The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attack with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1979 (15) 1980-1984 (18) 1985 (16) 1986-1987 (20) 1988 (19) 1989 (17) 1990 (27) 1991 (28) 1992 (20) 1993 (28) 1994 (50) 1995 (27) 1996 (38) 1997 (59) 1998 (89) 1999 (106) 2000 (150) 2001 (198) 2002 (308) 2003 (427) 2004 (622) 2005 (935) 2006 (1052) 2007 (1092) 2008 (1214) 2009 (940) 2010 (445) 2011 (529) 2012 (502) 2013 (529) 2014 (687) 2015 (718) 2016 (756) 2017 (964) 2018 (1272) 2019 (1607) 2020 (1779) 2021 (2136) 2022 (2366) 2023 (2631) 2024 (644)
Publication types (Num. hits)
article(10248) book(12) data(26) incollection(215) inproceedings(14469) phdthesis(107) proceedings(3)
Venues (Conferences, Journals, ...)
CoRR(2518) IACR Cryptol. ePrint Arch.(797) IEEE Access(430) IEEE Trans. Inf. Forensics Sec...(193) FSE(178) Comput. Secur.(177) CRYPTO(176) EUROCRYPT(172) CCS(152) Sensors(140) ICC(138) Secur. Commun. Networks(133) ACISP(115) GLOBECOM(114) ARES(113) CHES(113) More (+10 of total 3434)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8634 occurrences of 2564 keywords

Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27Sondre Rønjom, Guang Gong, Tor Helleseth On Attacks on Filtering Generators Using Linear Subspace Structures. Search on Bibsonomy SSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream ciphers, m-sequences, filter generator
27Leo Dorrendorf, Zvi Gutterman, Benny Pinkas Cryptanalysis of the windows random number generator. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudo random number generator (prng), windows operating system, cryptanalysis
27Timothy G. Abbott, Katherine J. Lai, Michael R. Lieberman, Eric C. Price Browser-Based Attacks on Tor. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Katsuyuki Okeya, Tsuyoshi Takagi Security analysis of CRT-based cryptosystems. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side channel attacks, Factoring, Chinese remainder theorem
27Yigael Berger, Avishai Wool, Arie Yeredor Dictionary attacks using keyboard acoustic emanations. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF keyboard acoustics, password cracking, dictionary attacks
27Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang Vanguard: A New Detection Scheme for a Class of TCP-targeted Denial-of-Service Attacks. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Sherif M. Khattab, Rami G. Melhem, Daniel Mossé, Taieb Znati Honeypot back-propagation for mitigating spoofing distributed Denial-of-Service attacks. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Hideki Koike, Kazuhiro Ohno, Kanba Koizumi Visualizing Cyber Attacks using IP Matrix. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF virus visualization, worm visualization, Internet forecasting, information visualization, intrusion detection, information security, Internet worm, computer virus
27Hanping Hu, Wenxuan Guo, Baoliang Zhang, Xiang Chen A Method of Security Measurement of the Network Data Transmission. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Xiaoyun Wang 0001, Hongbo Yu How to Break MD5 and Other Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Ping Yi, Zhoulin Dai, YiPing Zhong, Shiyong Zhang Resisting Flooding Attacks in Ad Hoc Networks. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Katsuyuki Okeya, Tsuyoshi Takagi Security Analysis of CRT-Based Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Multi-Prime RSA, PKCS #1, RSA, Side Channel Attacks, Factoring, Chinese Remainder Theorem
27Nicolas T. Courtois, Willi Meier Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations
27Yih-Chun Hu, Adrian Perrig, David B. Johnson 0001 Rushing attacks and defense in wireless ad hoc network routing protocols. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ad hoc network routing, security, routing, rushing
27Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
27Robert K. Cunningham, Craig S. Stevenson Accurately Detecting Source Code of Attacks That Increase Privilege. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Machine Learning, Intrusion Detection, Malicious Code
27Glenn Durfee, Phong Q. Nguyen Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Zehui Qu, Pu Wang, Zhiguang Qin Enhancing the Scale-Free Network's Attack Tolerance. Search on Bibsonomy Complex (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intentional attack, network, robustness, Complex network, scale-free network
27Panayotis G. Michaelides, Kostas Theologou, Angelos T. Vouldis European Airlines' TFP and the 2001 Attack: Towards Safety in a Risk Society. Search on Bibsonomy Complex (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF European air transport, TFP, 2001 terrorist attack, safety state, production function
27Nan Wang, Xueqiang Gu, Jing Chen, Lincheng Shen, Min Ren A Hybrid Neural Network Method for UAV Attack Route Integrated Planning. Search on Bibsonomy ISNN (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF air-ground attack, multiple factors, alternative Hopfield NN, UAV, RBFNN, route planning
27Nadia El Mrabet What about Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based Protocol?. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Miller’s algorithm, Fault Attack, Identity Based Cryptography
