The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for exploits with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1984 (17) 1985-1987 (16) 1988-1989 (24) 1990 (28) 1991 (20) 1992-1993 (41) 1994 (40) 1995 (58) 1996 (63) 1997 (98) 1998 (78) 1999 (155) 2000 (164) 2001 (201) 2002 (287) 2003 (302) 2004 (477) 2005 (636) 2006 (762) 2007 (788) 2008 (828) 2009 (498) 2010 (102) 2011 (28) 2012 (20) 2013 (17) 2014 (16) 2015 (15) 2016 (25) 2017 (24) 2018 (25) 2019 (18) 2020-2021 (38) 2022 (28) 2023 (17) 2024 (2)
Publication types (Num. hits)
article(1216) book(1) incollection(20) inproceedings(4702) phdthesis(11) proceedings(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 6048 occurrences of 3544 keywords

Results
Found 5956 publication records. Showing 5956 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Christopher Kugler, Tilo Müller Separated Control and Data Stacks to Mitigate Buffer Overflow Exploits. Search on Bibsonomy EAI Endorsed Trans. Security Safety The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Chetan Singh Thakur, Runchun Wang, Tara Julia Hamilton, Jonathan Tapson, André van Schaik A Trainable Neuromorphic Integrated Circuit that Exploits Device Mismatch. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
19Hao-Hsiang Wu, Simge Küçükyavuz Maximizing Influence in Social Networks: A Two-Stage Stochastic Programming Approach That Exploits Submodularity. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
19Hannes Holm, Matus Korman, Mathias Ekstedt A Bayesian network model for likelihood estimations of acquirement of critical software vulnerabilities and exploits. Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Ahmad-Reza Sadeghi, Lucas Davi, Per Larsen Securing Legacy Software against Real-World Code-Reuse Exploits: Utopia, Alchemy, or Possible Future? Search on Bibsonomy AsiaCCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Norihito Inamuro, Akira Hirabayashi Improving the quality of compressed sensing MRI that exploits adjacent slice similarity. Search on Bibsonomy APSIPA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Takuya Watanabe 0001, Mitsuaki Akiyama, Tatsuya Mori RouteDetector: Sensor-based Positioning System That Exploits Spatio-Temporal Regularity of Human Mobility. Search on Bibsonomy WOOT The full citation details ... 2015 DBLP  BibTeX  RDF
19Hong Hu 0004, Zheng Leong Chua, Sendroiu Adrian, Prateek Saxena, Zhenkai Liang Automatic Generation of Data-Oriented Exploits. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
19Carl Sabottke, Octavian Suciu, Tudor Dumitras Vulnerability Disclosure in the Age of Social Media: Exploiting Twitter for Predicting Real-World Exploits. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2015 DBLP  BibTeX  RDF
19Aya Hasebe, Kazushi Nishimoto BrainTranscending: A Hybrid Divergent Thinking Method that Exploits Creator Blind Spots. Search on Bibsonomy KICSS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Michel Edkrantz, Staffan Truvé, Alan Said Predicting Vulnerability Exploits in the Wild. Search on Bibsonomy CSCloud The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Charles Smutz, Angelos Stavrou Preventing Exploits in Microsoft Office Documents Through Content Randomization. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Michel Edkrantz, Alan Said Predicting Cyber Vulnerability Exploits with Machine Learning. Search on Bibsonomy SCAI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Dennis Kergl, Robert Roedler, Gabi Dreo Rodosek Detection of Zero Day Exploits Using Real-Time Social Media Streams. Search on Bibsonomy NaBIC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Hannes Trunde, Edgar R. Weippl WordPress security: an analysis based on publicly available exploits. Search on Bibsonomy iiWAS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
19Meng Zhang, Anand Raghunathan, Niraj K. Jha A defense framework against malware and vulnerability exploits. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Luca Allodi, Fabio Massacci Comparing Vulnerability Severity and Exploits Using Case-Control Studies. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Jaydeep Solanki, Aenik Shah, Manik Lal Das Secure Patrol: Patrolling Against Buffer Overflow Exploits. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Nicholas J. Hudson 0001, Laercio R. Porto-Neto, James Kijas, Sean McWilliam, Ryan J. Taft, Antonio Reverter Information compression exploits patterns of genome composition to discriminate populations and highlight regions of evolutionary interest. Search on Bibsonomy BMC Bioinform. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Byungho Min, Vijay Varadharajan A New Technique for Counteracting Web Browser Exploits. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19David Durham Mitigating exploits, rootkits and advanced persistent threats. Search on Bibsonomy Hot Chips Symposium The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Min Suk Kang, Virgil D. Gligor Routing Bottlenecks in the Internet: Causes, Exploits, and Countermeasures. Search on Bibsonomy CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Michael Backes 0001, Thorsten Holz, Benjamin Kollenda, Philipp Koppe, Stefan Nürnberger, Jannik Pewny You Can Run but You Can't Read: Preventing Disclosure Exploits in Executable Code. Search on Bibsonomy CCS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Ziyi Liu, Weidong Shi, Shouhuai Xu, Zhiqiang Lin Programmable decoder and shadow threads: Tolerate remote code injection exploits with diversified redundancy. Search on Bibsonomy DATE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Stanislav Dashevskyi, Daniel Ricardo dos Santos, Fabio Massacci, Antonino Sabetta TESTREX: a Testbed for Repeatable Exploits. Search on Bibsonomy CSET The full citation details ... 2014 DBLP  BibTeX  RDF
19Tielei Wang, Chengyu Song, Wenke Lee Diagnosis and Emergency Patch Generation for Integer Overflow Exploits. Search on Bibsonomy DIMVA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Frank L. Greitzer, Jeremy R. Strozer, Sholom Cohen, Andrew P. Moore, David A. Mundie, Jennifer Cowley Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits. Search on Bibsonomy IEEE Symposium on Security and Privacy Workshops The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Alexander H. Levis, Bahram Yousefi Multi-Formalism Modeling For Evaluating The Effect Of Cyber Exploits. Search on Bibsonomy ECMS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Andreas Kuehn, Milton Mueller Shifts in the Cybersecurity Paradigm: Zero-Day Exploits, Discourse, and Emerging Institutions. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Jeffrey Wu 0002, Anthony Arrott, Fernando C. Colón Osorio Protection against remote code execution exploits of popular applications in Windows. Search on Bibsonomy MALWARE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Kevin Z. Snow Identifying Code Injection and Reuse Payloads In Memory Error Exploits. Search on Bibsonomy 2014   DOI  RDF
19Bruno Andò, Salvatore Baglio, Vincenzo Marletta, Adi R. Bulsara A Nonlinear Electric Field Sensor That Exploits Coupled Oscillator Dynamics: The Charge Collection Mechanism. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Tomoyuki Yamakami A Non-Interactive Quantum Bit Commitment Scheme that Exploits the Computational Hardness of Quantum State Distinction. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
19Avinash Srinivasan, Satish Kolli, Jie Wu 0001 Steganographic information hiding that exploits a novel file system vulnerability. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Deguang Kong, Donghai Tian, Qiha Pan, Peng Liu 0005, Dinghao Wu Semantic aware attribution analysis of remote exploits. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Md. Faisal Mahbub Chowdhury, Alberto Lavelli FBK-irst : A Multi-Phase Kernel Based Approach for Drug-Drug Interaction Detection and Classification that Exploits Linguistic Information. Search on Bibsonomy SemEval@NAACL-HLT The full citation details ... 2013 DBLP  BibTeX  RDF
19Ashley L. Podhradsky, Rob D'Ovidio, Pat Engebretson, Cindy Casey Xbox 360 Hoaxes, Social Engineering, and Gamertag Exploits. Search on Bibsonomy HICSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Vern Paxson (eds.) 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '13, Washington, D.C., USA, August 12, 2013 Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
19Athanasios N. Nikolakopoulos, John D. Garofalakis NCDawareRank: a novel ranking method that exploits the decomposable structure of the web. Search on Bibsonomy WSDM The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Serge Egelman, Cormac Herley, Paul C. van Oorschot Markets for zero-day exploits: ethics and implications. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Matthias Neugschwandtner, Martina Lindorfer, Christian Platzer A View to a Kill: WebView Exploitation. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
19Chengcui Zhang, Rupak Kharel, Song Gao 0010, Jason Britt Image Matching for Branding Phishing Kit Images. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
19Mohammad Karami, Damon McCoy Understanding the Emerging Threat of DDoS-as-a-Service. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
19Charles LeDoux, Arun Lakhotia, Craig Miles, Vivek Notani, Avi Pfeffer FuncTracker: Discovering Shared Code to Aid Malware Forensics. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
19Jason W. Clark, Damon McCoy There Are No Free iPads: An Analysis of Survey Scams as a Business. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
19Chuan Yue The Devil Is Phishing: Rethinking Web Single Sign-On Systems Security. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
19Luca Allodi Attacker Economics for Internet-scale Vulnerability Risk Assessment. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
19Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon SinkMiner: Mining Botnet Sinkholes for Fun and Profit. Search on Bibsonomy LEET The full citation details ... 2013 DBLP  BibTeX  RDF
19Aditya K. Sood, Peter Greko, Richard J. Enbody Abusing Glype proxies: attacks, exploits and defences. Search on Bibsonomy Netw. Secur. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Yue-Shan Chang, Chih-Tien Fan, Tong-Ying Juang Supporting software intelligence in ubiquitous environment exploits mobile agent. Search on Bibsonomy J. Ambient Intell. Humaniz. Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Mathew Laibowitz, Vids Samanta, Syed Ali, Ronald T. Azuma Chamber of Mirrors: A Socially Activated Game Exploits Pervasive Technology. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Chris Valasek Primitive-Chaining Exploits: A Real-World Example. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Dai Owaki, Leona Morikawa, Akio Ishiguro Listen to body's message: Quadruped robot that fully exploits physical interaction between legs. Search on Bibsonomy IROS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Ryan Farley, Xinyuan Wang 0005 VoIP Shield: A transparent protection of deployed VoIP systems from SIP-based exploits. Search on Bibsonomy NOMS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Engin Kirda (eds.) 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '12, San Jose, CA, USA, April 24, 2012 Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Alok Tongaonkar, Ram Keralapura, Antonio Nucci Challenges in Network Application Identification. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Kurt Thomas, Chris Grier, Vern Paxson Adapting Social Spam Infrastructure for Political Censorship. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Armin Büscher, Thorsten Holz Tracking DDoS Attacks: Insights into the Business of Disrupting the Web. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Paul Ferguson Observations on Emerging Threats. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Mike Samuel, Úlfar Erlingsson Let's Parse to Prevent Pwnage. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Tudor Dumitras, Petros Efstathopoulos Ask WINE: Are We Safer Today? Evaluating Operating System Security through Big Data Analysis. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Jason Britt, Brad Wardman, Alan P. Sprague, Gary Warner Clustering Potential Phishing Websites Using DeepMD5. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu Key Challenges in Defending Against Malicious Socialbots. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Eric Chien, Liam O'Murchu, Nicolas Falliere W32.Duqu: The Precursor to the Next Stuxnet. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Ari Juels, Ting-Fang Yen Sherlock Holmes and the Case of the Advanced Persistent Threat. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19David Dittrich So You Want to Take Over a Botnet... Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Yeongung Park, Choonghyun Lee, Chanhee Lee, JiHyeog Lim, Sangchul Han, Minkyu Park, Seong-je Cho RGBDroid: A Novel Response-Based Approach to Android Privilege Escalation Attacks. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Alexandru G. Bardas, Loai Zomlot, Sathya Chandran Sundaramurthy, Xinming Ou, S. Raj Rajagopalan, Marc R. Eisenbarth Classification of UDP Traffic for DDoS Detection. Search on Bibsonomy LEET The full citation details ... 2012 DBLP  BibTeX  RDF
19Xinyuan Wang, Ruishan Zhang VoIP Security: Vulnerabilities, Exploits, and Defenses. Search on Bibsonomy Adv. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Martin B. van Gijzen, Peter Sonneveld Algorithm 913: An elegant IDR(s) variant that efficiently exploits biorthogonality properties. Search on Bibsonomy ACM Trans. Math. Softw. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19J. Y. Xu Web-Based Billing System Exploits Mature and Emerging Technology. Search on Bibsonomy IT Prof. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Yue-Shan Chang, Chih-Tien Fan, Yu-Sheng Wu Agent-Based Intelligent Software Exploits Near-Field Communication. Search on Bibsonomy IT Prof. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Jonas Emborg, Zlatko Matjacic, Jan Dimon Bendtsen, Erika G. Spaich, Imre Cikajlo, Nika Goljar, Ole Kæseler Andersen Design and Test of a Novel Closed-Loop System That Exploits the Nociceptive Withdrawal Reflex for Swing-Phase Support of the Hemiparetic Gait. Search on Bibsonomy IEEE Trans. Biomed. Eng. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19M. Zubair Rafique, Muhammad Abulaish xMiner: Nip the Zero Day Exploits in the Bud. Search on Bibsonomy NCA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Takuya Umedachi, Masakazu Akiyama, Atsushi Tero, Akio Ishiguro Simulation of a soft-bodied fluid-driven amoeboid robot that exploits thixotropic flow. Search on Bibsonomy ICRA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Takeshi Kano, Takahide Sato, Ryo Kobayashi, Akio Ishiguro Decentralized control of scaffold-assisted serpentine locomotion that exploits body softness. Search on Bibsonomy ICRA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Javier Parapar, Alvaro Barreiro A Cluster Based Pseudo Feedback Technique Which Exploits Good and Bad Clusters. Search on Bibsonomy CAEPIA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Bing-Han Li, Shiuhpyng Shieh RELEASE: Generating Exploits Using Loop-Aware Concolic Execution. Search on Bibsonomy SSIRI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms. Search on Bibsonomy ITNG The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Deguang Kong, Donghai Tian, Peng Liu 0005, Dinghao Wu SA3: Automatic Semantic Aware Attribution Analysis of Remote Exploits. Search on Bibsonomy SecureComm The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David R. Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song, Thomas Bracewell, David Hyde 0002, Brian Mastropietro PEASOUP: preventing exploits against software of uncertain provenance (position paper). Search on Bibsonomy SESS@ICSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Christopher Kruegel (eds.) 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '11, Boston, MA, USA, March 29, 2011 Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Kong Lam Design of a medium access control protocol that exploits the structures of vehicular networks Search on Bibsonomy 2011   RDF
19Stevens Le Blond, Pere Manils, Chaabane Abdelberi, Mohamed Ali Kâafar, Claude Castelluccia, Arnaud Legout, Walid Dabbous One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Brett Stone-Gross, Thorsten Holz, Gianluca Stringhini, Giovanni Vigna The Underground Economy of Spam: A Botmaster's Perspective of Coordinating Large-Scale Spam Campaigns. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19He Liu, Kirill Levchenko, Márk Félegyházi, Christian Kreibich, Gregor Maier, Geoffrey M. Voelker On the Effects of Registrar-level Intervention. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Qian Wang, Zesheng Chen, Chao Chen 0001 Characterizing Internet Worm Infection Structure. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Jeff Green, Joshua Juen, Omid Fatemieh, Ravinder Shankesi, Dong (Kevin) Jin, Carl A. Gunter Reconstructing Hash Reversal based Proof of Work Schemes. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Xiang Cui, Binxing Fang, Lihua Yin, Xiaoyi Liu, Tianning Zang Andbot: Towards Advanced Mobile Botnets. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Mohammed I. Al-Saleh, Jedidiah R. Crandall Application-Level Reconnaissance: Timing Channel Attacks Against Antivirus Software. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Chao Zhang, Cheng Huang 0002, Keith W. Ross, David A. Maltz, Jin Li 0001 Inflight Modifications of Content: Who Are the Culprits? Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Nathaniel Husted, Steven A. Myers Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Youngsang Shin, Minaxi Gupta, Steven A. Myers The Nuts and Bolts of a Forum Spam Automator. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Nick Nikiforakis, Marco Balduzzi, Steven Van Acker, Wouter Joosen, Davide Balzarotti Exposing the Lack of Privacy in File Hosting Services. Search on Bibsonomy LEET The full citation details ... 2011 DBLP  BibTeX  RDF
19Steve Gold Protecting the cloud: attack vectors and other exploits. Search on Bibsonomy Netw. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Rebecca Strawn, Milan Melichercik, Michael Green, Thomas Stockner, Jannette Carey, Rüdiger Ettrich Symmetric Allosteric Mechanism of Hexameric Escherichia coli Arginine Repressor Exploits Competition between L-Arginine Ligands and Resident Arginine Residues. Search on Bibsonomy PLoS Comput. Biol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Daniel P. Volpato, Alexandre Keunecke Ignácio Mendonça, Luiz C. V. dos Santos, José Luís Almada Güntzel A Post-compiling Approach that Exploits Code Granularity in Scratchpads to Improve Energy Efficiency. Search on Bibsonomy ISVLSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Don McNickle, Krzysztof Pawlikowski, Gregory Ewing AKAROA2: A Controller Of Discrete-Event Simulation Which Exploits The Distributed Computing Resources Of Networks. Search on Bibsonomy ECMS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Michael D. Bailey (eds.) 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET '10, San Jose, CA, USA, April 27, 2010 Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
19Stephen Checkoway, Hovav Shacham, Eric Rescorla Are Text-Only Data Formats Safe? Or, Use This LaTeX Class File to Pwn Your Computer. Search on Bibsonomy LEET The full citation details ... 2010 DBLP  BibTeX  RDF
Displaying result #201 - #300 of 5956 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license