The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Malicious with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1990 (17) 1991-1994 (15) 1995-1996 (19) 1997 (16) 1998 (34) 1999 (27) 2000 (47) 2001 (76) 2002 (100) 2003 (164) 2004 (264) 2005 (382) 2006 (463) 2007 (508) 2008 (584) 2009 (410) 2010 (169) 2011 (158) 2012 (173) 2013 (182) 2014 (208) 2015 (229) 2016 (261) 2017 (276) 2018 (369) 2019 (348) 2020 (394) 2021 (441) 2022 (395) 2023 (443) 2024 (125)
Publication types (Num. hits)
article(2248) book(8) data(5) incollection(29) inproceedings(4933) phdthesis(62) proceedings(12)
Venues (Conferences, Journals, ...)
CoRR(363) MALWARE(192) IACR Cryptol. ePrint Arch.(98) IEEE Access(90) ACSAC(85) CCS(70) Comput. Secur.(61) ICC(58) ARES(55) SAC(50) RAID(43) DSN(39) GLOBECOM(37) Sensors(37) ICDCS(35) Wirel. Pers. Commun.(35) More (+10 of total 1903)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3452 occurrences of 1510 keywords

Results
Found 7297 publication records. Showing 7297 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Chien-Fu Cheng, Shu-Ching Wang, Tyne Liang Zone-Oriented Byzantine Agreement on Zone-Based Wireless Ad-Hoc Network. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF zone-based wireless ad-hoc network, malicious fault, fault-tolerance, distributed system, Byzantine agreement
20Dan Holtby, Bruce M. Kapron, Valerie King Lower bound for scalable Byzantine Agreement. Search on Bibsonomy PODC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF malicious adversary, non-adaptive adversary, scalable, distributed computing, lower bounds, randomized, Byzantine Agreement, probabilistic
20Ignacy Gawedzki, Khaldoun Al Agha Proactive Resilience to Dropping Nodes in Mobile Ad Hoc Networks. Search on Bibsonomy AINTEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ad hoc networks, resilience, malicious nodes, proactive routing
20Avinash Srinivasan, Joshua Teitelbaum, Jie Wu 0001 DRBTS: Distributed Reputation-based Beacon Trust System. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Beacon node, security, trust, reputation, revocation, sensor node, malicious node
20Neal Leavitt Instant Messaging: A New Target for Hackers. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security risks, instant messaging, phishing, malicious code
20Gregory J. Conti, Mustaque Ahamad, John T. Stasko Attacking information visualization system usability overloading and deceiving the human. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF denial of information, malicious visualizations, usability attacks, information visualization, secure visualization
20John V. Harrison Enhancing Network Security By Preventing User-Initiated Malware Execution. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network Security, Computer Security, Malicious Software, Operating System Security
20Vasileios Vlachos, Vassiliki Vouzi, Damianos Chatziantoniou, Diomidis Spinellis NGCE - Network Graphs for Computer Epidemiologists. Search on Bibsonomy Panhellenic Conference on Informatics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network graphs, Computer epidemiology, Malicious software
20Kaliappa Nadar Ravindran, Kevin A. Kwiat, Ali Sabbir Adapting Distributed Voting Algorithms for Secure Real-Time Embedded Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF replication of environment data, data integrity & availability, timing constraints, majority voting, adaptive protocols, Malicious failures
20Joris Claessens, Bart Preneel, Joos Vandewalle (How) can mobile agents do secure electronic transactions on untrusted hosts? A survey of the security issues and the current solutions. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF electronic transactions, Mobile agent security, malicious hosts
20Linda Briesemeister, Patrick Lincoln, Phillip A. Porras Epidemic profiles and defense of scale-free networks. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF computer epidemics, self-propagating malicious code, scale-free networks
20Darrell M. Kienzle, Matthew C. Elder Recent worms: a survey and trends. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF survey, malicious code
20Ahmed Sameh Mohamed, Dalia Fakhry Security in Mobile Agent Systems. Search on Bibsonomy SAINT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Code Mess Up and Encryption, Security, Mobile Agents, Malicious Host
20Volker Roth 0002 Empowering Mobile Software Agents. Search on Bibsonomy Mobile Agents The full citation details ... 2002 DBLP  DOI  BibTeX  RDF protocol interleaving attack, Mobile agent security, malicious host, applied cryptography