27Honglong Chen, Wei Lou, Zhi Wang 0003 Conflicting-Set-Based Wormhole Attack Resistant Localization in Wireless Sensor Networks. Search on Bibsonomy UIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conflicting Set, Wireless Sensor Networks, Wormhole Attack, Secure Localization
27Thomas Gamer, Christoph P. Mayer Large-scale evaluation of distributed attack detection. Search on Bibsonomy SimuTools The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributed attack detection, large-scale evaluation, anomaly detection, simulation environment, OMNeT++
27Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic Distinguisher and Related-Key Attack on the Full AES-256. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF chosen key distinguisher, Davies-Meyer, ideal cipher, AES, related-key attack
27Thomas Finke, Max Gebhardt, Werner Schindler A New Side-Channel Attack on RSA Prime Generation. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RSA prime generation, Side-channel attack, key generation
27Jeff Yan, Ahmad Salah El Ahmad A low-cost attack on a Microsoft captcha. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF segmentation attack, usability, robustness, internet security, captcha
27Peter Leijdekkers, Valérie Gay A Self-Test to Detect a Heart Attack Using a Mobile Phone and Wearable Sensors. Search on Bibsonomy CBMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF heart attack selft-test, mobile health monitoring, mobile health application, wearable sensors
27Hüseyin Demirci, Ali Aydin Selçuk A Meet-in-the-Middle Attack on 8-Round AES. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF meet-in-the-middle cryptanalysis, square attack, AES, Rijndael
27Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF APOP, Challenge and Response, Password Recovery, Message Difference, Hash Function, Collision Attack, MD5
27Yi-Tung F. Chan, Charles A. Shoniregun, Galyna A. Akmayeva A novel approach in securing DDoS attack. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bypass guardian system (BGS), distributed denial of service (DDoS) attack, overload protection, congestion, router
27Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack
27Patrick P. C. Lee, Vishal Misra, Dan Rubenstein Distributed algorithms for secure multipath routing in attack-resistant networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack-resistant networks, preflow-push, security, optimization, resilience, multipath routing, maximum-flow problems
27Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Toward measuring network security using attack graphs. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion detection, security metrics, attack graphs, vulnerability analysis
27Hung-Min Sun, Mu-En Wu, Yao-Hsin Chen Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF the Wiener attack, most significant bit, RSA, exhaustive-searching, continued fraction
27Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury Strengthening NLS Against Crossword Puzzle Attack. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crossword Puzzle attack, Stream ciphers, eSTREAM, Linear Approximations, Modular Addition, NLS
27Gaoli Wang Related-Key Rectangle Attack on 43-Round SHACAL-2. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SHACAL-2, Differential characteristic, Block cipher, Related-Key Rectangle attack
27Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Der-Tsai Lee, Sy-Yen Kuo Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Attack probability, Security, Sensor network, Deployment, Key pre- distribution
27Tao Wu, Arun K. Somani Attack monitoring and localization in All-Optical Networks. Search on Bibsonomy Clust. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AON, Monitor, Attack, Crosstalk
27Bin Zhang 0003, Dengguo Feng Multi-pass Fast Correlation Attack on Stream Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher, Linear feedback shift register (LFSR), Fast correlation attack, Parity-check
27Robin D. Burke, Bamshad Mobasher, Chad Williams, Runa Bhaumik Classification features for attack detection in collaborative recommender systems. Search on Bibsonomy KDD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF recommender systems, robustness, collaborative filtering, attack detection
27Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Related-Key Rectangle Attack on 42-Round SHACAL-2. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SHACAL-2, Block cipher, Differential cryptanalysis, Related-key rectangle attack
27Joo Yeon Cho, Josef Pieprzyk Distinguishing Attack on SOBER-128 with Linear Masking. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Linear masking, SOBER-128, Stream ciphers, Distinguishing attack, Modular addition
27Ji-Hoon Yun, Il-Hwan Kim, Jae-Han Lim, Seung-Woo Seo WODEM: Wormhole Attack Defense Mechanism in Wireless Sensor Networks. Search on Bibsonomy ICUCT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, sensor network, wormhole attack
27Hong-Su Cho, Sangwoo Park, Soo Hak Sung, Aaram Yun Collision Search Attack for 53-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collision search attack, HAS-160, cryptanalysis, hash function
27Yun Chen, Reihaneh Safavi-Naini, Joonsang Baek, Xin Chen Server-Aided RSA Key Generation Against Collusion Attack. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA crypto-system, server-aided key generation, Information security, collusion attack, hand-held device
