|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11110 occurrences of 2965 keywords
|
|
|
Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, James W. Hong |
A flow-based method for abnormal network traffic detection. |
NOMS (1) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | David A. Wagner 0001 |
Towards a Unifying View of Block Cipher Cryptanalysis. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Jeongseok Seo, Han-Sung Kim, Sanghyun Cho, Sung Deok Cha |
Web Server Attack Categorization based on Root Causes and Their Locations. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Alex Biryukov, Adi Shamir, David A. Wagner 0001 |
Real Time Cryptanalysis of A5/1 on a PC. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Donald G. Marks, Amihai Motro, Sushil Jajodia |
Enhancing the Controlled Disclosure of Sensitive Information. |
ESORICS |
1996 |
DBLP DOI BibTeX RDF |
|
23 | Matthias Krause 0001, Dirk Stegemann |
More on the Security of Linear RFID Authentication Protocols. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
RFID Authentication, HB ?+?, CKK, CKK 2, Algebraic Attacks, Lightweight Cryptography |
23 | Tzu-Rung Lee, Kwo-Cheng Chiu, Da-Wei Chang |
A Lightweight Buffer Overflow Protection Mechanism with Failure-Oblivious Capability. |
ICA3PP |
2009 |
DBLP DOI BibTeX RDF |
Failure-Oblivious Computing, Guard Pages, Network Security, Self Reconfiguration, Buffer Overflow Attacks |
23 | Artemios G. Voyiatzis, Dimitrios N. Serpanos |
The security of the Fiat-Shamir scheme in the presence of transient hardware faults. |
ACM Trans. Embed. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack |
23 | Emmanuel Bresson, Mark Manulis |
Securing group key exchange against strong corruptions. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
authenticated group key exchange, strong corruptions, mutual authentication, contributiveness, insider attacks |
23 | Prateek Mittal, Nikita Borisov |
Information leaks in structured peer-to-peer anonymous communication systems. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
information leaks, peer-to-peer, anonymity, attacks |
23 | Konstantinos Kemalis, Theodoros Tzouramanis |
SQL-IDS: a specification-based approach for SQL-injection detection. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
specification-based runtime validation, world-wide web, database security, web application security, SQL injection attacks |
23 | Silvana Medos, Serdar Boztas |
Montgomery Residue Representation Fault-Tolerant Computation in GF(2k). |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
fault tolerant computation, finite field, fault attacks |
23 | Chu-Hsing Lin, Jung-Chun Liu, Chih-Hsiong Shih, Yan-Wei Lee |
A Robust Watermark Scheme for Copyright Protection. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
distributed discrete wavelet transformation, image attacks, watermark, singular value decomposition, copyright protection |
23 | Praveen Gauravaram, Katsuyuki Okeya |
Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
hash functions, side channel attacks, HMAC, Applied cryptography |
23 | Yossef Oren, Adi Shamir |
Remote Password Extraction from RFID Tags. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
sidechannel attacks, RFID, cryptanalysis, power analysis |
23 | Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Giovanni Vigna |
Multi-module vulnerability analysis of web-based applications. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
multi-step attacks, static analysis, web applications, dynamic analysis, vulnerability analysis |
23 | Tran Hoang Hai, Faraz Idris Khan, Eui-nam Huh |
Hybrid Intrusion Detection System for Wireless Sensor Networks. |
ICCSA (2) |
2007 |
DBLP DOI BibTeX RDF |
routing attacks, security, wireless sensor networks, Intrusion detection |
23 | Shay Gueron |
Data and Computational Fault Detection Mechanism for Devices That Perform Modular Exponentiation. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
safe errors, RSA, smartcards, Fault attacks, countermeasures, embedded devices |
23 | Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui 0001, Kanta Matsuura |
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
LPN problem, HB protocols, RFID authentication, cryptanalysis, fast correlation attacks |
23 | Gregory J. Conti, Mustaque Ahamad, John T. Stasko |
Attacking information visualization system usability overloading and deceiving the human. |
SOUPS |
2005 |
DBLP DOI BibTeX RDF |
denial of information, malicious visualizations, usability attacks, information visualization, secure visualization |
23 | Raphael Chung-Wei Phan, Bok-Min Goi |
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. |
ICCSA (4) |
2005 |
DBLP DOI BibTeX RDF |
cardholder authentication, biometrics, attacks, Smartcards |
23 | Raphael Chung-Wei Phan, Bok-Min Goi |
