The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attack with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1979 (15) 1980-1984 (18) 1985 (16) 1986-1987 (20) 1988 (19) 1989 (17) 1990 (27) 1991 (28) 1992 (20) 1993 (28) 1994 (50) 1995 (27) 1996 (38) 1997 (59) 1998 (89) 1999 (106) 2000 (150) 2001 (198) 2002 (308) 2003 (427) 2004 (622) 2005 (935) 2006 (1052) 2007 (1092) 2008 (1214) 2009 (940) 2010 (445) 2011 (529) 2012 (502) 2013 (529) 2014 (687) 2015 (718) 2016 (756) 2017 (964) 2018 (1272) 2019 (1607) 2020 (1779) 2021 (2136) 2022 (2366) 2023 (2631) 2024 (644)
Publication types (Num. hits)
article(10248) book(12) data(26) incollection(215) inproceedings(14469) phdthesis(107) proceedings(3)
Venues (Conferences, Journals, ...)
CoRR(2518) IACR Cryptol. ePrint Arch.(797) IEEE Access(430) IEEE Trans. Inf. Forensics Sec...(193) FSE(178) Comput. Secur.(177) CRYPTO(176) EUROCRYPT(172) CCS(152) Sensors(140) ICC(138) Secur. Commun. Networks(133) ACISP(115) GLOBECOM(114) ARES(113) CHES(113) More (+10 of total 3434)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8634 occurrences of 2564 keywords

Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
38Jean-François Misarsky A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Multiplicative attack, redundancy, RSA, LLL algorithm
38Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 New Birthday Attacks on Some MACs Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack
38Jun-Cheol Jeon, Byung-Heon Kang, Se-Min Kim, Wan-Soo Lee, Kee-Young Yoo An Improvement of Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy MSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line Dictionary Attack, Bilinear Pairing, Mutual Authentication, Replay Attack, Forgery Attack
38Jai-Boo Oh, Jun-Cheol Jeon, Kee-Young Yoo Further Improvement of Manik et al.'s Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Off-line guessing Attack, Authentication, Bilinear Pairing, Replay Attack, Forgery Attack
38An Braeken, Joseph Lano On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Combination and filter generator, algebraic attack, correlation attack, distinguishing attack, hardware complexity
37Sebastian Roschke, Feng Cheng 0002, Robert Schuppenies, Christoph Meinel Towards Unifying Vulnerability Information for Attack Graph Construction. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Dapeng Man, Bing Zhang, Wu Yang 0001, Wenjin Jin, Yongtian Yang A Method for Global Attack Graph Generation. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Measuring the Overall Security of Network Configurations Using Attack Graphs. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Shai Rubin, Somesh Jha, Barton P. Miller On the Completeness of Attack Mutation Algorithms. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Bin Zhang 0003, Dengguo Feng New Guess-and-Determine Attack on the Self-Shrinking Generator. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Self-shrinking, Guess-and-determine, Stream cipher, Linear feedback shift register (LFSR)
37Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
37Toshihiro Ohigashi, Yoshiaki Shiraishi, Masakatu Morii FMS Attack-Resistant WEP Implementation Is Still Broken. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Sotiris E. Nikoletseas, Grigorios Prasinos, Paul G. Spirakis, Christos D. Zaroliagis Attack Propagation in Networks. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
37Håkan Englund, Martin Hell, Thomas Johansson 0001 Two General Attacks on Pomaranch-Like Keystream Generators. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF resynchronization attack, Stream ciphers, distinguishing attack, eSTREAM, Pomaranch
37Ya-Fen Chang, Chin-Chen Chang 0001 A secure and efficient strong-password authentication protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF strong password, smart card, password authentication, mutual authentication, denial-of-service attack, stolen-verifier attack
37Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman Differential and Linear Cryptanalysis of a Reduced-Round SC2000. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Symmetric block cipher, SC2000, linear attack, probability, differential attack, characteristic
36Georg Carle, Falko Dressler, Richard A. Kemmerer, Hartmut König, Christopher Kruegel (eds.) Perspectives Workshop: Network Attack Detection and Defense, 2.3. - 6.3.2008 Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