20Jeff S. L. Cheng, Victor K. Wei Defenses against the Truncation of Computation Results of Free-Roaming Agents. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF agent route protection, cryptographic protocols, mobile agent security, malicious host, truncation attack
20Erica Y. Yang, Jie Xu 0007, Keith H. Bennett A Fault-Tolerant Approach to Secure Information Retrieval. Search on Bibsonomy SRDS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF malicious faults, security, fault tolerance, secret sharing, private information retrieval, Distributed database systems
20Robert K. Cunningham, Craig S. Stevenson Accurately Detecting Source Code of Attacks That Increase Privilege. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Machine Learning, Intrusion Detection, Malicious Code
20Jeremy Epstein, L. Thomas, Eric Monteith Using Operating System Wrappers to Increase the Resiliency to Commercial Firewalls. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF operating system wrappers, commercial firewalls, fine grained control, application proxy firewalls, experiments, computer networks, network operating systems, authorisation, telecommunication security, applications software, malicious software
20Michael J. Petkac, Lee Badger Security Agility in Response to Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF security agility, cooperative frameworks, malicious attacks, mission critical functionality, security policy reconfiguration, runtime security policy change, prototype toolkit, flexible host-based response, distributed systems, intrusion detection, distributed processing, software components, security of data
20Alfredo Benso, Paolo Prinetto, Maurizio Rebaudengo, Matteo Sonza Reorda, Jaan Raik, Raimund Ubar Exploiting High-Level Descriptions for Circuits Fault Tolerance Assessments. Search on Bibsonomy DFT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Alternative Graphs, Malicious Fault List, VHDL, Fault Injection
20Marvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox Ensuring Assurance in Mobile Computing. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF mobile computing assurance, mobile code applications, malicious applets, rogue applets, JavaSoft, vendors, Java, research, data security, software portability, software portability
20T. Mitchem, R. Lu, R. O'Brian Using Kernel Hypervisors to Secure Applications. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF kernel hypervisors, secure applications, selective control, loadable module, unbypassable security wrappers, application specific security requirements, client kernel hypervisors, application specific policies, loadable modules, user systems, malicious active content, wrapping servers, firewall services, Web browser, operating system kernels, Linux kernel, COTS components, replication services
20R. E. Niemeyer Using Web Technologies in Two MLS Environments: A Security Analysis. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF World Wide Web technologies, multi-level secure systems, single-level network environments, Web browser software, security sensitivity level, information transfer, security boundaries, security classification, network client, malicious code insertion, Trojan horse code, primary information flow direction, Internet, HTTP, Web server, security of data, intranet, threats, security vulnerabilities, computer viruses, database server, HyperText Transfer Protocol, denial of service attacks
16Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Murtuza Jadliwala, Sheng Zhong 0002, Shambhu J. Upadhyaya, Chunming Qiao, Jean-Pierre Hubaux Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF distance-based localization, security, Wireless networks
16N. V. Narendra Kumar, Harshit J. Shah, R. K. Shyamasundar Can we certify systems for freedom from malware. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Seth Gilbert, Rachid Guerraoui, Faezeh Malakouti Rad, Morteza Zadimoghaddam Collaborative scoring with dishonest participants. Search on Bibsonomy SPAA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF fault tolerance, recommendation systems, collaborative filtering, randomized algorithms
16Yanfang Ye 0001, Lifei Chen, Dingding Wang 0001, Tao Li 0001, Qingshan Jiang, Min Zhao SBMDS: an interpretable string based malware detection system using SVM ensemble with bagging. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion Architecture of a morphological malware detector. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Debin Liu, XiaoFeng Wang 0001, L. Jean Camp Mitigating Inadvertent Insider Threats with Incentives. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Incentive Engineering, Game Theory, Insider Threat, Human Subject
