The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (26) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (50) 1997 (54) 1998 (92) 1999 (127) 2000 (178) 2001 (306) 2002 (406) 2003 (624) 2004 (899) 2005 (1333) 2006 (1490) 2007 (1528) 2008 (1585) 2009 (1275) 2010 (673) 2011 (702) 2012 (813) 2013 (804) 2014 (989) 2015 (1073) 2016 (1206) 2017 (1461) 2018 (1759) 2019 (2206) 2020 (2727) 2021 (2982) 2022 (3370) 2023 (3864) 2024 (1050)
Publication types (Num. hits)
article(15280) book(15) data(11) incollection(195) inproceedings(19901) phdthesis(378) proceedings(22)
Venues (Conferences, Journals, ...)
CoRR(4079) IACR Cryptol. ePrint Arch.(1244) IEEE Access(507) RAID(446) CCS(308) IEEE Trans. Inf. Forensics Sec...(260) Comput. Secur.(249) USENIX Security Symposium(224) IEEE Trans. Smart Grid(198) GLOBECOM(197) ICC(193) FSE(187) ACSAC(184) CHES(178) Sensors(170) ARES(166) More (+10 of total 3761)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11110 occurrences of 2965 keywords

Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attestation systems, integrity monitoring, return-oriented programming
26Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou Hardware-software integrated approaches to defend against software cache-based side channel attacks. Search on Bibsonomy HPCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Yanxiang He, Qiang Cao, Yi Han, Libing Wu, Tao Liu Reduction of Quality (RoQ) attacks on structured peer-to-peer networks. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson Plaintext Recovery Attacks against SSH. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Edward W. Felten Coping with Outside-the-Box Attacks. Search on Bibsonomy CAV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Prithvi Bisht, V. N. Venkatakrishnan XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Attack Prevention, Security, Filtering, Cross-site scripting (XSS)
26Marcel Medwed, Elisabeth Oswald Template Attacks on ECDSA. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Shuo Wang, Fan Zhang 0010, Jianwei Dai, Lei Wang 0003, Zhijie Jerry Shi Making register file resistant to power analysis attacks. Search on Bibsonomy ICCD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Alexey Smirnov 0001, Tzi-cker Chiueh Automatic Patch Generation for Buffer Overflow Attacks. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Anders Moen Hagalisletto Validating Attacks on Authentication Protocols. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Meiko Jensen, Nils Gruschka, Ralph Herkenhöner, Norbert Luttenberger SOA and Web Services: New Technologies, New Standards - New Attacks. Search on Bibsonomy ECOWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Chong Hee Kim, Jean-Jacques Quisquater How can we overcome both side channel analysis and fault attacks on RSA-CRT? Search on Bibsonomy FDTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran, Jae-Kwang Lee Multi Layer Approach to Defend DDoS Attacks Caused by Spam. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Xin Xu, Yongqiang Sun, Zunguo Huang Defending DDoS Attacks Using Hidden Markov Models and Cooperative Reinforcement Learning. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Christophe Giraud 0001 An RSA Implementation Resistant to Fault Attacks and to Simple Power Analysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Smart cards, RSA, fault injection, public-key cryptosystems, exponentiation, simple power analysis, side channel
26Michel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan A Statistical Analysis of Attack Data to Separate Attacks. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee Satisfiability-based framework for enabling side-channel attacks on cryptographic software. Search on Bibsonomy DATE Designers' Forum The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Yoshinori Kobayashi, Eric Y. Chen, Yoshihiro Oyama, Akinori Yonezawa Protecting Web Servers from Octopus Attacks. Search on Bibsonomy SAINT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Yan Gao 0003, Leiwen Deng, Aleksandar Kuzmanovic, Yan Chen 0004 Internet Cache Pollution Attacks and Countermeasures. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Scott Fowler, Sherali Zeadally Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Shuo Chen 0001, Jun Xu 0003, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer Defeating Memory Corruption Attacks via Pointer Taintedness Detection. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Jun Zheng, Ming-Zeng Hu Intrusion Detection of DoS/DDoS and Probing Attacks for Web Services. Search on Bibsonomy WAIM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Christos Siaterlis, Vasilis Maglaris Detecting Incoming and Outgoing DDoS Attacks at the Edge Using a Single Set of Network Characteristics. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Suraiya Khan, Issa Traoré A Prevention Model for Algorithmic Complexity Attacks. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Vipul Goyal, Virendra Kumar, Mayank Singh 0002, Ajith Abraham, Sugata Sanyal CompChall: Addressing Password Guessing Attacks. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Guangzhi Qu, Salim Hariri, Mazin S. Yousif Multivariate statistical analysis for network attacks detection. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Stig Andersson, Andrew J. Clark, George M. Mohay, Bradley L. Schatz, Jacob Zimmermann A Framework for Detecting Network-based Code Injection Attacks Targeting Windows and UNIX. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Michael J. Wiener The Full Cost of Cryptanalytic Attacks. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Parallel collision search, Double encryption, Triple encryption, Cryptanalysis, Factoring, Discrete logarithm, Number field sieve, Meet-in-the-middle attack, Hash collision
