|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 254 occurrences of 176 keywords
|
|
|
Results
Found 388 publication records. Showing 388 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
12 | Tiantian Qin, Judee K. Burgoon |
An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Hongbin Lu, Kai Zheng 0003, Bin Liu 0001, Changhua Sun |
A Robust Approach for Matching Mixed Casesensitive and Case-insensitive Patterns. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
|
12 | Gregory P. Schaffer |
Worms and viruses and botnets, oh my! Rational responses to emerging Internet threats. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Bradley S. Rubin, Donald Cheung |
Computer Security Education and Research: Handle with Care. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
12 | William Suchan, Edward Sobiesk |
Strengthening the Weakest Link in Digital Protection. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Tom Cross |
Academic freedom and the hacker ethic. |
Commun. ACM |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Prahlad Fogla, Wenke Lee |
Evading network anomaly detection systems: formal reasoning and practical techniques. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
polymorphic blending attack, anomaly detection, mimicry attack |
12 | Yacine Bouzida, Frédéric Cuppens |
Detecting Known and Novel Network Intrusions. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
12 | A. Murali M. Rao |
Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Stefan A. Robila, James W. Ragucci |
Don't be a phish: steps in user education. |
ITiCSE |
2006 |
DBLP DOI BibTeX RDF |
education, information security, phishing, computer education |
12 | Fran Berman |
One hundred years of data. |
DG.O |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Soo-Jin Park, Young-Shin Park, Yong-Rak Choi, Sukhoon Kang |
SPAD: A Session Pattern Anomaly Detector for Pre-alerting Intrusions in Home Network. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Sanjeev Kumar, Montasir Azad, Orifiel Gomez, R. Valdez |
Can Microsoft's Service Pack2 (SP2) Security Software Prevent SMURF Attacks? |
AICT/ICIW |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Tzer-Shyong Chen, Fuh-Gwo Jeng, Yu-Chia Liu |
Hacking Tricks Toward Security on Network Environments. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
Hacking tricks, Trojan programs, Intrusion detection system, Firewall, Phishing |
12 | Peter Phuong Vo, Chau Maggie Vo |
FMS and FMSE encryption/decryption algorithms using flipping, mapping, and shifting operations. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
encryption/decryption using flipping, shifting operations, mapping |
12 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
12 | Martin Mink, Felix C. Freiling |
Is attack better than defense?: teaching information security the right way. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
offensive techniques, security lab, summerschool, computer forensics, security education, empirical measurement |
12 | Kevin Curran, Colman Morrissey, Colm Fagan, Colm Murphy, Brian O'Donnell, Gerry Fitzpatrick, Stephen Condit |
Monitoring hacker activity with a Honeynet. |
Int. J. Netw. Manag. |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Linda Dailey Paulson |
News Briefs. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
Encryption systems, Local SSL, Programmable mobile chips, Mobile processors, Mobile chips, Security, Internet, Wireless communications, Wireless communications |
12 | Kjell Jørgen Hole, Erlend Dyrnes, Per Thorsheim |
Securing Wi-Fi Networks. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
wireless hacking, wireless security, virtual private networks, Wi-Fi networks |
12 | Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari, Nasir D. Memon |
SAFE-OPS: An approach to embedded software security. |
ACM Trans. Embed. Comput. Syst. |
2005 |
DBLP DOI BibTeX RDF |
Software protection, HW/SW codesign |
12 | James A. McHugh, Fadi P. Deek |
An incentive system for reducing malware attacks. |
Commun. ACM |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Kumar Chellapilla, Kevin Larson, Patrice Y. Simard, Mary Czerwinski |
Designing human friendly human interaction proofs (HIPs). |
CHI |
2005 |
DBLP DOI BibTeX RDF |
completely automated public turing tests to tell computers and humans apart (CAPTCHAs), visual letter recognition, evaluation, computer vision, human perception, human interaction proofs (HIPs) |
12 | Carole Bassil, Ahmed Serhrouchni, Nicolas Rouhana |
Critical Analysis and New Perspective for Securing Voice Networks. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
VoIP, GSM, Security mechanisms, SRTP |
12 | João Durães, Henrique Madeira |
A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Software Without Source-Code. |
LADC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Ram Dantu, Prakash Kolan |
Risk Management Using Behavior Based Bayesian Networks. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Nikolai Joukov, Erez Zadok |
Adding Secure Deletion to Your Favorite File System. |
IEEE Security in Storage Workshop |
2005 |
DBLP DOI BibTeX RDF |
Unintended data recovery, Security |
12 | Nicolas Loriant, Marc Ségura-Devillechaise, Jean-Marc Menaud |
Server Protection through Dynamic Patching. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Bruce Hartpence |
Teaching wireless security for results. |
SIGITE Conference |
2005 |
DBLP DOI BibTeX RDF |
