The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (26) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (50) 1997 (54) 1998 (92) 1999 (127) 2000 (178) 2001 (306) 2002 (406) 2003 (624) 2004 (899) 2005 (1333) 2006 (1490) 2007 (1528) 2008 (1585) 2009 (1275) 2010 (673) 2011 (702) 2012 (813) 2013 (804) 2014 (989) 2015 (1073) 2016 (1206) 2017 (1461) 2018 (1759) 2019 (2206) 2020 (2727) 2021 (2982) 2022 (3370) 2023 (3864) 2024 (1050)
Publication types (Num. hits)
article(15280) book(15) data(11) incollection(195) inproceedings(19901) phdthesis(378) proceedings(22)
Venues (Conferences, Journals, ...)
CoRR(4079) IACR Cryptol. ePrint Arch.(1244) IEEE Access(507) RAID(446) CCS(308) IEEE Trans. Inf. Forensics Sec...(260) Comput. Secur.(249) USENIX Security Symposium(224) IEEE Trans. Smart Grid(198) GLOBECOM(197) ICC(193) FSE(187) ACSAC(184) CHES(178) Sensors(170) ARES(166) More (+10 of total 3761)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11110 occurrences of 2965 keywords

Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, James W. Hong A flow-based method for abnormal network traffic detection. Search on Bibsonomy NOMS (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23David A. Wagner 0001 Towards a Unifying View of Block Cipher Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Jeongseok Seo, Han-Sung Kim, Sanghyun Cho, Sung Deok Cha Web Server Attack Categorization based on Root Causes and Their Locations. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Alex Biryukov, Adi Shamir, David A. Wagner 0001 Real Time Cryptanalysis of A5/1 on a PC. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Donald G. Marks, Amihai Motro, Sushil Jajodia Enhancing the Controlled Disclosure of Sensitive Information. Search on Bibsonomy ESORICS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
23Matthias Krause 0001, Dirk Stegemann More on the Security of Linear RFID Authentication Protocols. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography
23Tzu-Rung Lee, Kwo-Cheng Chiu, Da-Wei Chang A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Failure-Oblivious Computing, Guard Pages, Network Security, Self Reconfiguration, Buffer Overflow Attacks
23Artemios G. Voyiatzis, Dimitrios N. Serpanos The security of the Fiat-Shamir scheme in the presence of transient hardware faults. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack
23Emmanuel Bresson, Mark Manulis Securing group key exchange against strong corruptions. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authenticated group key exchange, strong corruptions, mutual authentication, contributiveness, insider attacks
23Prateek Mittal, Nikita Borisov Information leaks in structured peer-to-peer anonymous communication systems. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF information leaks, peer-to-peer, anonymity, attacks
23Konstantinos Kemalis, Theodoros Tzouramanis SQL-IDS: a specification-based approach for SQL-injection detection. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF specification-based runtime validation, world-wide web, database security, web application security, SQL injection attacks
23Silvana Medos, Serdar Boztas Montgomery Residue Representation Fault-Tolerant Computation in GF(2k). Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF fault tolerant computation, finite field, fault attacks
23Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee A Robust Watermark Scheme for Copyright Protection. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed discrete wavelet transformation, image attacks, watermark, singular value decomposition, copyright protection
23Praveen Gauravaram, Katsuyuki Okeya Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, side channel attacks, HMAC, Applied cryptography
23Yossef Oren, Adi Shamir Remote Password Extraction from RFID Tags. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sidechannel attacks, RFID, cryptanalysis, power analysis
23Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna Multi-module vulnerability analysis of web-based applications. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-step attacks, static analysis, web applications, dynamic analysis, vulnerability analysis
23Tran Hoang Hai, Faraz Idris Khan, Eui-nam Huh Hybrid Intrusion Detection System for Wireless Sensor Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF routing attacks, security, wireless sensor networks, Intrusion detection
23Shay Gueron Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF safe errors, RSA, smartcards, Fault attacks, countermeasures, embedded devices
23Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui 0001, Kanta Matsuura An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF LPN problem, HB protocols, RFID authentication, cryptanalysis, fast correlation attacks
23Gregory J. Conti, Mustaque Ahamad, John T. Stasko Attacking information visualization system usability overloading and deceiving the human. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF denial of information, malicious visualizations, usability attacks, information visualization, secure visualization
23Raphael Chung-Wei Phan, Bok-Min Goi On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. Search on Bibsonomy ICCSA (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cardholder authentication, biometrics, attacks, Smartcards
23Raphael Chung-Wei Phan, Bok-Min Goi On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. Search on Bibsonomy ICCSA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cardholder authentication, biometrics, attacks, Smartcards
23Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly Denial of service resilience in ad hoc networks. Search on Bibsonomy MobiCom The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ad hoc networks, TCP, UDP, DoS attacks
23Katsuyuki Okeya, Dong-Guk Han Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA
23Michael Ettredge, Vernon J. Richardson Assessing the Risk in E-commerce. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Electronic Commerce Risk, Hacker Attacks, Stock Market Reaction
23Adi Shamir, Nicko van Someren Playing "Hide and Seek" with Stored Keys. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF lunchtime attacks, authenticode, key hiding, Cryptanalysis, RSA
23Taekyoung Kwon 0002, JooSeok Song Security and efficiency in authentication protocols resistant to password guessing attack. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks
23Adam L. Young, Moti Yung The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone
23Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks
23Marc Joye Highly Regular m-Ary Powering Ladders. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery ladder, SPA-type attacks, safe-error attacks, Exponentiation algorithms
23Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel A Practical Attack on KeeLoq. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF KeeLoq, cryptanalysis, block ciphers, slide attacks, meet-in-the-middle attacks
22Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves Le Boudec Effectiveness of distance-decreasing attacks against impulse radio ranging. Search on Bibsonomy WISEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF ieee 802.15.4a, physical layer attack, secure ranging, ultra wideband, ranging, relay attack, distance bounding, impulse radio
22Yi Xie 0002, Shun-Zheng Yu Monitoring the application-layer DDoS attacks for popular websites. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF popular Website, distributed denial of service (DDoS), application-layer
22Yao Liu 0007, Michael K. Reiter, Peng Ning False data injection attacks against state estimation in electric power grids. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attack, power grids, state estimation
22Yu Zhang 0034, Xingshe Zhou 0001, Yee Wei Law, Marimuthu Palaniswami Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Anna T. Lawniczak, Hao Wu 0002, Bruno N. Di Stefano Entropy Based Detection of DDoS Attacks in Packet Switching Network Models. Search on Bibsonomy Complex (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF entropy, packet switching network, distributed denial of service attack
22Thomas Plantard, Willy Susilo Broadcast Attacks against Lattice-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Broadcast attack, lattice-based cryptosystem, knapsack cryptosystem, intersecting lattice
22Mansoor Alicherry, Angelos D. Keromytis DoubleCheck: Multi-path verification against man-in-the-middle attacks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Leonardo Lemes Fagundes, Luciano Paschoal Gaspary Breaking the barriers between security mechanisms through the composition of Web Services: Towards a solution for the detection of multistage distributed attacks. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Takanori Isobe 0001, Kyoji Shibutani Preimage Attacks on Reduced Tiger and SHA-2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger
22Kazumaro Aoki, Yu Sasaki Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-1, preimage, one-way, meet-in-the-middle, SHA-0
22Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Mehdi Kiani, Andrew J. Clark, George M. Mohay Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anomaly Based Intrusion Detection System, SQL injection
22Wen-Chih Wu, Oscal T.-C. Chen Robust echo hiding scheme against pitch-scaling attacks. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh Chosen-message SPA attacks against FPGA-based RSA hardware implementations. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Suman Deb Roy, Sneha Aman Singh, Subhrabrata Choudhury, Narayan C. Debnath Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Yuichi Sei, Shinichi Honiden Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF node compromising attack, node replication attack, security, wireless sensor networks, algorithm
22Wei Chen, Yingzhou Zhang, Yuanchun Wei The Feasibility of Launching Reduction of Quality (RoQ) Attacks in 802.11 Wireless Networks. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim New Impossible Differential Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, Impossible differential cryptanalysis
22Kenneth G. Paterson, Gaven J. Watson Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack
22Helena Handschuh, Bart Preneel Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot On Purely Automated Attacks and Click-Based Graphical Passwords. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jing Dong 0006, Kurt Erik Ackermann, Brett Bavar, Cristina Nita-Rotaru Mitigating attacks against virtual coordinate based routing in wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF beacon vector routing, secure beacon vector routing, sensor network routing, virtual coordinate system, security, routing
22Wei Yu 0003, K. J. Ray Liu Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jinpeng Wei, Calton Pu Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Probabilistic Modeling, Race Condition
22Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh Protecting browsers from dns rebinding attacks. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF spam, firewall, dns, same-origin policy, click fraud
22Anjali Sardana, Krishan Kumar 0001, Ramesh Chandra Joshi Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Nicolas Gama, Phong Q. Nguyen New Chosen-Ciphertext Attacks on NTRU. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Wei Li 0013, Dawu Gu An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Aleksandar Kuzmanovic, Edward W. Knightly Low-rate TCP-targeted denial of service attacks and counter strategies. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP, TCP/IP, denial of service, retransmission timeout