On the Rila-Mitchell Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
cardholder authentication, biometrics, attacks, Smartcards |
23 | Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly |
Denial of service resilience in ad hoc networks. |
MobiCom |
2004 |
DBLP DOI BibTeX RDF |
ad hoc networks, TCP, UDP, DoS attacks |
23 | Katsuyuki Okeya, Dong-Guk Han |
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
23 | Michael Ettredge, Vernon J. Richardson |
Assessing the Risk in E-commerce. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
Electronic Commerce Risk, Hacker Attacks, Stock Market Reaction |
23 | Adi Shamir, Nicko van Someren |
Playing "Hide and Seek" with Stored Keys. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
lunchtime attacks, authenticode, key hiding, Cryptanalysis, RSA |
23 | Taekyoung Kwon 0002, JooSeok Song |
Security and efficiency in authentication protocols resistant to password guessing attack. |
LCN |
1997 |
DBLP DOI BibTeX RDF |
password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks |
23 | Adam L. Young, Moti Yung |
The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone? |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalytic attacks, Private key, applied systems, design and manufacturing of cryptographic devices and software, auto-escrowing keys, software, RSA, randomness, hardware, Public Key, pseudorandomness, Kerberos, key escrow, DSA, ElGamal, subliminal channels, Capstone |
23 | Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres |
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks |
23 | Marc Joye |
Highly Regular m-Ary Powering Ladders. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Montgomery ladder, SPA-type attacks, safe-error attacks, Exponentiation algorithms |
23 | Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel |
A Practical Attack on KeeLoq. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
KeeLoq, cryptanalysis, block ciphers, slide attacks, meet-in-the-middle attacks |
22 | Manuel Flury, Marcin Poturalski, Panos Papadimitratos, Jean-Pierre Hubaux, Jean-Yves Le Boudec |
Effectiveness of distance-decreasing attacks against impulse radio ranging. |
WISEC |
2010 |
DBLP DOI BibTeX RDF |
ieee 802.15.4a, physical layer attack, secure ranging, ultra wideband, ranging, relay attack, distance bounding, impulse radio |
22 | Yi Xie 0002, Shun-Zheng Yu |
Monitoring the application-layer DDoS attacks for popular websites. |
IEEE/ACM Trans. Netw. |
2009 |
DBLP DOI BibTeX RDF |
popular Website, distributed denial of service (DDoS), application-layer |
22 | Yao Liu 0007, Michael K. Reiter, Peng Ning |
False data injection attacks against state estimation in electric power grids. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
attack, power grids, state estimation |
22 | Yu Zhang 0034, Xingshe Zhou 0001, Yee Wei Law, Marimuthu Palaniswami |
Insider DoS Attacks on Epidemic Propagation Strategies of Network Reprogramming in Wireless Sensor Networks. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Anna T. Lawniczak, Hao Wu 0002, Bruno N. Di Stefano |
Entropy Based Detection of DDoS Attacks in Packet Switching Network Models. |
Complex (2) |
2009 |
DBLP DOI BibTeX RDF |
entropy, packet switching network, distributed denial of service attack |
22 | Thomas Plantard, Willy Susilo |
Broadcast Attacks against Lattice-Based Cryptosystems. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
Broadcast attack, lattice-based cryptosystem, knapsack cryptosystem, intersecting lattice |
22 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Leonardo Lemes Fagundes, Luciano Paschoal Gaspary |
Breaking the barriers between security mechanisms through the composition of Web Services: Towards a solution for the detection of multistage distributed attacks. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
22 | Kazumaro Aoki, Yu Sasaki |
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
SHA-1, preimage, one-way, meet-in-the-middle, SHA-0 |
22 | Mathieu Renauld, François-Xavier Standaert, Nicolas Veyrat-Charvillon |
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Mehdi Kiani, Andrew J. Clark, George M. Mohay |
Evaluation of Anomaly Based Character Distribution Models in the Detection of SQL Injection Attacks. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Anomaly Based Intrusion Detection System, SQL injection |
22 | Wen-Chih Wu, Oscal T.-C. Chen |
Robust echo hiding scheme against pitch-scaling attacks. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Atsushi Miyamoto, Naofumi Homma, Takafumi Aoki, Akashi Satoh |
Chosen-message SPA attacks against FPGA-based RSA hardware implementations. |
FPL |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Suman Deb Roy, Sneha Aman Singh, Subhrabrata Choudhury, Narayan C. Debnath |
Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Yuichi Sei, Shinichi Honiden |
Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. |
WICON |
2008 |
DBLP DOI BibTeX RDF |
node compromising attack, node replication attack, security, wireless sensor networks, algorithm |
22 | Wei Chen, Yingzhou Zhang, Yuanchun Wei |
The Feasibility of Launching Reduction of Quality (RoQ) Attacks in 802.11 Wireless Networks. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
22 | François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede |
Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim |
New Impossible Differential Attacks on AES. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
AES, Impossible differential cryptanalysis |
22 | Kenneth G. Paterson, Gaven J. Watson |
Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang |
Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack |
22 | Helena Handschuh, Bart Preneel |
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot |
On Purely Automated Attacks and Click-Based Graphical Passwords. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jing Dong 0006, Kurt Erik Ackermann, Brett Bavar, Cristina Nita-Rotaru |
Mitigating attacks against virtual coordinate based routing in wireless sensor networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
beacon vector routing, secure beacon vector routing, sensor network routing, virtual coordinate system, security, routing |
22 | Wei Yu 0003, K. J. Ray Liu |
Defense Against Injecting Traffic Attacks in Wireless Mobile Ad-Hoc Networks. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Jinpeng Wei, Calton Pu |
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
Probabilistic Modeling, Race Condition |
22 | Collin Jackson, Adam Barth, Andrew Bortz, Weidong Shao, Dan Boneh |
Protecting browsers from dns rebinding attacks. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
spam, firewall, dns, same-origin policy, click fraud |
22 | Anjali Sardana, Krishan Kumar 0001, Ramesh Chandra Joshi |
Detection and Honeypot Based Redirection to Counter DDoS Attacks in ISP Domain. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Nicolas Gama, Phong Q. Nguyen |
New Chosen-Ciphertext Attacks on NTRU. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Wei Li 0013, Dawu Gu |
An Approach for Symmetric Encryption Against Side Channel Attacks in Provable Security. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Aleksandar Kuzmanovic, Edward W. Knightly |
Low-rate TCP-targeted denial of service attacks and counter strategies. |
IEEE/ACM Trans. Netw. |
2006 |
DBLP DOI BibTeX RDF |
TCP, TCP/IP, denial of service, retransmission timeout |
22 | Bing Chen, Joohan Lee, Annie S. Wu |
Active Event Correlation in Bro IDS to Detect Multi-stage Attacks. |
IWIA |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Michael Neve, Jean-Pierre Seifert |
Advances on Access-Driven Cache Attacks on AES. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Dong Seong Kim 0001, Sang Min Lee 0018, Jong Sou Park |
Toward Lightweight Detection and Visualization for Denial of Service Attacks. |
MICAI |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Stefanos Koutsoutos, Ioannis T. Christou, Sofoklis Efremidis |
An Intrusion Detection System for Network-Initiated Attacks Using a Hybrid Neural Network. |
AIAI |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Christoph Herbst, Elisabeth Oswald, Stefan Mangard |
An AES Smart Card Implementation Resistant to Power Analysis Attacks. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
DPA resistance, smart card, AES |
22 | Hemant Sengar, Haining Wang, Duminda Wijesekera, Sushil Jajodia |
Fast Detection of Denial-of-Service Attacks on IP Telephony. |
IWQoS |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Wei Chen, Dit-Yan Yeung |
Defending Against TCP SYN Flooding Attacks Under Different Types of IP Spoofing. |
ICN/ICONS/MCL |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Palash Sarkar 0001 |
Generic Attacks on Symmetric Ciphers. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Aaron Walters, David John Zage, Cristina Nita-Rotaru |
Mitigating Attacks Against Measurement-Based Adaptation Mechanisms in Unstructured Multicast Overlay Networks. |
ICNP |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Ting Xue, Natalija Vlajic |
Analytical and Simulation Based Evaluation of Wireless-to-Wireline TCP-SYN Attacks. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich |
Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jian Kang 0001, Yuan Zhang, Jiu-bin Ju |
A Formalized Taxonomy of DDoS Attacks Based on Similarity. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Naoum Naoumov, Keith W. Ross |
Exploiting P2P systems for DDoS attacks. |
Infoscale |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Joseph Bonneau, Ilya Mironov |
Cache-Collision Timing Attacks Against AES. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