attack/defend, teaching, wireless security |
12 | Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu, Erez Zadok |
An electric fence for kernel buffers. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
security, file systems, buffer overflow |
12 | M. H. Kuo |
An Intelligent Agent-Based Framework for Collaborative Information Security. |
Australian Conference on Artificial Intelligence |
2005 |
DBLP DOI BibTeX RDF |
|
12 | Charles U. Martel, Glen Nuckolls, Premkumar T. Devanbu, Michael Gertz 0001, April Kwong, Stuart G. Stubblebine |
A General Model for Authenticated Data Structures. |
Algorithmica |
2004 |
DBLP DOI BibTeX RDF |
Authentic publication, Security, Data structures, Database integrity |
12 | Kevin Borders, Atul Prakash 0001 |
Web tap: detecting covert web traffic. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
spyware detection, intrusion detection, anomaly detection, HTTP, covert channels, tunnels |
12 | Joseph Zambreno, Alok N. Choudhary, Rahul Simha, Bhagirath Narahari |
Flexible Software Protection Using Hardware/Software Codesign Techniques. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Magnus Almgren, Erland Jonsson |
Using Active Learning in Intrusion Detection. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
intrusion detection, active learning |
12 | Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Alec Yasinsac |
Accountable Privacy. |
Security Protocols Workshop |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Jae-Woo Lee |
Security Agent Model Using Interactive Authentication Database. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Jae-Woo Lee |
Client Authentication Model Using Duplicated Authentication Server Systems. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Steven K. Brawn, R. Mark Koan, Kelly Caye |
Staying secure in an insecure world: 802.1x secure wireless computer connectivity for students, faculty, and staff to the campus network. |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
PEAP, dynamic WEP, wireless network, authentication, VPN, 802.1x |
12 | Ueli M. Maurer |
The Role of Cryptography in Database Security. |
SIGMOD Conference |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Zouheir Trabelsi, Hamza Rahmani, Kamel Kaouech, Mounir Frikha |
Malicious Sniffing Systems Detection Platform. |
SAINT |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ikuo Takahashi |
Legal System and Computer Forensics Business. |
SAINT Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Yi-Yuan Huang, Kwok-Yan Lam, Siu Leung Chung, Chi-Hung Chi, Jia-Guang Sun 0001 |
Application of Content Computing in Honeyfarm. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
honeyfarm, distributed computing, Network security, content delivery network |
12 | Mihai Christodorescu, Somesh Jha |
Testing malware detectors. |
ISSTA |
2004 |
DBLP DOI BibTeX RDF |
malware, obfuscation, adaptive testing, anti-virus |
12 | Yannick Monnet, Marc Renaudin, Régis Leveugle |
Asynchronous Circuits Sensitivity to Fault Injection. |
IOLTS |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Karthik N. Kannan, Rahul Telang, Hao Xu |
Economic Analysis of the Market for Software Vulnerability Disclosure. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Ming-Ni Wu, Min-Hui Lin 0001, Chin-Chen Chang 0001 |
A LSB Substitution Oriented Image Hiding Strategy Using Genetic Algorithms. |
AWCC |
2004 |
DBLP DOI BibTeX RDF |
LSB substitution, genetic algorithm, image hiding |
12 | Ram Dantu, Kall Loper, Prakash Kolan |
Risk Management using Behavior based Attack Graphs. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Erik Jan Marinissen |
Security vs. Test Quality: Can We Really Only Have One at a Time? |
ITC |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Jeremiah K. Jones, Gordon W. Romney |
Honeynets: an educational resource for IT security. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
IT educational resource, information technology, honeypot, information assurance, curricula, honeynet, security education |
12 | Gregory L. Orgill, Gordon W. Romney, Michael G. Bailey, Paul M. Orgill |
The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
user education, access control, social engineering, physical security |
12 | Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala |
Static Analyzer of Vicious Executables (SAVE). |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
12 | Steven J. Vaughan-Nichols |
How Trustworthy Is Trusted Computing? |
Computer |
2003 |
DBLP DOI BibTeX RDF |
|
12 | David J. Scott, Richard Sharp |
Specifying and Enforcing Application-Level Web Security Policies. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
Application-level Web security, security policy description languages, component-based design |
12 | Sung Kim, Farokh B. Bastani, I-Ling Yen, Ing-Ray Chen |
High-Assurance Synthesis of Security Services from Basic Microservices. |
ISSRE |
2003 |
DBLP DOI BibTeX RDF |
Microservices, Software architecture, Software composition, Security service |
12 | Hongxia Jin, Jeffery Lotspiech |
Proactive Software Tampering Detection. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Mario Di Raimondo, Rosario Gennaro |
Provably Secure Threshold Password-Authenticated Key Exchange. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Ja-Min Koo, Sung-Bae Cho |
Viterbi Algorithm for Intrusion Type Identification in Anomaly Detection System. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Gabriele Spenger |