36Ravi Sahita, Uday R. Savagaonkar Towards a Virtualization-enabled Framework for Information Traceability (VFIT). Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Sara Sinclair, Sean W. Smith Preventative Directions For Insider Threat Mitigation Via Access Control. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Virgil D. Gligor, C. Sekar Chandersekaran Surviving Insider Attacks: A Call for System Experiments. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Charles P. Pfleeger Reflections on the Insider Threat. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Jeffrey Hunker Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Michael McCormick Data Theft: A Prototypical Insider Threat. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Angelos D. Keromytis Hard Problems and Research Challenges Concluding Remarks. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Ravishankar K. Iyer, Paul Dabrowski, Nithin Nakka, Zbigniew Kalbarczyk Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Angelos D. Keromytis Hard Problems and Research Challenges. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Kevin S. Killourhy, Roy A. Maxion Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Andrew P. Moore, Dawn M. Cappelli, Randall F. Trzeciak The "Big Picture" of Insider IT Sabotage Across U.S. Critical Infrastructures. Search on Bibsonomy Insider Attack and Cyber Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Richard A. Kemmerer, Roland Büschkes, Ali Fessi, Hartmut König, Peter Herrmann, Stephen D. Wolthusen, Marko Jahnke, Hervé Debar, Ralph Holz, Tanja Zseby, Dirk Haage 08102 Outcome Working Group -- Situational Awareness. Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
36Lothar Braun, Torsten Braun, Georg Carle, Falko Dressler, Anja Feldmann, Dirk Haage, Tobias Limmer, Tanja Zseby 08102 Working Group -- Measurement Requirements. Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
36Marc Dacier, Ulrich Flegel, Ralph Holz, Norbert Luttenberger 08102 Working Group -- Intrusion and Fraud Detection for Web Services. Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
36Lothar Braun, Falko Dressler, Thorsten Holz, Engin Kirda, Jan Kohlrausch, Christopher Kruegel, Tobias Limmer, Konrad Rieck, James P. G. Sterbenz 08102 Working Group -- Requirements for Network Monitoring from an IDS Perspective. Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
36Joachim Biskup, Bernhard M. Hämmerli, Michael Meier 0001, Sebastian Schmerl, Jens Tölle, Michael Vogel 08102 Working Group -- Early Warning Systems. Search on Bibsonomy Network Attack Detection and Defense The full citation details ... 2008 DBLP  BibTeX  RDF
36Jean-Sébastien Coron, Avradip Mandal PSS Is Secure against Random Fault Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Probabilistic Signature Scheme, Provable Security, Fault Attacks, Bellcore Attack
36Maher Ragheb Aburrous, M. Alamgir Hossain, Fadi A. Thabtah, Keshav P. Dahal Intelligent Quality Performance Assessment for E-Banking Security using Fuzzy Logic. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Direct Internal Attack, Security, Fuzzy Logic, Quality Assessment, E-Banking
36Yi Lu 0002, Huaxiong Wang, San Ling Cryptanalysis of Rabbit. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit
36Mathew Graves, Mohammad Zulkernine Bridging the gap: software specification meets intrusion detector. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack languages, intrusion detection, software security, software specification
36Joo Yeon Cho, Josef Pieprzyk Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SOBER-t32, SOBER-t16, stream ciphers, linearization, Algebraic attack, NESSIE, modular addition, multivariate equations
36Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 Security Analysis of the Generalized Self-shrinking Generator. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Stream cipher, Linear feedback shift register, Fast correlation attack, Clock control, Self-shrinking generator
36Toru Akishita, Tsuyoshi Takagi Zero-Value Point Attacks on Elliptic Curve Cryptosystem. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem
36Lin Yang, Meiqin Wang, Siyuan Qiao Side Channel Cube Attack on PRESENT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cube attack, Cryptanalysis, Side channel attack, PRESENT
36Joshua J. Pauli, Patrick Henry Engebretson Towards a Specification Prototype for Hierarchy-Driven Attack Patterns. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Refinement, Hierarchy, Attack Trees, Attack Patterns
36Gaeil An, Joon S. Park Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack
36Ju Wang 0001, Jonathan C. L. Liu Content-based block watermarking against cumulative and temporal attack. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF content-based block selection, cumulative attack, temporal attack, video watermarking scheme, frame synchronization method, video compression
35Amey Shevtekar, Nirwan Ansari A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee Multi Layer Approach to Defend DDoS Attacks Caused by Spam. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35L. Chaithanya, M. P. Singh, M. M. Gore Secure Data Management in Reactive Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Shai Rubin, Somesh Jha, Barton P. Miller Automatic Generation and Analysis of NIDS Attacks. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Sanjay Rawat 0001, Ashutosh Saxena Danger theory based SYN flood attack detection in autonomic network. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF syn flood attack, intrusion detection, artificial immune system, adaptive threshold, autonomic networks, danger theory