cache, cryptanalysis, AES, side-channel attack, timing attack |
22 | Cédric Archambeau, Eric Peeters, François-Xavier Standaert, Jean-Jacques Quisquater |
Template Attacks in Principal Subspaces. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jung-Taek Seo, Cheolho Lee, Jungtae Kim, Taeshik Shon, Jongsub Moon |
Probabilistic Packet Filtering Model to Protect Web Server from DDoS Attacks. |
NPC |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Ning Song, Lijun Qian, Xiangfang Li |
Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach. |
IPDPS |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Xun Wang, Wenjun Gu, Kurt Schosek, Sriram Chellappan, Dong Xuan |
Sensor Network Configuration Under Physical Attacks. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell |
Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
padding oracle, CBC-mode, side channel, ISO standards |
22 | Xinwen Fu, Ye Zhu 0001, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 |
On Flow Marking Attacks in Wireless Anonymous Communication Networks. |
ICDCS |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Wei Shi, Yang Xiang 0001, Wanlei Zhou 0001 |
Distributed Defense Against Distributed Denial-of-Service Attacks. |
ICA3PP |
2005 |
DBLP DOI BibTeX RDF |
|
22 | William G. J. Halfond, Alessandro Orso |
AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. |
ASE |
2005 |
DBLP DOI BibTeX RDF |
static analysis, runtime monitoring, SQL injection |
22 | Yu Chen 0002, Kai Hwang 0001, Yu-Kwong Kwok |
Filtering of Shrew DDoS Attacks in Frequency Domain. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
reduction of quality (RoQ), Internet traffic analysis, Network security, digital signal processing (DSP), distributed denial of service (DDoS) |
22 | XiaoFeng Wang 0001, Michael K. Reiter |
Mitigating bandwidth-exhaustion attacks using congestion puzzles. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
denial of service, client puzzle |
22 | Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao |
Proactively Detecting Distributed Denial of Service Attacks Using Source IP Address Monitoring. |
NETWORKING |
2004 |
DBLP DOI BibTeX RDF |
|
22 | V. Anil Kumar, Dorgham Sisalem |
TCP Based Denial-of-Service Attacks to Edge Network: Analysis and Detection. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Willi Meier, Enes Pasalic, Claude Carlet |
Algebraic Attacks and Decomposition of Boolean Functions. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Jean-Loup Guillaume, Matthieu Latapy, Clémence Magnien |
Comparison of Failures and Attacks on Random and Scale-Free Networks. |
OPODIS |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Il-Ahn Cheong, Yongmin Kim 0005, Minsoo Kim 0002, BongNam Noh |
The Causality Analysis of Protocol Measures for Detection of Attacks Based on Network. |
ICOIN |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Jung-Taek Seo, Cheolho Lee, Jongsub Moon |
Defending DDoS Attacks Using Network Traffic Analysis and Probabilistic Packet Drop. |
GCC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Zili Shao, Chun Xue, Qingfeng Zhuge, Edwin Hsing-Mean Sha, Bin Xiao 0001 |
Security Protection and Checking in Embedded System Integration Against Buffer Overflow Attacks. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Bettati, Wei Zhao 0001 |
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures. |
Information Hiding |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Hervé Ledig, Frédéric Muller, Frédéric Valette |
Enhancing Collision Attacks. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Clayton Bolz, Gordon W. Romney, Brandon L. Rogers |
Safely train security engineers regarding the dangers presented by denial of service attacks. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
DoS lab, isolated lab, network security, information technology, DDoS |
22 | Jun (Jim) Xu, Wooyong Lee |
Sustaining Availability of Web Services under Distributed Denial of Service Attacks. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
World-Wide Web, game theory, Availability, survivability, Distributed Denial of Service (DDoS) |
22 | Aleksandar Kuzmanovic, Edward W. Knightly |
Low-rate TCP-targeted denial of service attacks: the shrew vs. the mice and elephants. |
SIGCOMM |
2003 |
DBLP DOI BibTeX RDF |
TCP, denial of service, retransmission timeout |
22 | Ulrich Kühn 0001 |
Side-Channel Attacks on Textbook RSA and ElGamal Encryption. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
RSA encryption, Side-channel attack, ElGamal encryption |
22 | Kihun Chong, Ha Yoon Song, Sam H. Noh |
Traffic Characterization of the Web Server Attacks of Worm Viruses. |
International Conference on Computational Science |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 35802 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|