|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6048 occurrences of 3544 keywords
|
|
|
Results
Found 5956 publication records. Showing 5956 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Christopher Kugler, Tilo Müller |
Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits. |
EAI Endorsed Trans. Security Safety |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Chetan Singh Thakur, Runchun Wang, Tara Julia Hamilton, Jonathan Tapson, André van Schaik |
A Trainable Neuromorphic Integrated Circuit that Exploits Device Mismatch. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
19 | Hao-Hsiang Wu, Simge Küçükyavuz |
Maximizing Influence in Social Networks: A Two-Stage Stochastic Programming Approach That Exploits Submodularity. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
19 | Hannes Holm, Matus Korman, Mathias Ekstedt |
A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits. |
Inf. Softw. Technol. |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen |
Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? |
AsiaCCS |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Norihito Inamuro, Akira Hirabayashi |
Improving the quality of compressed sensing MRI that exploits adjacent slice similarity. |
APSIPA |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Takuya Watanabe 0001, Mitsuaki Akiyama, Tatsuya Mori |
RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility. |
WOOT |
2015 |
DBLP BibTeX RDF |
|
19 | Hong Hu 0004, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, Zhenkai Liang |
Automatic Generation of Data-Oriented Exploits. |
USENIX Security Symposium |
2015 |
DBLP BibTeX RDF |
|
19 | Carl Sabottke, Octavian Suciu, Tudor Dumitras |
Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits. |
USENIX Security Symposium |
2015 |
DBLP BibTeX RDF |
|
19 | Aya Hasebe, Kazushi Nishimoto |
BrainTranscending: A Hybrid Divergent Thinking Method that Exploits Creator Blind Spots. |
KICSS |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Michel Edkrantz, Staffan Truvé, Alan Said |
Predicting Vulnerability Exploits in the Wild. |
CSCloud |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Charles Smutz, Angelos Stavrou |
Preventing Exploits in Microsoft Office Documents Through Content Randomization. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Michel Edkrantz, Alan Said |
Predicting Cyber Vulnerability Exploits with Machine Learning. |
SCAI |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Dennis Kergl, Robert Roedler, Gabi Dreo Rodosek |
Detection of Zero Day Exploits Using Real-Time Social Media Streams. |
NaBIC |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Hannes Trunde, Edgar R. Weippl |
WordPress security: an analysis based on publicly available exploits. |
iiWAS |
2015 |
DBLP DOI BibTeX RDF |
|
19 | Meng Zhang, Anand Raghunathan, Niraj K. Jha |
A defense framework against malware and vulnerability exploits. |
Int. J. Inf. Sec. |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Luca Allodi, Fabio Massacci |
Comparing Vulnerability Severity and Exploits Using Case-Control Studies. |
ACM Trans. Inf. Syst. Secur. |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Jaydeep Solanki, Aenik Shah, Manik Lal Das |
Secure Patrol: Patrolling Against Buffer Overflow Exploits. |
Inf. Secur. J. A Glob. Perspect. |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Nicholas J. Hudson 0001, Laercio R. Porto-Neto, James Kijas, Sean McWilliam, Ryan J. Taft, Antonio Reverter |
Information compression exploits patterns of genome composition to discriminate populations and highlight regions of evolutionary interest. |
BMC Bioinform. |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Byungho Min, Vijay Varadharajan |
A New Technique for Counteracting Web Browser Exploits. |
Australian Software Engineering Conference |
2014 |
DBLP DOI BibTeX RDF |
|
19 | David Durham |
Mitigating exploits, rootkits and advanced persistent threats. |
Hot Chips Symposium |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Min Suk Kang, Virgil D. Gligor |
Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures. |
CCS |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Michael Backes 0001, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny |
You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code. |
CCS |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Ziyi Liu, Weidong Shi, Shouhuai Xu, Zhiqiang Lin |
Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy. |
DATE |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta |
TESTREX: a Testbed for Repeatable Exploits. |
CSET |
2014 |
DBLP BibTeX RDF |
|
19 | Tielei Wang, Chengyu Song, Wenke Lee |
Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. |
DIMVA |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David A. Mundie, Jennifer Cowley |
Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits. |
IEEE Symposium on Security and Privacy Workshops |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Alexander H. Levis, Bahram Yousefi |
Multi-Formalism Modeling For Evaluating The Effect Of Cyber Exploits. |
ECMS |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Andreas Kuehn, Milton Mueller |
Shifts in the Cybersecurity Paradigm: Zero-Day Exploits, Discourse, and Emerging Institutions. |
NSPW |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Jeffrey Wu 0002, Anthony Arrott, Fernando C. Colón Osorio |
Protection against remote code execution exploits of popular applications in Windows. |
MALWARE |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Kevin Z. Snow |
Identifying Code Injection and Reuse Payloads In Memory Error Exploits. |
|
2014 |
DOI RDF |
|