35Jiali Choy, Huihui Yap Impossible Boomerang Attack for Block Cipher Structures. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers
35Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo 0001 On the Improvement of the BDF Attack on LSBS-RSA. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF partial key exposure (PKE), the BDF attack, LSBS-RSA, RSA, exhaustive search, least significant bit (LSB)
35Niladri B. Puhan, Anthony T. S. Ho Secure authentication watermarking for localization against the Holliman-Memon attack. Search on Bibsonomy Multim. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fragile authentication, Holliman-Memon attack, Authenticity score, Security, Localization, Digital watermarking
35Joo Yeon Cho, Josef Pieprzyk Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, NLS
35Markku-Juhani Olavi Saarinen A Meet-in-the-Middle Collision Attack Against the New FORK-256. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, Hash Function Cryptanalysis, Meet-in-the-middle Attack
35Joo Yeon Cho, Josef Pieprzyk Crossword Puzzle Attack on NLS. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, Linear Approximations, Modular Addition, NLS
35Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack tracks, visualization, intrusion detection
35Debapriyay Mukhopadhyay, Indranil Saha Location Verification Based Defense Against Sybil Attack in Sensor Networks. Search on Bibsonomy ICDCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Wireless Sensor Network, Triangulation, Sybil attack, Location Verification
35Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002, Jaeheon Kim, Deukjo Hong Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators. Search on Bibsonomy VIETCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fast correlation attack, Shrinking generator, Self-Shrinking generator, Clock-controlled generator
35Joydip Mitra A Near-Practical Attack Against B Mode of HBB. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF known-plaintext attack, HBB, cryptanalysis, stream cipher
35Ulrike Meyer, Susanne Wetzel A man-in-the-middle attack on UMTS. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authentication, UMTS, mobile communication, GSM, man-in-the-middle attack
35Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Permanent Fault Attack on the Parameters of RSA with CRT. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
35Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba Theoretical Analysis of chi2 Attack on RC6. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF $chi^2$ attack, RC6, Transition Matrix
35Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Alpha1, irregular clocking, divide and conquer attack, Cryptanalysis, stream cipher
35Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing Automated Generation and Analysis of Attack Graphs. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF model checking, intrusion detection, attack graph
35James Manger A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF PKCS, RSA, chosen ciphertext attack, OAEP
35Kazuo Ohta, Kenji Koyama Meet-in-the-Middle Attack on Digital Signature Schemes. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Authentication, Digital signature, Hash function, One-way function, Meet-in-the-middle attack
34Nitin 0001, Durg Singh Chauhan, Vivek Kumar Sehgal, Ankit Mahanot, Pallavi Singh, Sohit Ahuja, Utkarsh Shrivastava, Manisha Rana, Vineet Punjabi, Shivam Vinay, Nakul Sharma Security Analysis and Implementation of JUIT-Image Based Authentication System Using Kerberos Protocol. Search on Bibsonomy ACIS-ICIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Image Based Authentication System, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack, AJAX, MySQL
33Virginia N. L. Franqueira, Pascal van Eck, Roel J. Wieringa, Raul H. C. Lopes A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Martin Ågren, Thomas Johansson 0001, Martin Hell Improving the Rainbow Attack by Reusing Colours. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Xiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Naoki Ogura, Shigenori Uchiyama Remarks on the Attack of Fouque et al. against the lIC Scheme. Search on Bibsonomy IWSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Jie Ma, Zhitang Li, Weiming Li Real-Time Alert Stream Clustering and Correlation for Discovering Attack Strategies. Search on Bibsonomy FSKD (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33M. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Liang Lu, Reihaneh Safavi-Naini, Jeffrey Horton, Willy Susilo An Adversary Aware and Intrusion Detection Aware Attack Model Ranking Scheme. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Panagiotis Rizomiliotis Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Bounpadith Kannhavong, Hidehisa Nakayama, Nei Kato, Yoshiaki Nemoto, Abbas Jamalipour Analysis of the node isolation attack against OLSR-based mobile ad hoc networks. Search on Bibsonomy ISCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Lingyu Wang 0001, Chao Yao, Anoop Singhal, Sushil Jajodia Interactive Analysis of Attack Graphs Using Relational Queries. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Michael Gegick, Laurie A. Williams Matching attack patterns to security vulnerabilities in software-intensive system designs. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, design, regular expression
