The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CODASPY"( http://dblp.L3S.de/Venues/CODASPY )

URL (DBLP): http://dblp.uni-trier.de/db/conf/codaspy

Publication years (Num. hits)
2011 (29) 2012 (32) 2013 (43) 2014 (44) 2015 (43) 2016 (41) 2017 (43) 2018 (48) 2019 (36) 2020 (45) 2021 (41) 2022 (48) 2023 (33)
Publication types (Num. hits)
inproceedings(513) proceedings(13)
Venues (Conferences, Journals, ...)
CODASPY(526)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 526 publication records. Showing 526 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sigmund Albert Gorski III, Benjamin Andow, Adwait Nadkarni, Sunil Manandhar, William Enck, Eric Bodden, Alexandre Bartel ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Kaushal Kafle, Kevin Moran, Sunil Manandhar, Adwait Nadkarni, Denys Poshyvanyk A Study of Data Store-based Home Automation. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nikolai J. Podlesny, Anne V. D. M. Kayem, Christoph Meinel Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization. Search on Bibsonomy CODASPY The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Roshan Shrestha, Hoda Mehrpouyan, Dianxiang Xu Model Checking of Security Properties in Industrial Control Systems (ICS). Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Eduard Marin, Dave Singelée, Bohan Yang 0001, Vladimir Volskiy, Guy A. E. Vandenbosch, Bart Nuttin, Bart Preneel Securing Wireless Neurostimulators. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Attaullah Buriro, Bruno Crispo, Sandeep Gupta 0002, Filippo Del Frari DIALERAUTH: A Motion-assisted Touch-based Smartphone User Authentication Scheme. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Md. Mahmud Hossain, Yasser Karim, Ragib Hasan SecuPAN: A Security Scheme to Mitigate Fragmentation-Based Network Attacks in 6LoWPAN. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Matthew W. Sanders, Chuan Yue Minimizing Privilege Assignment Errors in Cloud Services. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Iraklis Leontiadis, Reza Curtmola Secure Storage with Replication and Transparent Deduplication. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Khalid Alghamdi, Ali Alqazzaz, Anyi Liu, Ming Hua 0003 IoTVerif: An Automated Tool to Verify SSL/TLS Certificate Validation in Android MQTT Client Applications. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Melissa Wan Jun Chua, Vivek Balachandran Effectiveness of Android Obfuscation on Evading Anti-malware. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani 0001 Authorship Attribution of Android Apps. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Cong Liao, Haoti Zhong, Sencun Zhu, Anna Cinzia Squicciarini Server-Based Manipulation Attacks Against Machine Learning Models. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christine Schuppler, Maria Leitner, Stefanie Rinderle-Ma Privacy-aware Data Assessment of Online Social Network Registration Processes. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Guilherme Cox, Zi Yan, Abhishek Bhattacharjee, Vinod Ganapathy Secure, Consistent, and High-Performance Memory Snapshotting. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Cetin Sahin, Brandon Kuczenski, Ömer Egecioglu, Amr El Abbadi Privacy-Preserving Certification of Sustainability Metrics. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mahmoud Ammar, Wilfried Daniels, Bruno Crispo, Danny Hughes 0001 SPEED: Secure Provable Erasure for Class-1 IoT Devices. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Brad Wardman Managing the Crossroads of Academia and Industry. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1M. Ugur Aksu, Kemal Bicakci, M. Hadi Dilek, A. Murat Ozbayoglu, Emin Islam Tatli Automated Generation of Attack Graphs Using NVD. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1D. Geethanjali, Tan Li Ying, Melissa Wan Jun Chua, Vivek Balachandran AEON: Android Encryption based Obfuscation. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Farhad Rasapour, Hoda Mehrpouyan Misusing Sensory Channel to Attack Industrial Control Systems. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chun Wang, Steve T. K. Jan, Hang Hu 0002, Douglas Bossart, Gang Wang 0011 The Next Domino to Fall: Empirical Analysis of User Passwords across Online Services. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christian S. Collberg Code Obfuscation: Why is This Still a Thing? Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Luca Allodi, Sebastian Banescu, Henning Femmer, Kristian Beckers Identifying Relevant Information Cues for Vulnerability Assessment Using CVSS. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Samira Briongos, Gorka Irazoqui, Pedro Malagón, Thomas Eisenbarth 0001 CacheShield: Detecting Cache Attacks through Self-Observation. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Saranyan Senthivel, Shrey Dhungana, Hyunguk Yoo, Irfan Ahmed 0001, Vassil Roussev Denial of Engineering Operations Attacks in Industrial Control Systems. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aravind Ramachandran, Murat Kantarcioglu SmartProvenance: A Distributed, Blockchain Based DataProvenance System. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Juan D. Parra Rodriguez, Joachim Posegga CSP & Co. Can Save Us from a Rogue Cross-Origin Storage Browser Network! But for How Long? Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Syed Zain R. Rizvi, Philip W. L. Fong Efficient Authorization of Graph Database Queries in an Attribute-Supporting ReBAC Model. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1S. Abhishek Anand, Nitesh Saxena Keyboard Emanations in Remote Voice Calls: Password Leakage and Noise(less) Masking Defenses. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ziming Zhao 0001, Gail-Joon Ahn, Ram Krishnan, Gabriel Ghinita (eds.) Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018 Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  BibTeX  RDF
1Xiruo Liu, Rafael Misoczki, Manoj R. Sastry Remote Attestation for Low-End Prover Devices with Post-Quantum Capabilities. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Asma Alshehri, James O. Benson, Farhan Patwa, Ravi S. Sandhu Access Control Model for Virtual Objects (Shadows) Communication for AWS Internet of Things. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Oana-Georgiana Niculaescu, Gabriel Ghinita An Empirical Study of Differentially-Private Analytics for High-Speed Network Data. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aleksandra Korolova, Vinod Sharma Cross-App Tracking via Nearby Bluetooth Low Energy Devices. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Penghui Zhang, Bernard Ngabonziza, Haehyun Cho, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn SeCore: Continuous Extrospection with High Visibility on Multi-core ARM Platforms. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Amirreza Masoumzadeh 0001 Security Analysis of Relationship-Based Access Control Policies. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ghous Amjad, Muhammad Shujaat Mirza, Christina Pöpper Forgetting with Puzzles: Using Cryptographic Puzzles to support Digital Forgetting. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daoyuan Wu, Yao Cheng, Debin Gao, Yingjiu Li, Robert H. Deng SCLib: A Practical and Lightweight Defense against Component Hijacking in Android Applications. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Micah Bushouse, Douglas S. Reeves Hyperagents: Migrating Host Agents to the Hypervisor. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Issa M. Khalil, Bei Guan, Mohamed Nabeel, Ting Yu 0001 A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dongrui Zeng, Gang Tan From Debugging-Information Based Binary-Level Type Inference to CFG Generation. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Oyindamola Oluwatimi, Elisa Bertino A Multi-Enterprise Containerization Approach with an Interoperable Position-Based System. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Thomas Hupperich, Dennis Tatang, Nicolai Wilkop, Thorsten Holz An Empirical Study on Online Price Differentiation. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yongxian Zhang, Xinluo Wang, Ziming Zhao 0001, Hui Li 0070 Secure Display for FIDO Transaction Confirmation. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Daniel Le Métayer, Pablo Rauzy Capacity: an Abstract Model of Control over Personal Data. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Gorka Irazoqui, Thomas Eisenbarth 0001, Berk Sunar MASCAT: Preventing Microarchitectural Attacks Before Distribution. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pallavi Sivakumaran, Jorge Blasco Alís A Low Energy Profile: Analysing Characteristic Security on BLE Peripherals. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Hussain M. J. Almohri, David Evans 0001 Fidelius Charm: Isolating Unsafe Rust Code. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fabio Pagani, Matteo Dell'Amico, Davide Balzarotti Beyond Precision and Recall: Understanding Uses (and Misuses) of Similarity Hashes in Binary Analysis. Search on Bibsonomy CODASPY The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Kang G. Shin Research Issues and Approaches for Connected and Automated Vehicles. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sebastian Banescu, Mohsen Ahmadvand, Alexander Pretschner, Robert Shield, Chris Hamilton Detecting Patching of Executables without System Calls. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yufei Gu, Qingchuan Zhao, Yinqian Zhang, Zhiqiang Lin PT-CFI: Transparent Backward-Edge Control Flow Violation Detection Using Intel Processor Trace. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yifei Zhang 0001, Tian Tan 0001, Yue Li 0006, Jingling Xue Ripple: Reflection Analysis for Android Apps in Incomplete Information Environments. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hamza Harkous, Karl Aberer "If You Can't Beat them, Join them": A Usability Approach to Interdependent Privacy in Cloud Apps. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Syed Rafiul Hussain, Shagufta Mehnaz, Shahriar Nirjon, Elisa Bertino Seamless and Secure Bluetooth LE Connection Migration. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hugo Gascon, Bernd Grobauer, Thomas Schreck, Lukas Rist, Daniel Arp, Konrad Rieck Mining Attributed Graphs for Threat Intelligence. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rui Shu, Xiaohui Gu, William Enck A Study of Security Vulnerabilities on Docker Hub. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shameek Bhattacharjee, Aditya Thakur 0002, Simone Silvestri, Sajal K. Das 0001 Statistical Security Incident Forensics against Data Falsification in Smart Grid Advanced Metering Infrastructure. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Bo Li 0026, Kevin A. Roundy, Christopher S. Gates, Yevgeniy Vorobeychik Large-Scale Identification of Malicious Singleton Files. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jan Henrik Ziegeldorf, Jan Metzke, Jan Rüth, Martin Henze, Klaus Wehrle Privacy-Preserving HMM Forward Computation. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mehadi Hassen, Philip K. Chan Scalable Function Call Graph-based Malware Classification. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luca Compagna, Daniel Ricardo dos Santos, Serena Elisa Ponta, Silvio Ranise Aegis: Automatic Enforcement of Security Policies in Workflow-driven Web Applications. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Cetin Sahin, Brandon Kuczenski, Ömer Egecioglu, Amr El Abbadi Towards Practical Privacy-Preserving Life Cycle Assessment Computations. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou Detecting ROP with Statistical Learning of Program Characteristics. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gail-Joon Ahn, Alexander Pretschner, Gabriel Ghinita (eds.) Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, CODASPY 2017, Scottsdale, AZ, USA, March 22-24, 2017 Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  BibTeX  RDF
1Oana-Georgiana Niculaescu, Mihai Maruseac, Gabriel Ghinita Differentially-Private Big Data Analytics for High-Speed Research Network Traffic Measurement. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Rakesh M. Verma, Ayman El Aassal Comprehensive Method for Detecting Phishing EmailsUsing Correlation-based Analysis and User Participation. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Conrad Williams Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fabian Foerg, Susanne Wetzel, Ulrike Meyer Efficient Commodity Matching for Privacy-Preserving Two-Party Bartering. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhe Zhou 0001, Zhou Li 0001, Kehuan Zhang All Your VMs are Disconnected: Attacking Hardware Virtualized Network. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Guillermo Suarez-Tangil, Santanu Kumar Dash 0001, Mansour Ahmadi, Johannes Kinder, Giorgio Giacinto, Lorenzo Cavallaro DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tahmina Ahmed, Ravi S. Sandhu, Jaehong Park Classifying and Comparing Attribute-Based and Relationship-Based Access Control. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Zhiyuan Lin, Mahesh Tripunitara Graph Automorphism-Based, Semantics-Preserving Security for the Resource Description Framework (RDF). Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexandra Dmitrienko, Christian Plappert Secure Free-Floating Car Sharing for Offline Cars. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andrew Reed, Michael J. Kranch Identifying HTTPS-Protected Netflix Videos in Real-Time. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pierre Bergé, Jason Crampton, Gregory Z. Gutin, Rémi Watrigant The Authorization Policy Existence Problem. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Robert Buhren, Shay Gueron, Jan Nordholz, Jean-Pierre Seifert, Julian Vetter Fault Attacks on Encrypted General Purpose Compute Platforms. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Samuel Weiser, Mario Werner SGXIO: Generic Trusted I/O Path for Intel SGX. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Luka Malisa, Kari Kostiainen, Srdjan Capkun Detecting Mobile Application Spoofing Attacks by Leveraging User Visual Similarity Perception. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Niall McLaughlin, Jesús Martínez del Rincón, BooJoong Kang, Suleiman Y. Yerima, Paul Miller 0003, Sakir Sezer, Yeganeh Safaei, Erik Trickel, Ziming Zhao 0001, Adam Doupé, Gail-Joon Ahn Deep Android Malware Detection. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shagufta Mehnaz, Elisa Bertino Ghostbuster: A Fine-grained Approach for Anomaly Detection in File System Accesses. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vincent Bindschaedler, Shantanu Rane, Alejandro E. Brito, Vanishree Rao, Ersin Uzun Achieving Differential Privacy in Secure Multiparty Data Aggregation Protocols on Star Networks. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1S. Raj Rajagopalan The Human Capital Model for Security Research: New Insights into Technology Transition. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Margaux Canet, Amrit Kumar 0001, Cédric Lauradoux, Mary-Andréa Rakotomanga, Reihaneh Safavi-Naini Decompression Quines and Anti-Viruses. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniele Ucci, Leonardo Aniello, Roberto Baldoni Share a pie?: Privacy-Preserving Knowledge Base Export through Count-min Sketches. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chi Sing Chum, Xiaowen Zhang A New Bloom Filter Structure for Searchable Encryption Schemes. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Panagiotis Ilia, Barbara Carminati, Elena Ferrari, Paraskevi Fragopoulou, Sotiris Ioannidis SAMPAC: Socially-Aware collaborative Multi-Party Access Control. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fang Liu, Haipeng Cai, Gang Wang 0011, Danfeng (Daphne) Yao, Karim O. Elish, Barbara G. Ryder Prioritized Analysis of Inter-App Communication Risks. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Adam Doupé Panel: Trustworthy Data Science. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Babak Yadegari, Jon Stephens, Saumya Debray Analysis of Exception-Based Control Transfers. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Alexander Sjösten, Steven Van Acker, Andrei Sabelfeld Discovering Browser Extensions via Web Accessible Resources. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abdelouahab Amira, Abdelraouf Ouadjaout, Abdelouahid Derhab, Nadjib Badache Sound and Static Analysis of Session Fixation Vulnerabilities in PHP Web Applications. Search on Bibsonomy CODASPY The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Musard Balliu, Benjamin Liebe, Daniel Schoepe, Andrei Sabelfeld JSLINQ: Building Secure Applications across Tiers. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
1Apostolis Zarras, Katharina Kohls, Markus Dürmuth, Christina Pöpper Neuralyzer: Flexible Expiration Times for the Revocation of Online Data. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Valeriu Daniel Stanciu, Riccardo Spolaor, Mauro Conti, Cristiano Giuffrida On the Effectiveness of Sensor-enhanced Keystroke Dynamics Against Statistical Attacks. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anjila Tamrakar, Justin D. Russell, Irfan Ahmed 0001, Golden G. Richard III, Carl F. Weems SPICE: A Software Tool for Bridging the Gap Between End-user's Insecure Cyber Behavior and Personality Traits. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aisha I. Ali-Gombe, Irfan Ahmed 0001, Golden G. Richard III, Vassil Roussev AspectDroid: Android App Analysis System. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sushama Karumanchi, Jingwei Li 0001, Anna Cinzia Squicciarini Efficient Network Path Verification for Policy-routedQueries. Search on Bibsonomy CODASPY The full citation details ... 2016 DBLP  BibTeX  RDF
Displaying result #201 - #300 of 526 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license