19 | Bruno Andò, Salvatore Baglio, Vincenzo Marletta, Adi R. Bulsara |
A Nonlinear Electric Field Sensor That Exploits Coupled Oscillator Dynamics: The Charge Collection Mechanism. |
IEEE Trans. Instrum. Meas. |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Tomoyuki Yamakami |
A Non-Interactive Quantum Bit Commitment Scheme that Exploits the Computational Hardness of Quantum State Distinction. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
19 | Avinash Srinivasan, Satish Kolli, Jie Wu 0001 |
Steganographic information hiding that exploits a novel file system vulnerability. |
Int. J. Secur. Networks |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu 0005, Dinghao Wu |
Semantic aware attribution analysis of remote exploits. |
Secur. Commun. Networks |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Md. Faisal Mahbub Chowdhury, Alberto Lavelli |
FBK-irst : A Multi-Phase Kernel Based Approach for Drug-Drug Interaction Detection and Classification that Exploits Linguistic Information. |
SemEval@NAACL-HLT |
2013 |
DBLP BibTeX RDF |
|
19 | Ashley L. Podhradsky, Rob D'Ovidio, Pat Engebretson, Cindy Casey |
Xbox 360 Hoaxes, Social Engineering, and Gamertag Exploits. |
HICSS |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Vern Paxson (eds.) |
6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '13, Washington, D.C., USA, August 12, 2013 |
LEET |
2013 |
DBLP BibTeX RDF |
|
19 | Athanasios N. Nikolakopoulos, John D. Garofalakis |
NCDawareRank: a novel ranking method that exploits the decomposable structure of the web. |
WSDM |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Serge Egelman, Cormac Herley, Paul C. van Oorschot |
Markets for zero-day exploits: ethics and implications. |
NSPW |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Matthias Neugschwandtner, Martina Lindorfer, Christian Platzer |
A View to a Kill: WebView Exploitation. |
LEET |
2013 |
DBLP BibTeX RDF |
|
19 | Chengcui Zhang, Rupak Kharel, Song Gao 0010, Jason Britt |
Image Matching for Branding Phishing Kit Images. |
LEET |
2013 |
DBLP BibTeX RDF |
|
19 | Mohammad Karami, Damon McCoy |
Understanding the Emerging Threat of DDoS-as-a-Service. |
LEET |
2013 |
DBLP BibTeX RDF |
|
19 | Charles LeDoux, Arun Lakhotia, Craig Miles, Vivek Notani, Avi Pfeffer |
FuncTracker: Discovering Shared Code to Aid Malware Forensics. |
LEET |
2013 |
DBLP BibTeX RDF |
|
19 | Jason W. Clark, Damon McCoy |
There Are No Free iPads: An Analysis of Survey Scams as a Business. |
LEET |
2013 |
DBLP BibTeX RDF |
|
19 | Chuan Yue |
The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security. |
LEET |
2013 |
DBLP BibTeX RDF |
|
19 | Luca Allodi |
Attacker Economics for Internet-scale Vulnerability Risk Assessment. |
LEET |
2013 |
DBLP BibTeX RDF |
|
19 | Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon |
SinkMiner: Mining Botnet Sinkholes for Fun and Profit. |
LEET |
2013 |
DBLP BibTeX RDF |
|
19 | Aditya K. Sood, Peter Greko, Richard J. Enbody |
Abusing Glype proxies: attacks, exploits and defences. |
Netw. Secur. |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Yue-Shan Chang, Chih-Tien Fan, Tong-Ying Juang |
Supporting software intelligence in ubiquitous environment exploits mobile agent. |
J. Ambient Intell. Humaniz. Comput. |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Mathew Laibowitz, Vids Samanta, Syed Ali, Ronald T. Azuma |
Chamber of Mirrors: A Socially Activated Game Exploits Pervasive Technology. |
IEEE Pervasive Comput. |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Chris Valasek |
Primitive-Chaining Exploits: A Real-World Example. |
IEEE Secur. Priv. |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Dai Owaki, Leona Morikawa, Akio Ishiguro |
Listen to body's message: Quadruped robot that fully exploits physical interaction between legs. |
IROS |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Ryan Farley, Xinyuan Wang 0005 |
VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits. |
NOMS |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Engin Kirda (eds.) |
5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012 |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Alok Tongaonkar, Ram Keralapura, Antonio Nucci |
Challenges in Network Application Identification. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Kurt Thomas, Chris Grier, Vern Paxson |
Adapting Social Spam Infrastructure for Political Censorship. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Armin Büscher, Thorsten Holz |
Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Paul Ferguson |
Observations on Emerging Threats. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Mike Samuel, Úlfar Erlingsson |
Let's Parse to Prevent Pwnage. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Tudor Dumitras, Petros Efstathopoulos |
Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Jason Britt, Brad Wardman, Alan P. Sprague, Gary Warner |
Clustering Potential Phishing Websites Using DeepMD5. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu |
Key Challenges in Defending Against Malicious Socialbots. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Eric Chien, Liam O'Murchu, Nicolas Falliere |
W32.Duqu: The Precursor to the Next Stuxnet. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Ari Juels, Ting-Fang Yen |
Sherlock Holmes and the Case of the Advanced Persistent Threat. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | David Dittrich |
So You Want to Take Over a Botnet... |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Yeongung Park, Choonghyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-je Cho |
RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth |
Classification of UDP Traffic for DDoS Detection. |