22Bing Chen, Joohan Lee, Annie S. Wu Active Event Correlation in Bro IDS to Detect Multi-stage Attacks. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Michael Neve, Jean-Pierre Seifert Advances on Access-Driven Cache Attacks on AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Dong Seong Kim 0001, Sang Min Lee 0018, Jong Sou Park Toward Lightweight Detection and Visualization for Denial of Service Attacks. Search on Bibsonomy MICAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Stefanos Koutsoutos, Ioannis T. Christou, Sofoklis Efremidis An Intrusion Detection System for Network-Initiated Attacks Using a Hybrid Neural Network. Search on Bibsonomy AIAI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Christoph Herbst, Elisabeth Oswald, Stefan Mangard An AES Smart Card Implementation Resistant to Power Analysis Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DPA resistance, smart card, AES
22Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia Fast Detection of Denial-of-Service Attacks on IP Telephony. Search on Bibsonomy IWQoS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Wei Chen, Dit-Yan Yeung Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Palash Sarkar 0001 Generic Attacks on Symmetric Ciphers. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Aaron Walters, David John Zage, Cristina Nita-Rotaru Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Ting Xue, Natalija Vlajic Analytical and Simulation Based Evaluation of Wireless-to-Wireline TCP-SYN Attacks. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Jian Kang 0001, Yuan Zhang, Jiu-bin Ju A Formalized Taxonomy of DDoS Attacks Based on Similarity. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Naoum Naoumov, Keith W. Ross Exploiting P2P systems for DDoS attacks. Search on Bibsonomy Infoscale The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Joseph Bonneau, Ilya Mironov Cache-Collision Timing Attacks Against AES. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, timing attack
22Cédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater Template Attacks in Principal Subspaces. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. Search on Bibsonomy NPC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Ning Song, Lijun Qian, Xiangfang Li Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan, Dong Xuan Sensor Network Configuration Under Physical Attacks. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF padding oracle, CBC-mode, side channel, ISO standards
22Xinwen Fu, Ye Zhu 0001, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 On Flow Marking Attacks in Wireless Anonymous Communication Networks. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Wei Shi, Yang Xiang 0001, Wanlei Zhou 0001 Distributed Defense Against Distributed Denial-of-Service Attacks. Search on Bibsonomy ICA3PP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22William G. J. Halfond, Alessandro Orso AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF static analysis, runtime monitoring, SQL injection
22Yu Chen 0002, Kai Hwang 0001, Yu-Kwong Kwok Filtering of Shrew DDoS Attacks in Frequency Domain. Search on Bibsonomy LCN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF reduction of quality (RoQ), Internet traffic analysis, Network security, digital signal processing (DSP), distributed denial of service (DDoS)
22XiaoFeng Wang 0001, Michael K. Reiter Mitigating bandwidth-exhaustion attacks using congestion puzzles. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF denial of service, client puzzle
22Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. Search on Bibsonomy NETWORKING The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22V. Anil Kumar, Dorgham Sisalem TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Willi Meier, Enes Pasalic, Claude Carlet Algebraic Attacks and Decomposition of Boolean Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Jean-Loup Guillaume, Matthieu Latapy, Clémence Magnien Comparison of Failures and Attacks on Random and Scale-Free Networks. Search on Bibsonomy OPODIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Il-Ahn Cheong, Yongmin Kim 0005, Minsoo Kim 0002, BongNam Noh The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Jung-Taek Seo, Cheolho Lee, Jongsub Moon Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. Search on Bibsonomy GCC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao 0001 Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao 0001 Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Hervé Ledig, Frédéric Muller, Frédéric Valette Enhancing Collision Attacks. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Clayton Bolz, Gordon W. Romney, Brandon L. Rogers Safely train security engineers regarding the dangers presented by denial of service attacks. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF DoS lab, isolated lab, network security, information technology, DDoS
22Jun (Jim) Xu, Wooyong Lee Sustaining Availability of Web Services under Distributed Denial of Service Attacks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF World-Wide Web, game theory, Availability, survivability, Distributed Denial of Service (DDoS)
22Aleksandar Kuzmanovic, Edward W. Knightly Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. Search on Bibsonomy SIGCOMM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TCP, denial of service, retransmission timeout
22Ulrich Kühn 0001 Side-Channel Attacks on Textbook RSA and ElGamal Encryption. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RSA encryption, Side-channel attack, ElGamal encryption
22Kihun Chong, Ha Yoon Song, Sam H. Noh Traffic Characterization of the Web Server Attacks of Worm Viruses. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 35802 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license