33John Haggerty, Qi Shi 0001, Madjid Merabti Early detection and prevention of denial-of-service attacks: a novel mechanism with propagated traced-back attack blocking. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33P. Vinod 0002, Prabin Kumar Bora A New Inter-frame Collusion Attack and a Countermeasure. Search on Bibsonomy IWDW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Wei Yan, Edwin S. H. Hou, Nirwan Ansari Frame-based attack representation and real-time first order logic automatic reasoning. Search on Bibsonomy ITRE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Paul Ammann, Joseph Pamula, Julie A. Street, Ronald W. Ritchey A Host-Based Approach to Network Attack Chaining Analysis. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Jong-Keun Lee, Min-Woo Lee, Jang-Se Lee, Sung-Do Chi, Syng-Yup Ohn Automated Cyber-attack Scenario Generation Using the Symbolic Simulation. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Dogan Kesdogan, Lexi Pimenidis The Hitting Set Attack on Anonymity Protocols. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Viktor Wahadaniah, Yong Liang Guan 0001, Hock Chuan Chua A New Collusion Attack and Its Performance Evaluation. Search on Bibsonomy IWDW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Lars R. Knudsen, John Erik Mathiassen A Chosen-Plaintext Linear Attack on DES. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
33Gaoli Wang, Shaohui Wang Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key-recovery, HMAC, second preimage attack, NMAC, HAVAL
33Reginald E. Sawilla, Xinming Ou Identifying Critical Attack Assets in Dependency Attack Graphs. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PageRank, eigenvector, security metric, attack graph
33Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Secure PAP-Based RADIUS Protocol in Wireless Networks. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF RADIUS protocol, Off-line password guessing attack, Wireless network, Cryptography, Replay attack
33Daniel Boteanu, José M. Fernandez 0001, John McHugh, John Mullins Queue Management as a DoS Counter-Measure? Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF degradation of service attack, dynamic timeout, timeout, queue management, Denial of service attack
33Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen On the Collision Resistance of RIPEMD-160. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack
33Joseph Bonneau, Ilya Mironov Cache-Collision Timing Attacks Against AES. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, timing attack
33Jian Yuan, Kevin L. Mills Monitoring the Macroscopic Effect of DDoS Flooding Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack dynamics, spatial-temporal pattern, monitoring, network traffic, DDoS attack
33Sung-Ming Yen, Wei-Chih Lien, Sang-Jae Moon, JaeCheol Ha Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptography, Smart card, Side-channel attack, Simple power analysis (SPA), Chosen-message attack
33Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel A New Keystream Generator MUGI. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF PANAMA, Re-synchronization attack, Block cipher, Related-key attack, Keystream generator
32Nobuyuki Sugio, Shunichi Nambu, Toshinobu Kaneko A Fast Calculus for the Linearizing Attack and Its Application to an Attack on KASUMI. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Kai Schramm, Gregor Leander, Patrick Felke, Christof Paar A Collision-Attack on AES: Combining Side Channel- and Differential-Attack. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF internal collisions, AES, side channel attacks, birthday paradox
32Zunping Cheng, Neil Hurley Effective diverse and obfuscated attacks on model-based recommender systems. Search on Bibsonomy RecSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF recommender systems, collaborative filtering, detection, attack, obfuscation
32Scott O'Hare, Steven Noel, Kenneth Prole A Graph-Theoretic Visualization Approach to Network Risk Analysis. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF exploit analysis, visualization, network security, situational awareness, attack graph, vulnerability assessment
32Juan Wang, Jingwei Zhang, Huanguo Zhang Type Flaw Attacks and Prevention in Security Protocols. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF type flaw attack, GDOI, security protocol
Displaying result #101 - #200 of 25080 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license