16Jan Camenisch, Gregory M. Zaverucha Private Intersection of Certified Sets. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF private set intersection, certified sets, secure two-party computation
16Keith Needels, Minseok Kwon Secure routing in peer-to-peer distributed hash tables. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, routing, distributed hash tables, peer-to-peer overlay networks
16Vik Tor Goh, Jacob Zimmermann, Mark Looi Towards Intrusion Detection for Encrypted Networks. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Sung-Min Lee 0004, Sang-Bum Suh, Bokdeuk Jeong, Sangdok Mo, Brian Myungjune Jung, Jung-Hyun Yoo, Jae-Min Ryu, Dong-Hyuk Lee Fine-grained I/O access control of the mobile devices based on the Xen architecture. Search on Bibsonomy MobiCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF I/O access control, smart phone security, virtual machine, virtual machine monitor
16Olufunmilola Oladunni Onolaja, Rami Bahsoon, Georgios Theodoropoulos 0001 An Architecture for Dynamic Trust Monitoring in Mobile Networks. Search on Bibsonomy OTM Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Christian Bockermann, Martin Apel, Michael Meier 0001 Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract). Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Matthias Majuntke, Dan Dobre, Marco Serafini, Neeraj Suri Abortable Fork-Linearizable Storage. Search on Bibsonomy OPODIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Fork-linearizability, abortable objects, lock-freedom, shared memory, online collaboration
16Alexander W. Dent A survey of certificateless encryption schemes and security models. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptography, Public-key cryptography, Certificateless cryptography, Certificateless encryption
16Georgia Koutrika, Frans Adjie Effendi, Zoltán Gyöngyi, Paul Heymann, Hector Garcia-Molina Combating spam in tagging systems: An evaluation. Search on Bibsonomy ACM Trans. Web The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bookmarking systems, tag spam, tagging models, Tagging
16Munirul M. Haque, Sheikh Iqbal Ahamed An Impregnable Lightweight Device Discovery (ILDD) Model for the Pervasive Computing Environment of Enterprise Applications. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Shufen Peng, Jingsha He, Yao Meng Reputation-based Trust Update in Network Environment. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Zemao Chen, Xiaoping Wu, Weimin Tang An Executable Code Authorization Model for Secure Operating System. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Hakem Beitollahi, Geert Deconinck FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Zhenkuan Pan 0001, Guanfeng Liu 0001, Yuebin Xu A Distributed Reputation Control Architecture Based on Virtual Organizational Domains in the Grid Economy. Search on Bibsonomy PDP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF reputation control, distributed architecture, Grid economy
16Jianli Hu, Quanyuan Wu, Bin Zhou 0004 RBTrust: A Recommendation Belief Based Distributed Trust Management Model for P2P Networks. Search on Bibsonomy HPCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Azzedine Boukerche, Yonglin Ren A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks. Search on Bibsonomy PE-WASUN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile ad hoc networks, secure management, mobile security, trust evaluation, reputation model
16Zhiwen Bai, Liming Wang, Jinglin Chen, Lin Xu, Jian Liu, Xiyang Liu DTAD: A Dynamic Taint Analysis Detector for Information Security. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Anwitaman Datta, Xin Liu 0027 Really Simple Security for P2P Dissemination of Really Simple Syndication. Search on Bibsonomy OTM Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Xiaoyan Sun, Yang Wang, Jie Ren, Yuefei Zhu, Shengli Liu 0003 Collecting Internet Malware Based on Client-side Honeypot. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Ruixuan Li 0001, Cuihua Zuo, Yuntian He, Zhengding Lu A Credit Mechanism Based on Automatic Audit in P2P File Sharing Systems. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Gheorghe Cosmin Silaghi, Patrício Domingues, Filipe Araújo, Luís Moura Silva, Alvaro E. Arenas Defeating colluding nodes in Desktop Grid computing platforms. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Ling Xu, Hong Wang 0006, Hiroyuki Takizawa, Hiroaki Kobayashi A Reliability Model for Result Checking in Volunteer Computing. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF volunteer computing, result checking