27Roberto Giacobazzi, Isabella Mastroeni Adjoining Declassification and Attack Models by Abstract Interpretation. Search on Bibsonomy ESOP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF abstract non-interference, Abstract interpretation, completeness, language-based security, declassification, adjunction, attack models
27Håvard Molland, Tor Helleseth An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Irregular clocked shift registers, Boolean functions, Stream cipher, Correlation attack
27Yasuyuki Sakai, Kouichi Sakurai A New Attack with Side Channel Leakage During Exponent Recoding Computations. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF exponent recoding, Side channel attack, elliptic curve cryptosystems, RSA cryptosystems
27Hyung-Woo Lee, Sung-Hyun Yun, Taekyoung Kwon 0002, Jae-Sung Kim, Hee-Un Park, Nam-Ho Oh Reflector Attack Traceback System with Pushback Based iTrace Mechanism. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Reflector Attack, iTrace, Authenticated Packet Marking
27Jovan Dj. Golic On the Success of the Embedding Attack on the Alternating Step Generator. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF embedding probability, sequences, edit distance, interleaving, Correlation attack, decimation
27Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji Optimized Chi2-Attack against RC6. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 2-attack, Cryptanalysis, Block Cipher, RC6
27Pierre-Alain Fouque, Frédéric Valette The Doubling Attack - Why Upwards Is Better than Downwards. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SPA-based analysis, DPA countermeasures, multiple exponent single data attack, scalar multiplication, modular exponentiation
27Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee 0002, Seok Won Jung Amplified Boomerang Attack against Reduced-Round SHACAL. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF SHACAL, Amplified boomerang attack, Boomerang-distinguisher
27Burton S. Kaliski Jr. An unknown key-share attack on the MQV key agreement protocol. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF MQV, unknown key-share attack, Key agreement, protocol design
27Werner Schindler A Timing Attack against RSA with the Chinese Remainder Theorem. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF RSA, Chinese Remainder Theorem, Montgomery multiplication, Timing attack
27Renato Menicocci, Jovan Dj. Golic Edit Probability Correlation Attack on the Bilateral Stop/Go Generator. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF mutual clock control, bilateral stop/go, edit probability, Stream ciphers, correlation attack
27Shouhuai Xu, Moti Yung Expecting the Unexpected: Towards Robust Credential Infrastructure. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Credential infrastructures, key compromise, hit-and-run attack, hit-and-stick attack, digital signatures, PKI, insider attack
27Yimin Cui, Tao Zou, Lufeng Zhang, Jinjing Zhao Network security simulation and evaluation. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack impacts, cyber attack modeling, cyber attack simulation, network security evaluation, network modeling
27Min-Hui Lin 0001, Chin-Chen Chang 0001 A secure one-time password authentication scheme with low-computation for mobile communications. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF off-line dictionary attack, server spoofing attack, authentication, smart card, replay attack, one-time password
27Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire Hop integrity in computer networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF SYN attack, message modification, message replay, smurf attack, security, internet, authentication, network protocol, router, denial-of-service attack
26Majid Khabbazian, Hugues Mercier, Vijay K. Bhargava Severity analysis and countermeasure for the wormhole attack in wireless ad hoc networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Andrej Dujella A variant of Wiener's attack on RSA. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) Primary: 94A60, Secondary: 11A55, 11J70
26Hamza Rahmani, Nabil Sahli, Farouk Kamoun Joint Entropy Analysis Model for DDoS Attack Detection. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Xiaogang Wang, Junzhou Luo, Ming Yang 0001, Zhen Ling A novel flow multiplication attack against Tor. Search on Bibsonomy CSCWD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Chia-Wei Chang, Seungjoon Lee, Bill Lin 0001, Jia Wang 0001 The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack. Search on Bibsonomy ICDCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Baudoin Collard, François-Xavier Standaert A Statistical Saturation Attack against the Block Cipher PRESENT. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Orr Dunkelman, Nathan Keller An Improved Impossible Differential Attack on MISTY1. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Xun Wang, Wei Yu 0002, Xinwen Fu, Dong Xuan, Wei Zhao 0001 iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller A Differential-Linear Attack on 12-Round Serpent. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Wei Jiang, Zhihong Tian, Hongli Zhang 0001, Xin-fang Song A Stochastic Game Theoretic Approach to Attack Prediction and Optimal Active Defense Strategy Decision. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Yutaka Oiwa, Kazukuni Kobara, Hajime Watanabe A New Variant for an Attack Against RSA Signature Verification Using Parameter Field. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF List of Keywords vulnerability, certificate verification, attacks
