBox: Practical Confinement of Untrusted Software in Virtual Cloud Computing. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Eirini D. Karapistoli, Anastasios A. Economides Anomaly Detection in Beacon-Enabled IEEE 802.15.4 Wireless Sensor Networks. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xin Ruan, Chuan Yue, Haining Wang Unveiling Privacy Setting Breaches in Online Social Networks. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vijay Varadharajan, Udaya Kiran Tupakula Integrated Security Architecture for Virtual Machines. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mehari Msgna, Konstantinos Markantonakis, Keith Mayes The B-Side of Side Channel Leakage: Control Flow Security in Embedded Systems. Search on Bibsonomy SecureComm The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 544 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license