16Abhrajit Ghosh, Vikram Kaul, David Famolari An Approach to Secure Localization in WLANs. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Chia-Tien Dan Lo, Yi-Gang Tai Highly Space Efficient Counters for Perl Compatible Regular Expressions in FPGAs. Search on Bibsonomy ARC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Abhijit Bose, Xin Hu 0001, Kang G. Shin, Taejoon Park Behavioral detection of malware on mobile handsets. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile handsets, security, machine learning, worm detection
16Lei Hou, Hai-Xin Duan, Jianping Wu Scheduling Peers Based on Credit Construction Period in Peer-to-Peer Networks. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Zoran Rusinovic, Nikola Bogunovic Self-Protecting Session Initiation Protocol Stack. Search on Bibsonomy KES (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cellular automata, SIP, Denial of Service, Self-protecting
16Nathan Griffiths, Arshad Jhumka, Anthony Dawson, Richard Myers A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks. Search on Bibsonomy IDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Min-Jen Tsai, Chih-Cheng Chien A wavelet-based semi-fragile watermarking with recovery mechanism. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera MAISim: mobile agent malware simulator. Search on Bibsonomy SimuTools The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer attacks, security, simulation, mobile agents, malware, critical infrastructures, ACM proceedings
16Fei Wang, Yijun Mo, Benxiong Huang Defending Reputation System against False Recommendation in Mobile Ad Hoc Network. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Noor-ul-Qayyum, Farooq Ahmad Integrity assurance of mobile agents through public-key encryption and watermarking. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF memory corruption, debugging, vulnerability analysis
16Heng Yin 0001, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda Panorama: capturing system-wide information flow for malware detection and analysis. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic taint analysis, spyware, malware detection, malware analysis
16Tong Zhou, Romit Roy Choudhury, Peng Ning, Krishnendu Chakrabarty Privacy-Preserving Detection of Sybil Attacks in Vehicular Ad Hoc Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16J. Martin Leo Manickam, R. Bhuvaneswari, Marcharla Anjaneyulu Bhagyaveni, S. Shanmugavel Secure routing protocol for mobile ad-hoc networks. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF attacks on MANETs, promiscuous mode, wired and wireless networks, ad-hoc networking, secure routing
16Bhaskar Mehta, Thomas Hofmann, Peter Fankhauser Lies and propaganda: detecting spam users in collaborative filtering. Search on Bibsonomy IUI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data mining, dimensionality reduction, information filtering, spam detection
16Yonatan Aumann, Yehuda Lindell Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ortal Arazi, Hairong Qi 0001, Derek Rose A Public Key Cryptographic Method for Denial of Service Mitigation in Wireless Sensor Networks. Search on Bibsonomy SECON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Kun Wang, Meng Wu A Trust Approach for Node Cooperation in MANET. Search on Bibsonomy MSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Node cooperation, MANET (Ad Hoc), trust
16Chittaranjan Hota, Janne Lindqvist, Kristiina Karvonen, Antti Ylä-Jääski, C. K. J. Mohan Safeguarding Against Sybil Attacks via Social Networks and Multipath Routing. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16M. Zubair Shafiq, Mehrin Kiani, Bisma Hashmi, Muddassar Farooq Extended thymus action for reducing false positives in ais based network intrusion detection systems. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF artificial immune system, network intrusion detection
16Yu-Mei Liu, Shoubao Yang, Leitao Guo A Distributed Trust-based Reputation Model in P2P System. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF R-Chord, TBRM, Trust, Transaction, Reputation, p2p networks, Resource
16Katelin Bailey, Linden Vongsathorn, Apu Kapadia, Chris Masone, Sean W. Smith TwoKind authentication: usable authenticators for untrustworthy environments. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16José Fonseca 0002, Marco Vieira, Henrique Madeira Integrated Intrusion Detection in Databases. Search on Bibsonomy LADC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, Databases, intrusion detection
16Azzedine Boukerche, Yonglin Ren A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks. Search on Bibsonomy Q2SWinet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile agent, anonymity, wireless ad hoc network, secure protocol, wireless security