LEET |
2012 |
DBLP BibTeX RDF |
|
19 | Xinyuan Wang, Ruishan Zhang |
VoIP Security: Vulnerabilities, Exploits, and Defenses. |
Adv. Comput. |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Martin B. van Gijzen, Peter Sonneveld |
Algorithm 913: An elegant IDR(s) variant that efficiently exploits biorthogonality properties. |
ACM Trans. Math. Softw. |
2011 |
DBLP DOI BibTeX RDF |
|
19 | J. Y. Xu |
Web-Based Billing System Exploits Mature and Emerging Technology. |
IT Prof. |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Yue-Shan Chang, Chih-Tien Fan, Yu-Sheng Wu |
Agent-Based Intelligent Software Exploits Near-Field Communication. |
IT Prof. |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Jonas Emborg, Zlatko Matjacic, Jan Dimon Bendtsen, Erika G. Spaich, Imre Cikajlo, Nika Goljar, Ole Kæseler Andersen |
Design and Test of a Novel Closed-Loop System That Exploits the Nociceptive Withdrawal Reflex for Swing-Phase Support of the Hemiparetic Gait. |
IEEE Trans. Biomed. Eng. |
2011 |
DBLP DOI BibTeX RDF |
|
19 | M. Zubair Rafique, Muhammad Abulaish |
xMiner: Nip the Zero Day Exploits in the Bud. |
NCA |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Takuya Umedachi, Masakazu Akiyama, Atsushi Tero, Akio Ishiguro |
Simulation of a soft-bodied fluid-driven amoeboid robot that exploits thixotropic flow. |
ICRA |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Takeshi Kano, Takahide Sato, Ryo Kobayashi, Akio Ishiguro |
Decentralized control of scaffold-assisted serpentine locomotion that exploits body softness. |
ICRA |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Javier Parapar, Alvaro Barreiro |
A Cluster Based Pseudo Feedback Technique Which Exploits Good and Bad Clusters. |
CAEPIA |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Bing-Han Li, Shiuhpyng Shieh |
RELEASE: Generating Exploits Using Loop-Aware Concolic Execution. |
SSIRI |
2011 |
DBLP DOI BibTeX RDF |
|
19 | M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar |
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms. |
ITNG |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Deguang Kong, Donghai Tian, Peng Liu 0005, Dinghao Wu |
SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. |
SecureComm |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David R. Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song, Thomas Bracewell, David Hyde 0002, Brian Mastropietro |
PEASOUP: preventing exploits against software of uncertain provenance (position paper). |
SESS@ICSE |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Christopher Kruegel (eds.) |
4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '11, Boston, MA, USA, March 29, 2011 |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Kong Lam |
Design of a medium access control protocol that exploits the structures of vehicular networks |
|
2011 |
RDF |
|
19 | Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous |
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Brett Stone-Gross, Thorsten Holz, Gianluca Stringhini, Giovanni Vigna |
The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker |
On the Effects of Registrar-level Intervention. |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Qian Wang, Zesheng Chen, Chao Chen 0001 |
Characterizing Internet Worm Infection Structure. |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter |
Reconstructing Hash Reversal based Proof of Work Schemes. |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang |
Andbot: Towards Advanced Mobile Botnets. |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Mohammed I. Al-Saleh, Jedidiah R. Crandall |
Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software. |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Chao Zhang, Cheng Huang 0002, Keith W. Ross, David A. Maltz, Jin Li 0001 |
Inflight Modifications of Content: Who Are the Culprits? |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Nathaniel Husted, Steven A. Myers |
Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm. |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Youngsang Shin, Minaxi Gupta, Steven A. Myers |
The Nuts and Bolts of a Forum Spam Automator. |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti |
Exposing the Lack of Privacy in File Hosting Services. |
LEET |
2011 |
DBLP BibTeX RDF |
|
19 | Steve Gold |
Protecting the cloud: attack vectors and other exploits. |
Netw. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Rebecca Strawn, Milan Melichercik, Michael Green, Thomas Stockner, Jannette Carey, Rüdiger Ettrich |
Symmetric Allosteric Mechanism of Hexameric Escherichia coli Arginine Repressor Exploits Competition between L-Arginine Ligands and Resident Arginine Residues. |
PLoS Comput. Biol. |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Daniel P. Volpato, Alexandre Keunecke Ignácio Mendonça, Luiz C. V. dos Santos, José Luís Almada Güntzel |
A Post-compiling Approach that Exploits Code Granularity in Scratchpads to Improve Energy Efficiency. |
ISVLSI |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Don McNickle, Krzysztof Pawlikowski, Gregory Ewing |
AKAROA2: A Controller Of Discrete-Event Simulation Which Exploits The Distributed Computing Resources Of Networks. |
ECMS |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Michael D. Bailey (eds.) |
3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '10, San Jose, CA, USA, April 27, 2010 |
LEET |
2010 |
DBLP BibTeX RDF |
|
19 | Stephen Checkoway, Hovav Shacham, Eric Rescorla |
Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer. |
LEET |
2010 |
DBLP BibTeX RDF |
|
Displaying result #201 - #300 of 5956 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|