26Christian Rechberger, Elisabeth Oswald Practical Template Attacks. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Ye Zhu 0001, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 On Flow Correlation Attacks and Countermeasures in Mix Networks. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Sherif M. Khattab, Chatree Sangpachatanaruk, Daniel Mossé, Rami G. Melhem, Taieb Znati Roaming Honeypots for Mitigating Service-Level Denial-of-Service Attacks. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Lukas Ruf, Arno Wagner, Károly Farkas, Bernhard Plattner A Detection and Filter System for Use Against Large-Scale DDoS Attacks in the Internet Backbone. Search on Bibsonomy IWAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Jingyu Zhou, Giovanni Vigna Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Sanguk Noh, Cheolho Lee, Kyunghee Choi, Gihyun Jung Detecting Distributed Denial of Service (DDoS) Attacks through Inductive Learning. Search on Bibsonomy IDEAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Matthew V. Mahoney 0001, Philip K. Chan Learning nonstationary models of normal network traffic for detecting novel attacks. Search on Bibsonomy KDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Sergei P. Skorobogatov, Ross J. Anderson Optical Fault Induction Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Marc Gysin, Jennifer Seberry Generalised Cycling Attacks on RSA and Strong RSA Primes. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
25Muhammad Ali Akbar, Muddassar Farooq RTP-miner: a real-time security framework for RTP fuzzing attacks. Search on Bibsonomy NOSSDAV The full citation details ... 2010 DBLP  DOI  BibTeX  RDF fuzzing attacks, machine learning, denial of service, stochastic models, real-time transport protocol, voip
25Boris Danev, Heinrich Luecken, Srdjan Capkun, Karim M. El Defrawy Attacks on physical-layer identification. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF identification, attacks, wireless security, physical layer
25Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DNS spoofing, MITM attacks, SIP, VoIP security
25M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group Key Exchange, Insider Attacks, Key Compromise Impersonation
25Jie Yu 0008, Chengfang Fang, Liming Lu, Zhoujun Li 0001 A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. Search on Bibsonomy Infoscale The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trust, DDoS Attacks, Lightweight, Application layer
25Jing Dong 0006, Reza Curtmola, Cristina Nita-Rotaru Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network coding security, security, network coding, wireless network security, pollution attacks
25Liang Xie 0002, Sencun Zhu Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attacker identification, message dropping attacks, Overlay networks, attack detection
25Peng Ning, An Liu, Wenliang Du Mitigating DoS attacks against broadcast authentication in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Sensor networks, broadcast authentication, DoS attacks
25Srivatsava Ranjit Ganta, Shiva Prasad Kasiviswanathan, Adam D. Smith Composition attacks and auxiliary information in data privacy. Search on Bibsonomy KDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adversarial attacks, privacy, anonymization
25Simon P. Chung, Aloysius K. Mok Swarm Attacks against Network-Level Emulation/Analysis. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Decoder detection, network-level emulation, swarm attacks, network IDS, evasion
25David Vigilant RSA with CRT: A New Cost-Effective Solution to Thwart Fault Attacks. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Software countermeasure, RSA, Chinese Remainder Theorem, Fault attacks, Modular exponentiation, Bellcore attack
25Yu Chen 0002, Kai Hwang 0001, Wei-Shinn Ku Collaborative Detection of DDoS Attacks over Multiple Network Domains. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cyber defense, network security, DDoS attacks, Internet technology
25Dimitris Geneiatakis, Costas Lambrinoudakis A lightweight protection mechanism against signaling attacks in a SIP-based VoIP environment. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Signaling attacks, Security, Session Initiation Protocol (SIP), Voice over IP (VoIP)
25Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, algebraic attacks, clock-control
25Kazuki Yoneyama, Haruki Ota, Kazuo Ohta Secure Cross-Realm Client-to-Client Password-Based Authenticated Key Exchange Against Undetectable On-Line Dictionary Attacks. Search on Bibsonomy AAECC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF different password, C2C-PAKE, cross-realm setting, undetectable on-line dictionary attacks, Authenticated key exchange
