|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Yuan Tian 0001, Eric Yawei Chen, Xiaojun Ma, Shuo Chen 0001, Xiao Wang 0040, Patrick Tague |
Swords and shields: a study of mobile game hacks and existing defenses. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Zhen Li 0027, Deqing Zou, Shouhuai Xu, Hai Jin 0001, Hanchao Qi, Jie Hu |
VulPecker: an automated vulnerability detection system based on code similarity analysis. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd |
Bootstrapping and maintaining trust in the cloud. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Stephen Schwab, William K. Robertson, Davide Balzarotti (eds.) |
Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016 |
ACSAC |
2016 |
DBLP DOI BibTeX RDF |
|
1 | Manar Mohamed, Nitesh Saxena |
Gametrics: towards attack-resilient behavioral authentication with simple cognitive games. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb |
Cypider: building community-based cyber-defense infrastructure for android malware detection. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Pietro Ferrara 0001, Omer Tripp, Marco Pistoia |
MorphDroid: Fine-grained Privacy Verification. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang 0001, Dongyan Xu |
Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shouling Ji, Shukun Yang, Ting Wang 0006, Changchang Liu, Wei-Han Lee, Raheem A. Beyah |
PARS: A Uniform and Open-source Password Analysis and Research System. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Simone Mutti, Enrico Bacis, Stefano Paraboschi |
SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wai-Kit Sze, R. Sekar 0001 |
Provenance-based Integrity Protection for Windows. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Aviv, Devon Budzitowski, Ravi Kuber |
Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang |
MobiPluto: File System Friendly Deniable Storage for Mobile Devices. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel |
Know Your Achilles' Heel: Automatic Detection of Network Critical Services. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mingwei Zhang 0005, R. Sekar 0001 |
Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Andriana Gkaniatsou, Fiona McNeill, Alan Bundy, Graham Steel, Riccardo Focardi, Claudio Bozzato |
Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna |
BareDroid: Large-Scale Analysis of Android Apps on Real Devices. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Song Gao 0010, Manar Mohamed, Nitesh Saxena, Chengcui Zhang |
Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maarten Decat, Bert Lagaisse, Wouter Joosen |
Scalable and Secure Concurrent Evaluation of History-based Access Control Policies. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz 0001, Matthias Hollick |
Using Channel State Information for Tamper Detection in the Internet of Things. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten |
Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aanjhan Ranganathan, Boris Danev, Srdjan Capkun |
Proximity Verification for Contactless Access Control and Authentication Systems. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | István Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis, Herbert Bos |
ShrinkWrap: VTable Protection without Loose Ends. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Martin Pettai, Peeter Laud |
Combining Differential Privacy and Secure Multiparty Computation. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto |
On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sören Bleikertz, Carsten Vogel, Thomas Groß 0001, Sebastian Mödersheim |
Proactive Security Analysis of Changes in Virtualized Infrastructures. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maliheh Shirvanian, Nitesh Saxena |
On the Security and Usability of Crypto Phones. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hui Wang 0037, Yuanyuan Zhang 0002, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu |
Vulnerability Assessment of OAuth Implementations in Android Applications. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mariana Raykova 0001, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani |
Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jing (Dave) Tian, Adam Bates 0001, Kevin R. B. Butler |
Defending Against Malicious USB Firmware with GoodUSB. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim |
MOSE: Live Migration Based On-the-Fly Software Emulation. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Prasad Ranganath, Hongmin Li 0001, Nicolais Guevara |
Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Letitia W. Li, Guillaume Duc, Renaud Pacalet |
Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti |
PIE: Parser Identification in Embedded Systems. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, Joshua Sunshine |
Evaluating the Flexibility of the Java Sandbox. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Konrad-Felix Krentz, Christoph Meinel |
Handling Reboots and Mobility in 802.15.4 Security. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Peter Mayer 0001, Melanie Volkamer |
Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun |
Logical Partitions on Many-Core Platforms. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nethanel Gelernter, Yoel Grinstein, Amir Herzberg |
Cross-Site Framing Attacks. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nick Pantic, Mohammad Iftekhar Husain |
Covert Botnet Command and Control Using Twitter. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Johannes Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede |
Soteria: Offline Software Protection within Low-cost Embedded Devices. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015 |
ACSAC |
2015 |
DBLP BibTeX RDF |
|
1 | Theofilos Petsios, Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis |
DynaGuard: Armoring Canary-based Protections against Brute-force Attacks. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Minghua Wang, Heng Yin 0001, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng |
Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Aravind Prakash, Heng Yin 0001 |
Defeating ROP Through Denial of Stack Pivot. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi |
Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tianlin Li, Yaohui Hu, Ping Yang 0002, Kartik Gopalan |
Privacy-preserving Virtual Machine. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jasper Bogaerts, Maarten Decat, Bert Lagaisse, Wouter Joosen |
Entity-Based Access Control: supporting more expressive access control policies. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Chen Cao, Neng Gao, Peng Liu 0005, Ji Xiang |
Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tung Tran 0003, Riccardo Pelizzi, R. Sekar 0001 |
JaTE: Transparent and Efficient JavaScript Confinement. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Junia Valente, Alvaro A. Cárdenas |
Using Visual Challenges to Verify the Integrity of Security Cameras. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rui Qiao 0002, Mingwei Zhang 0005, R. Sekar 0001 |
A Principled Approach for ROP Defense. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli |
AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah, Eugene H. Spafford |
ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage. |
ACSAC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Marco Balduzzi, Alessandro Pasta, Kyle Wilhoit |
