The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "RAID"( http://dblp.L3S.de/Venues/RAID )

URL (DBLP): http://dblp.uni-trier.de/db/conf/raid

Publication years (Num. hits)
2000-2002 (20) 2003-2004 (31) 2005 (17) 2006 (18) 2007 (18) 2008 (37) 2009 (34) 2010 (40) 2011 (21) 2012 (31) 2013 (23) 2014 (23) 2015 (29) 2016 (22) 2017 (22) 2018 (33) 2019 (38) 2020 (32) 2021 (33) 2022 (36) 2023 (51)
Publication types (Num. hits)
inproceedings(585) proceedings(24)
Venues (Conferences, Journals, ...)
RAID(609)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 222 occurrences of 140 keywords

Results
Found 609 publication records. Showing 609 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Apurva Kumar A Lightweight Formal Approach for Analyzing Security of Web Protocols. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo Unsupervised Anomaly-Based Malware Detection Using Hardware Features. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen 0004 Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Angelos Stavrou, Herbert Bos, Georgios Portokalidis (eds.) Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1José Benito Camiña, Jorge Rodríguez-Ruiz, Raúl Monroy Towards a Masquerade Detection System Based on User's Tasks. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hamed Okhravi, James Riordan, Kevin M. Carter 0001 Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Weissbacher, Tobias Lauinger, William K. Robertson Why Is CSP Failing? Trends and Challenges in CSP Adoption. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo Measuring Drive-by Download Defense in Depth. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Johanna Amann, Seth Hall, Robin Sommer Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ali Abbasi 0002, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle On Emulation-Based Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth 0001, Berk Sunar Wait a Minute! A fast, Cross-VM Attack on AES. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hassan Khan, Aaron Atwater, Urs Hengartner A Comparative Evaluation of Implicit Authentication Schemes. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim 0001 Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Noomene Ben Henda, Karl Norrman Formal Analysis of Security Procedures in LTE - A Feasibility Study. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Johannes Hoffmann, Stephan Neumann, Thorsten Holz Mobile Malware Detection Based on Energy Fingerprints - A Dead End? Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Denis Bueno, Kevin J. Compton, Karem A. Sakallah, Michael D. Bailey Detecting Traditional Packers, Decisively. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nan Jiang 0017, Yu Jin 0001, Ann Skudlark, Zhi-Li Zhang Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu API Chaser: Anti-analysis Resistant Malware Analyzer. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee Connected Colors: Unveiling the Structure of Criminal Networks. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1M. Zubair Rafique, Juan Caballero FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Patrick Stewin A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Arun Viswanathan, Kymie Tan, Clifford Neuman Deconstructing the Assessment of Anomaly-based Intrusion Detectors. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jakob Fritz, Corrado Leita, Michalis Polychronakis Server-Side Code Injection Attacks: A Historical Perspective. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mariano Graziano, Andrea Lanzi, Davide Balzarotti Hypervisor Memory Forensics. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bin Zhao, Peng Liu 0005 Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christian Wressnegger, Frank Boldewin, Konrad Rieck Deobfuscating Embedded Malware Using Probable-Plaintext Attacks. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright (eds.) Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David F. Oswald, Bastian Richter 0001, Christof Paar Side-Channel Attacks on the Yubikey 2 One-Time Password Generator. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christoph Egger 0001, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna Practical Attacks against the I2P Network. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis CloudFence: Data Flow Tracking as a Cloud Service. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin Johns, Sebastian Lekies Tamper-Resistant LikeJacking Protection. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi Active Credential Leakage for Observing Web-Based Attack Cycle. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kapil Singh Practical Context-Aware Permission Control for Hybrid Mobile Applications. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xi Xiong, Peng Liu 0005 SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein Systematic Analysis of Defenses against Return-Oriented Programming. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro, Luis Javier García-Villalba Concurrency Optimization for NIDS (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mark Vella, Sotirios Terzis, Marc Roper Distress Detection (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jialong Zhang, Chao Yang 0022, Zhaoyan Xu, Guofei Gu PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1B. Amann 0001, Robin Sommer, Aashish Sharma, Seth Hall A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jennifer Mankin, David R. Kaeli Dione: A Flexible Disk Monitoring and Analysis Framework. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abhinav Srivastava, Himanshu Raj, Jonathon T. Giffin, Paul England Trusted VM Snapshots in Untrusted Cloud Infrastructures. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daisuke Mashima, Alvaro A. Cárdenas Evaluating Electricity Theft Detectors in Smart Grid Networks. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dongkyun Ahn, Gyungho Lee A Memory Access Validation Scheme against Payload Injection Attacks. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jie Chu, Zihui Ge, Richard Huber, Ping Ji 0002, Jennifer Yates, Yung-Chao Yu ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jinyu Wu, Lihua Yin, Binxing Fang Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ahmed F. Shosha, Joshua James, Chen-Ching Liu, Pavel Gladyshev Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Victor C. Valgenti, Jatin Chhugani, Yan Sun 0006, Nadathur Satish, Min Sik Kim, Changkyu Kim, Pradeep Dubey GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tobias Lauinger, Engin Kirda, Pietro Michiardi Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Luis Javier García-Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco, Javier Martínez Puentes Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dina Hadziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, Herbert Bos Memory Errors: The Past, the Present, and the Future. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan, Martin Lee Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns DEMACRO: Defense against Malicious Cross-Domain Requests. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shah Mahmood, Yvo Desmedt Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zhi Xu 0004, Hung-Yuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro, Luis Javier García-Villalba Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shengzhi Zhang, Peng Liu 0005 Assessing the Trustworthiness of Drivers. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shuyuan Jin, Zhi Yang, Xiang Cui Automatic Covert Channel Detection in Asbestos System (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Davide Balzarotti, Salvatore J. Stolfo, Marco Cova (eds.) Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna FlashDetect: ActionScript 3 Malware Detection. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dengke Qiao, Tingwen Liu, Yong Sun, Li Guo 0001 EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Samuel Marchal, Jérôme François, Radu State, Thomas Engel 0001 Proactive Discovery of Phishing Related Domain Names. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jenny Andrea Pinto Sánchez, Luis Javier García-Villalba Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Robin Sommer, Davide Balzarotti, Gregor Maier (eds.) Recent Advances in Intrusion Detection - 14th International Symposium, RAID 2011, Menlo Park, CA, USA, September 20-21, 2011. Proceedings Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ang Cui, Salvatore J. Stolfo Defending Embedded Systems with Software Symbiotes. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Felix Gröbert, Carsten Willems, Thorsten Holz Automated Identification of Cryptographic Primitives in Binary Programs. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stefano Ortolani, Cristiano Giuffrida, Bruno Crispo KLIMAX: Profiling Memory Write Patterns to Detect Keystroke-Harvesting Malware. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Syed Akbar Mehdi, Junaid Khalid, Syed Ali Khayam Revisiting Traffic Anomaly Detection Using Software Defined Networking. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Malek Ben Salem 0001, Salvatore J. Stolfo Modeling User Search Behavior for Masquerade Detection. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mario Heiderich, Tilman Frosch, Thorsten Holz IceShield: Detection and Mitigation of Malicious Websites with a Frozen DOM. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nathaniel Boggs, Sharath Hiremagalore, Angelos Stavrou, Salvatore J. Stolfo Cross-Domain Collaborative Anomaly Detection: So Far Yet So Close. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao Packed, Printable, and Polymorphic Return-Oriented Programming. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Armin Buescher, Felix Leder, Thomas Siebert Banksafe Information Stealer Detection Inside the Web Browser. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Loïc Duflot, Yves-Alexis Perez, Benjamin Morin What If You Can't Trust Your Network Card? Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Erik Bosman, Asia Slowinska, Herbert Bos Minemu: The World's Fastest Taint Tracker. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sheila Becker, Jeff Seibert, Cristina Nita-Rotaru, Radu State Securing Application-Level Topology Estimation Networks: Facing the Frog-Boiling Attack. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chao Yang 0022, Robert Chandler Harkreader, Guofei Gu Die Free or Live Hard? Empirical Evaluation and New Design for Fighting Evolving Twitter Spammers. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sambuddho Chakravarty, Georgios Portokalidis, Michalis Polychronakis, Angelos D. Keromytis Detecting Traffic Snooping in Tor Using Decoys. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Bob Gilbert, Richard A. Kemmerer, Christopher Kruegel, Giovanni Vigna Dymo: Tracking Dynamic Code Identity. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martina Lindorfer, Clemens Kolbitsch, Paolo Milani Comparetti Detecting Environment-Sensitive Malware. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna Shellzer: A Tool for the Dynamic Analysis of Malicious Shellcode. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Minh Tran, Mark Etheridge, Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh, Peng Ning On the Expressiveness of Return-into-libc Attacks. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jonghyuk Song, Sangho Lee 0001, Jong Kim 0001 Spam Filtering in Twitter Using Sender-Receiver Relationship. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Seungwon Shin, Raymond Lin, Guofei Gu Cross-Analysis of Botnet Victims: New Insights and Implications. Search on Bibsonomy RAID The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Liu Yang, Rezwana Karim, Vinod Ganapathy, Randy Smith Improving NFA-Based Signature Matching Using Ordered Binary Decision Diagrams. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Paul Giura, Nasir D. Memon NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Marco Balduzzi, Christian Platzer, Thorsten Holz, Engin Kirda, Davide Balzarotti, Christopher Kruegel Abusing Social Networks for Automated User Profiling. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jordi Cucurull, Mikael Asplund, Simin Nadjm-Tehrani Anomaly Detection and Mitigation for Disaster Area Networks. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Brian M. Bowen, Pratap V. Prabhu, Vasileios P. Kemerlis, Stelios Sidiroglou, Angelos D. Keromytis, Salvatore J. Stolfo BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ying Kong, Yuqing Zhang 0001, Qixu Liu Eliminating Human Specification in Static Analysis. Search on Bibsonomy RAID The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 609 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license