25Nayot Poolsapassit, Indrajit Ray Investigating Computer Attacks Using Attack Trees. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Forensic investigation, computer attacks, log file filtering, attack tree
25Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unbalanced Feistel permutations, generic attacks on encryption schemes, Block ciphers, pseudo-random permutations
25V. Benjamin Livshits, Úlfar Erlingsson Using web application construction frameworks to protect against code injection attacks. Search on Bibsonomy PLAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software construction frameworks, software security, same-origin policy, code injection attacks
25HeeSeok Kim, Tae Hyun Kim 0003, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim 0001, Jongin Lim 0001 Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sABS recoding, SPA-based analysis, Doubling Attack, Side Channel Attacks, scalar multiplication
25Paul C. van Oorschot, Stuart G. Stubblebine On countering online dictionary attacks with login histories and humans-in-the-loop. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Mandatory human participation schemes, online dictionary attacks, password protocols, usable security, relay attack
25Stéphanie Delaune, Florent Jacquemard Decision Procedures for the Security of Protocols with Probabilistic Encryption against Offline Dictionary Attacks. Search on Bibsonomy J. Autom. Reason. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF verification, formal methods, cryptographic protocols, dictionary attacks, probabilistic encryption
25Helena Handschuh, Bart Preneel Blind Differential Cryptanalysis for Enhanced Power Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF combined cryptanalysis, blind cryptanalysis, side channel attacks, power analysis, differential cryptanalysis, Hamming weights
25Zhendong Su 0001, Gary Wassermann The essence of command injection attacks in web applications. Search on Bibsonomy POPL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF command injection attacks, web applications, parsing, grammars, runtime verification
25Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González Zero-knowledge watermark detector robust to sensitivity attacks. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF generalized gaussian detector, sensitivity attacks, zero-knowledge, watermark detection
25Olli Vertanen Java Type Confusion and Fault Attacks. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF type confusion, Java, embedded systems, fault attacks, Java Card
25Daniel B. Faria, David R. Cheriton Detecting identity-based attacks in wireless networks using signalprints. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.11., security, wireless LANs, location-based services, denial-of-service attacks
25ManKi Ahn, Hoon-Jae Lee 0001 Experiments and Hardware Countermeasures on Power Analysis Attacks. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SPA/DPA, Side Channel Attacks, Power Analysis, SmartCard, Countermeasure
25Tae Hyun Kim 0003, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim 0001, Jongin Lim 0001 Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Randomized projective coordinate systems, Eta pairing, Side channel attacks, Differential Power Analysis, Pairing based cryptosystems
25Svetla Nikova, Christian Rechberger, Vincent Rijmen Threshold Implementations Against Side-Channel Attacks and Glitches. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF side-channel attacks, secret sharing, Masking
25Jonathan Katz, Ji Sun Shin Modeling insider attacks on group key-exchange protocols. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF universal composability, group key exchange, insider attacks
25Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Zamfir Preventing shilling attacks in online recommender systems. Search on Bibsonomy WIDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF shilling attacks, recommender systems, collaborative filtering, web applications
25Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SPA countermeasure, side channel attacks, elliptic curve cryptosystems, smartcard, Koblitz curves
25Girish B. Ratanpal, Ronald D. Williams, Travis N. Blalock An On-Chip Signal Suppression Countermeasure to Power Analysis Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF VLSI, smartcards, DES, security and protection, Power analysis attacks, code breaking
25Nicolas T. Courtois General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations
25Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fractional Window, Side Channel Attacks, Flexibility, Elliptic Curve Cryptosystems, Smartcard, Discrete Logarithm Problem
25Hoon-Jae Lee 0001, ManKi Ahn, Seongan Lim, Sang-Jae Moon A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Protection Profiles, Vulnerability Assessment Activities, SPA/DPA, Smart Card, Side Channel Attacks, Common Criteria
25William H. Allen, Gerald A. Marin MAGNA: Modeling And Generating Network Attacks. Search on Bibsonomy LCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF computer attacks, intrusion detection
25Haining Wang, Kang G. Shin Transport-Aware IP Routers: A Built-In Protection Mechanism to Counter DDoS Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS) attacks, layer-4 differentiation, resource isolation, packet classification
25Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert A new CRT-RSA algorithm secure against bellcore attacks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack
25Marcus Tylutki, Karl N. Levitt Mitigating Distributed Denial of Service Attacks Using a Proportional-Integral-Derivative Controller. Search on Bibsonomy RAID The full citation details ... 2003 DBLP  DOI  BibTeX  RDF PID control law, Automated Response, Denial of Service, DoS, Distributed Denial of Service, DDoS, Control Theory, Distributed Attacks
25Kai Schramm, Thomas J. Wollinger, Christof Paar A New Class of Collision Attacks and Its Application to DES. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF internal collisions, side channel attacks, power analysis, DES, S-Boxes, collision attack
25Jaechul Sung, Deukjo Hong, Sangjin Lee 0002 Key Recovery Attacks on the RMAC, TMAC, and IACBC. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RMAC, TMAC, XCBC, IACBC, Message Authentication Codes, Modes of Operation, Key Recovery Attacks, CBC-MAC
25David A. Wagner 0001, Paolo Soto Mimicry attacks on host-based intrusion detection systems. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly detection, host-based intrusion detection, evasion attacks
25Katsuyuki Okeya, Kouichi Sakurai A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Higher-Order DPA Attack, Second-Order DPA Attack, Möller's Countermeasure, Side Channel Attacks, Differential Power Analysis, Elliptic Curve Cryptosystems
25Tanja Römer, Jean-Pierre Seifert Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF successive minimum, Cryptanalysis, side-channel-attacks, Lattice, ECDSA, Lattice basis reduction, LLL
25Pierre-Alain Fouque, David Pointcheval Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Chosen-Ciphertext Attacks, Threshold Cryptosystems
25Vladimir V. Chepyzhov, Thomas Johansson 0001, Ben J. M. Smeets A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptanalysis, Stream ciphers, correlation attacks
25Thomas Johansson 0001, Fredrik Jönsson Fast Correlation Attacks through Reconstruction of Linear Polynomials. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF reconstruction of polynomials, Stream ciphers, learning theory, correlation attacks
25Stephen Keung, Kai-Yeung Siu Efficient protocols secure against guessing and replay attacks. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF password guessing, efficient protocols, password protection, nonces minimisation, protocols, multicast communications, secure communications, peer-to-peer communication, replay attacks
25Chester Rebeiro, Mainack Mondal, Debdeep Mukhopadhyay Pinpointing Cache Timing Attacks on AES. Search on Bibsonomy VLSI Design The full citation details ... 2010 DBLP  DOI  BibTeX  RDF AES, Side Channel Attacks, Countermeasures, Cache Attacks
25Ernst M. Gabidulin Attacks and counter-attacks on the GPT public key cryptosystem. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classifications 11T71, 14G50
25Chun-Shien Lu, Shih-Wei Sun, Chao-Yong Hsu, Pao-Chi Chang Media Hash-Dependent Image Watermarking Resilient Against Both Geometric Attacks and Estimation Attacks Based on False Positive-Oriented Detection. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Neil Hurley, Zunping Cheng, Mi Zhang 0001 Statistical attack detection. Search on Bibsonomy RecSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF recommender systems, robustness, collaborative filtering, detection
23Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios Adaptabilty of a GP Based IDS on Wireless Networks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Networks, Genetic Programming, Intrusion Detection System, Denial of Service
23Jörn-Marc Schmidt, Christoph Herbst A Practical Fault Attack on Square and Multiply. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Siyuan Xin, Xingyuan Chen, Huilin Tang, Ning Zhu Research on DoS Atomic Attack Oriented to Attack Resistance Test. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Jae-Won Cho, Rémy Prost, Ho-Youl Jung An Oblivious Watermarking for 3-D Polygonal Meshes Using Distribution of Vertex Norms. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Dijiang Huang, Deep Medhi Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF node fabrication, selective node capture, Sensor, insider attack
23Guang Jin, Jiangang Yang, Wei Wei, Yabo Dong Mitigating Denial of Capability with An Notification Mechanism. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Joseph Chee Ming Teo, Chik How Tan Denial-of-service resilience password-based group key agreement for wireless networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF denial-of-service, group key agreement, secure group communication, password-based authentication
23Ashish Arora, Anand Nandkumar, Rahul Telang Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disclosure policy, Risk management, Economics, Patching, Software vulnerability
23Dominik Engel, Rade Kutil, Andreas Uhl A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ciphertext-only, known-plaintext, secret frequency domain, secret parameterized wavelet filters, attack, JPEG2000
23Byung Ryong Kim, Ki-Chang Kim A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 35802 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license