A security evaluation of AIS automated identification system. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tamara Denning, Daniel B. Kramer, Batya Friedman, Matthew R. Reynolds, Brian T. Gill, Tadayoshi Kohno |
CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuzhe Richard Tang, Ting Wang 0006, Ling Liu 0001, Xin Hu 0001, Jiyong Jang |
Lightweight authentication of freshness in outsourced key-value stores. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Sven Bugiel, Sebastian Gerling |
Scippa: system-centric IPC provenance on Android. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Samuel Junjie Tan, Sergey Bratus, Travis Goodspeed |
Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yiming Jing, Ziming Zhao 0001, Gail-Joon Ahn, Hongxin Hu |
Morpheus: automatically generating heuristics to detect Android emulators. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | John Slankas, Xusheng Xiao, Laurie A. Williams, Tao Xie 0001 |
Relation extraction for inferring access control rules from natural language artifacts. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sören Bleikertz, Carsten Vogel, Thomas Groß 0001 |
Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Aviel D. Rubin |
Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hendrik Meutzner, Viet-Hung Nguyen, Thorsten Holz, Dorothea Kolossa |
Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mingshen Sun, Min Zheng, John C. S. Lui, Xuxian Jiang |
Design and implementation of an Android host-based intrusion prevention system. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weixuan Mao, Zhongmin Cai, Xiaohong Guan, Don Towsley |
Centrality metrics of importance in access behaviors and malware detections. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Capkun |
Assisted deletion of related content. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang 0001 |
SEER: practical memory virus scanning as a service. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tianwei Zhang 0004, Ruby B. Lee |
New models of cache architectures characterizing information leakage from cache side channels. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sebastian Biedermann, Stefan Katzenbeisser 0001, Jakub Szefer |
Hot-hardening: getting more out of your security settings. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Rui Han, Alejandro Mesa, Mihai Christodorescu, Saman A. Zonouz |
TroGuard: context-aware protection against web-based socially engineered trojans. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, Yuval Elovici |
OSPF vulnerability to persistent poisoning attacks: a systematic analysis. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, Damian Gruber |
On the privacy provisions of Bloom filters in lightweight bitcoin clients. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dina Hadziosmanovic, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel |
Through the eye of the PLC: semantic security monitoring for industrial processes. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar R. Weippl |
IMSI-catch me if you can: IMSI-catcher-catchers. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Henry Carter, Charles Lever, Patrick Traynor |
Whitewash: outsourcing garbled circuit generation for mobile devices. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Raoul Strackx, Bart Jacobs 0002, Frank Piessens |
ICE: a passive, high-speed, state-continuity scheme. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Tamas K. Lengyel, Steve Maresca, Bryan D. Payne, George D. Webster, Sebastian Vogl, Aggelos Kiayias |
Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michael Backes 0001, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky |
Android security framework: extensible multi-layered access control on Android. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Willem De Groef, Fabio Massacci, Frank Piessens |
NodeSentry: least-privilege library integration for server-side JavaScript. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sevtap Duman, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson, Engin Kirda |
TrueClick: automatically distinguishing trick banners from genuine download links. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Chao Yang 0022, Jialong Zhang, Guofei Gu |
A taste of tweets: reverse engineering Twitter spammers. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Aviv, Dane Fichter |
Understanding visual perceptions of usability and security of Android's graphical password pattern. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qian Feng, Aravind Prakash, Heng Yin 0001, Zhiqiang Lin |
MACE: high-coverage and robust memory analysis for commodity operating systems. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, Christian Rossow |
Leveraging semantic signatures for bug search in binary programs. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Robert Gawlik, Thorsten Holz |
Towards automated integrity protection of C++ virtual function tables in binary programs. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yinzhi Cao, Xiang Pan, Yan Chen 0004, Jianwei Zhuge |
JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hongyu Gao, Yi Yang 0042, Kai Bu, Yan Chen 0004, Doug Downey, Kathy Lee, Alok N. Choudhary |
Spam ain't as diverse as it seems: throttling OSN spam with templates underneath. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate |
Differentially private data aggregation with optimal utility. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Charles N. Payne Jr., Adam Hahn, Kevin R. B. Butler, Micah Sherr (eds.) |
Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014 |
ACSAC |
2014 |
DBLP BibTeX RDF |
|
1 | Carlos A. Barreto, Alvaro A. Cárdenas, Nicanor Quijano, Eduardo Mojica-Nava |
CPS: market analysis of attacks against demand response in the smart grid. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Drew Davidson, Matt Fredrikson, Benjamin Livshits |
MoRePriv: mobile OS support for application personalization and privacy. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | M. Zubair Rafique, Juan Caballero, Christophe Huygens, Wouter Joosen |
Network dialog minimization and network dialog diffing: two novel primitives for network security applications. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Haya Schulmann, Bruno Crispo |
Less is more: cipher-suite negotiation for DNSSEC. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marina Krotofil, Alvaro A. Cárdenas, Bradley Manning, Jason Larsen |
CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lance Alt, Robert Beverly, Alberto Dainotti |
Uncovering network tarpits with degreaser. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marios Pomonis, Theofilos Petsios, Kangkook Jee, Michalis Polychronakis, Angelos D. Keromytis |
IntFlow: improving the accuracy of arithmetic error detection using information flow tracking. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xavier de Carné de Carnavalet, Mohammad Mannan |
Challenges and implications of verifiable builds for security-critical open-source software. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniela Oliveira 0001, Marissa Rosenthal, Nicole Morin, Kuo-Chuan Yeh, Justin Cappos, Yanyan Zhuang |
It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mathy Vanhoef, Frank Piessens |
Advanced Wi-Fi attacks using commodity hardware. |
ACSAC |
2014 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 1667 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|