16Young-Geun Choi, Jeonil Kang, DaeHun Nyang Proactive Code Verification Protocol in Wireless Sensor Network. Search on Bibsonomy ICCSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Aina Ravoaja, Emmanuelle Anceaume STORM: A Secure Overlay for P2P Reputation Management. Search on Bibsonomy SASO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Andreas Moser, Christopher Krügel, Engin Kirda Exploring Multiple Execution Paths for Malware Analysis. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Shafi Goldwasser, Dan Gutfreund, Alexander Healy, Tali Kaufman, Guy N. Rothblum Verifying and decoding in constant depth. Search on Bibsonomy STOC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF error-correcting codes, interactive proofs, constant-depth circuits
16Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Daniel O. Rice A Proposal for the Security of Peer-to-Peer (P2P) Networks: a pricing model inspired by the theory of complex networks. Search on Bibsonomy CISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Hina Arora, Birendra K. Mishra, T. S. Raghu 0001 Autonomic-computing approach to secure knowledge management: a game-theoretic analysis. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Kurato Maeno, Qibin Sun, Shih-Fu Chang, Masayuki Suto New semi-fragile image authentication watermarking techniques using random bias and nonuniform quantization. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Georgios Keramidas, Pavlos Petoumenos, Stefanos Kaxiras, Alexandros Antonopoulos, Dimitrios N. Serpanos Preventing Denial-of-Service Attacks in Shared CMP Caches. Search on Bibsonomy SAMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Bo Zhu, Sanjeev Setia, Sushil Jajodia Providing witness anonymity in peer-to-peer systems. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF k-times, witness anonymity, privacy, peer-to-peer systems, anonymous authentication
16Gaeil An, Joon S. Park Packet Marking Based Cooperative Attack Response Service for Effectively Handling Suspicious Traffic. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attack Response, Quality of Service, Network Security, Packet Marking, Denial of Service Attack
16Venkatesan Balakrishnan, Vijay Varadharajan, Udaya Kiran Tupakula Fellowship: Defense against Flooding and Packet Drop Attacks in MANET. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Ettore Merlo, Dominic Letarte, Giuliano Antoniol Insider and Ousider Threat-Sensitive SQL Injection Vulnerability Analysis in PHP. Search on Bibsonomy WCRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Edith C. H. Ngai, Michael R. Lyu An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Elias Athanasopoulos, Kostas G. Anagnostakis, Evangelos P. Markatos Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Andreas Pietzowski, Benjamin Satzger, Wolfgang Trumler, Theo Ungerer A Bio-inspired Approach for Self-protecting an Organic Middleware with Artificial Antibodies. Search on Bibsonomy IWSOS/EuroNGI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16A. Karygiannis, E. Antonakakis, A. Apostolopoulos Detecting Critical Nodes for MANET Intrusion Detection Systems. Search on Bibsonomy SecPerU The full citation details ... 2006 DBLP  DOI  BibTeX  RDF edge-cut, vertex-cut, security, mobile ad hoc network, MANET, intrusion detection, IDS
16Shuiming Ye, Qibin Sun, Ee-Chien Chang Error Resilient Image Authentication Using Feature Statistical and Spatial Properties. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Feature Distance Measure, Digital Signature, Digital Watermarking, Error Resilience, Image Authentication, Image Transmission
16Jianshu Weng, Chunyan Miao, Angela Goh A Robust Reputation System for the Grid. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Elmurod Talipov, Donxue Jin, JaeYoun Jung, Ilkhyu Ha, YoungJun Choi, Chonggun Kim Path Hopping Based on Reverse AODV for Security. Search on Bibsonomy APNOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Path-hopping, reverse AODV, Ad hoc network security
16Junsheng Chang, Huaimin Wang, Gang Yin A Time-Frame Based Trust Model for P2P Systems. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF peer to peer, trust model
16Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas Robust cooperative trust establishment for MANETs. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF routing, mobile ad hoc networks, trust establishment
16Jens-Matthias Bohli A Framework for Robust Group Key Agreement. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Jeffrey C. Jackson Uniform-Distribution Learnability of Noisy Linear Threshold Functions with Restricted Focus of Attention. Search on Bibsonomy COLT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 7297 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license