26Leevar Williams, Richard Lippmann, Kyle Ingols An Interactive Attack Graph Cascade and Reachability Display. Search on Bibsonomy VizSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li Assessing Attack Threat by the Probability of Following Attacks. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Yongdong Wu, Feng Bao 0001, Robert H. Deng Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Eli Biham, Orr Dunkelman, Nathan Keller A Simple Related-Key Attack on the Full SHACAL-1. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Nick Howgrave-Graham A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Yoshiyuki Higashi, Kazuo Tanaka, Takanori Emaru, Hua O. Wang Development of a Cyclogyro-based Flying Robot with Variable Attack Angle Mechanisms. Search on Bibsonomy IROS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Kuo Dong, Shoubao Yang, Shaolin Wang Analysis of low-rate TCP DoS attack against FAST TCP. Search on Bibsonomy ISDA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Denial of Service(DoS), RTO, TCP Reno, FAST TCP
26Wankyung Kim, Wooyoung Soh Development of an Attack Packet Generator Applying an NP to the Intelligent APS. Search on Bibsonomy KES (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Li Wang 0015, Zhitang Li, Qi-hong Wang A novel technique of recognizing multi-stage attack behaviour. Search on Bibsonomy IWNAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Yuen-Yan Chan Weakest Link Attack on Single Sign-On and Its Case in SAML V2.0 Web SSO. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Jae-Min Seol, Seong-Whan Kim Statistically Secure Anti-Collusion Code Design for Median Attack Robustness for Practical Fingerprinting. Search on Bibsonomy Information Hiding The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ACC, LCCA, angular decoding, fingerprinting, BIBD
26JeaHoon Park, Hoon-Jae Lee 0001, JaeCheol Ha, YongJe Choi, Howon Kim 0001, Sang-Jae Moon A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Usman Tariq, Manpyo Hong, Kyung-suk Lhee A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. Search on Bibsonomy ADMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Choong Seon Hong, Yoshiaki Kasahara, Dea Hwan Lee DDoS Attack Defense Architecture Using Active Network Technology. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Emilie Lundin Barse, Erland Jonsson Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Xinzhou Qin, Wenke Lee Attack Plan Recognition and Prediction Using Causal Networks. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Roman Novak Side-Channel Attack on Substitution Blocks. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Oleg Sheyner, Jeannette M. Wing Tools for Generating and Analyzing Attack Graphs. Search on Bibsonomy FMCO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Jian Li, Guoyin Zhang, Guo-Chang Gu A Multi-agent Based Architecture for Network Attack Resistant System. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Atsuko Miyaji, Masao Nonaka, Yoshinori Takii Known Plaintext Correlation Attack against RC5. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Bert den Boer, Kerstin Lemke, Guntram Wicke A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction
26Wai W. Fung, Mordecai J. Golin, James W. Gray III Protection of Keys against Modification Attack. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Alfonso Valdes, Keith Skinner Adaptive, Model-Based Monitoring for Cyber Attack Detection. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Innovative approaches, IDS cooperation, Bayes nets, Intrusion detection
26Kazuo Ohta, Mitsuru Matsui Differential Attack on Message Authentication Codes. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
25Youngsook Lee, Dongho Won Enhancing of a Password-Based Authentication Scheme Using Smart Cards. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF two-factor security, smart card, dictionary attack, impersonation attack, Authentication scheme
25Bing Sun 0001, Longjiang Qu, Chao Li 0002 New Cryptanalysis of Block Ciphers with Low Algebraic Degree. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interpolation attack, integral attack, block cipher, Feistel cipher
25Youngsook Lee, Dongho Won Security Vulnerabilities of a Remote User Authentication Scheme Using Smart Cards Suited for a Multi-server Environment. Search on Bibsonomy ICCSA (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-server environments, remote user authentication scheme, smart card, impersonation attack, password security, password guessing attack
25Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields Passive-Logging Attacks Against Anonymous Communications Systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intersection attack, predecessor attack, privacy, anonymity, anonymous communication
25Mahboobeh Soleimani, Ali A. Ghorbani 0001 Critical Episode Mining in Intrusion Detection Alerts. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Episode mining, Critical episode, Alert mining, Multistage attack, Attack scenario
Displaying result #301 - #400 of 25080 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license