Authentication, Identification Techniques, and Secure Containers - Baseline Technologies. |
Digital Rights Management |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Yang-Seo Choi, Dong-il Seo, Sung Won Sohn, Sang-Ho Lee |
Network-Based Real-Time Connection Traceback System (NRCTS) with Packet Marking Technology. |
ICCSA (2) |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Michael Neve, Eric Peeters, David Samyde, Jean-Jacques Quisquater |
Memories: A Survey of Their Secure Uses in Smart Cards. |
IEEE Security in Storage Workshop |
2003 |
DBLP DOI BibTeX RDF |
Secure memories, Smart cards, Tamper resistance, Side channels, Secure hardware |
12 | Celia Pearce, Robert Nideffer, Eddo Stern, Anne-Marie Schleiner, Brody Condon |
Game art. |
SI3D |
2003 |
DBLP DOI BibTeX RDF |
|
12 | Giovanni Vigna, William K. Robertson, Vishal Kher, Richard A. Kemmerer |
A Stateful Intrusion Detection System for World-Wide Web Servers. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
Security, World-Wide Web, Intrusion Detection |
12 | Sri Kumar, Vladimir Marbukh |
A Game Theoretic Approach to Analysis and Design of Survivable and Secure Systems and Protocols. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
12 | George E. Kalb, Gerald M. Masson |
Continuous Process Improvement and the Risk to Information Assurance. |
IEEE Softw. |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Greg Hoglund, Gary McGraw |
Point/Counterpoint: Security Band-Aids: More Cost-Effective than "Secure" Coding / Building Secure Software: Better than Protecting Bad Software. |
IEEE Softw. |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough |
On-the-fly web content integrity check boosts users's confidence. |
Commun. ACM |
2002 |
DBLP DOI BibTeX RDF |
|
12 | David J. Scott, Richard Sharp |
Abstracting application-level web security. |
WWW |
2002 |
DBLP DOI BibTeX RDF |
application-Level web security, security policy description language, component-based design |
12 | Radu Grosu, Erez Zadok, Scott A. Smolka, Rance Cleaveland, Yanhong A. Liu |
High-confidence operating systems. |
ACM SIGOPS European Workshop |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Kwong H. Yung |
Detecting Long Connection Chains of Interactive Terminal Sessions. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
connection chain, terminal session, delayed acknowledgment, reply echo, echo delay, intrusion detection, network security, computer security, network protocol, Stepping stone |
12 | Randy C. Marchany, Joseph G. Tront |
E-commerce Security Issues. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
e-commerce, Network Security, e-business, internet security, computer virus |
12 | Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong |
Learning Fingerprints for a Database Intrusion Detection System. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Donghua Xu, Chenghuai Lu, André L. M. dos Santos |
Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
12 | Sandra Kay Miller |
Facing the Challenge of Wireless Security. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Yang-Seo Choi, Dong-il Seo, Sung Won Sohn |
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
12 | William E. Johnston, Sumit Talwar, Keith R. Jackson |
Overview of Security Considerations for Computational and Data Grids. |
HPDC |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Julien Boeuf, Julien P. Stern |
An Analysis of One of the SDMI Candidates. |
Information Hiding |
2001 |
DBLP DOI BibTeX RDF |
|
12 | Thomas A. Longstaff, Clyde Chittister, Rich Pethia, Yacov Y. Haimes |
Are We Forgetting the Risks of Information Technology? |
Computer |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Richard J. Hughes, Colin P. Williams |
Quantum Computing: The Final Frontier? |
IEEE Intell. Syst. |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Alex Biryukov, Adi Shamir, David A. Wagner 0001 |
Real Time Cryptanalysis of A5/1 on a PC. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Alok R. Chaturvedi, Mukul Gupta, Shailendra Raj Mehta, Wei T. Yue |
Agent-based Simulation Approach to Information Warfare in the SEAS Environment. |
HICSS |
2000 |
DBLP DOI BibTeX RDF |
|
12 | Robert N. Smith, Sourav Bhattacharya |
Operating firewalls outside the LAN perimeter. |
IPCCC |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Robert N. Smith, Sourav Bhattacharya |
A Protocol and Simulation for Distributed Communicating Firewalls. |
COMPSAC |
1999 |
DBLP DOI BibTeX RDF |
Firewall Cascade, Firewall Leak, Simulation, Java, Fault-Tolerance, Network Security, Emulation, Firewall, Security Management |
12 | Eduardo B. Fernández |
Coordination of Security Levels for Internet Architectures. |
DEXA Workshops |
1999 |
DBLP DOI BibTeX RDF |
|
12 | Pietro Iglio |
TrustedBox: A Kernel-Level Integrity Checker. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
integrity checker |
12 | Michael Condict, Dejan S. Milojicic, Franklin Reynolds, Don Bolinger |
Towards a world-wide civilization of objects. |
ACM SIGOPS European Workshop |
1996 |
DBLP DOI BibTeX RDF |
|
12 | T. F. Higginbotham |
Prospectives on computer science: twenty-five years of observations. |
ACM Conference on Computer Science |
1988 |
DBLP DOI BibTeX RDF |
|
12 | John A. N. Lee, Gerald Segal, Rosalie Steier |
Positive Alternatives: A Report on an ACM Panel on Hacking. |
Commun. ACM |
1986 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #388 of 388 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4] |
|