|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1767 occurrences of 913 keywords
|
|
|
Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
14 | Reid Kerr, Robin Cohen |
Smart cheaters do prosper: defeating trust and reputation systems. |
AAMAS (2) |
2009 |
DBLP BibTeX RDF |
electronic marketplaces, trust and reputation |
14 | Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia 0001, Dong Xuan, Jin Teng |
Stealthy video capturer: a new video-based spyware in 3G smartphones. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
3g smartphones, security, privacy, spyware |
14 | Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng |
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, authentication, rfid |
14 | Stephen Farrell |
Security Boundaries. |
IEEE Internet Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 |
Vigilante: End-to-end containment of Internet worm epidemics. |
ACM Trans. Comput. Syst. |
2008 |
DBLP DOI BibTeX RDF |
self-certifying alerts, vulnerability condition slicing, program analysis, dynamic data-flow analysis, Worm containment |
14 | Michael Price |
The Paradox of Security in Virtual Environments. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung |
Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Selwyn Piramuthu |
Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems. |
IEEE Trans. Syst. Man Cybern. Part C |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon 0001 |
Verifying policy-based web services security. |
ACM Trans. Program. Lang. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Web services, pi calculus, XML security |
14 | Guiomar Corral, Eva Armengol, Albert Fornells-Herrera, Elisabet Golobardes |
Data Security Analysis Using Unsupervised Learning and Explanations. |
Innovations in Hybrid Intelligent Systems |
2008 |
DBLP DOI BibTeX RDF |
Clustering, Network Security, Unsupervised Learning, Explanations |
14 | Zhenhua Wu |
Biometrics Authentication System on Open Network and Security Analysis. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Chuanming Jing, Zhiliang Wang, Xia Yin, Jianping Wu |
A Formal Approach to Robustness Testing of Network Protocol. |
NPC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Steven Crites, Francis Hsu, Hao Chen 0003 |
OMash: enabling secure web mashups via object abstractions. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
object abstraction, communication, web, mashup, protection, browser, security model, same origin policy |
14 | Melissa Danforth |
Scalable Patch Management Using Evolutionary Analysis of Attack Graphs. |
ICMLA |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Andy Webber |
Security of community developed and 3rd-party wiki plug-ins. |
Int. Sym. Wikis |
2008 |
DBLP DOI BibTeX RDF |
responsible disclosure, security, plug-in, cross site scripting |
14 | Heli Tervo, Miia-Maarit Saarelainen, Jarmo J. Ahonen, Hanna-Miina Sihvonen |
The Impact of Decision-Making on Information System Dependability. |
ICSEA |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Konstantinos Kemalis, Theodoros Tzouramanis |
SQL-IDS: a specification-based approach for SQL-injection detection. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
specification-based runtime validation, world-wide web, database security, web application security, SQL injection attacks |
14 | Ming Luo, Tao Peng 0002, Christopher Leckie |
CPU-based DoS attacks against SIP servers. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Vikas R. Vasisht, Hsien-Hsin S. Lee |
SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. |
MICRO |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Scott Lintelman, Richard Robinson, Mingyan Li, Krishna Sampigethaya |
Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution. |
FM |
2008 |
DBLP DOI BibTeX RDF |
Loadable Software Parts, Security, Formal Methods, Safety |
14 | Shanai Ardi, Nahid Shahmehri |
Integrating a Security Plug-in with the OpenUP/Basic Development Process. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Security plug-in, Software development process, Software security |
14 | Fang Yu 0001, Tevfik Bultan, Marco Cova, Oscar H. Ibarra |
Symbolic String Verification: An Automata-Based Approach. |
SPIN |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jianxin Li 0002, Teodor Sommestad, Patrick C. K. Hung, Xiang Li |
Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool. |
ICWS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Kai Li, Naijie Gu, Kun Bi, Hongzhu Ji |
Network Security Evaluation Algorithm Based on Access Level Vectors. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu |
An Automatic Mechanism for Sanitizing Malicious Injection. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Italo Dacosta, Neel Mehta, Evan Metrock, Jonathon T. Giffin |
Security Analysis of an IP Phone: Cisco 7960G. |
IPTComm |
2008 |
DBLP DOI BibTeX RDF |
IP phone, static binary analysis, embedded system security, VoIP security |
14 | Fred Dysart, Mark Sherriff |
Automated Fix Generator for SQL Injection Attacks. |
ISSRE |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Yuseung Sohn, Hyun-Yi Moon, Seunglim Yong, Sang-Ho Lee |
Security Issues of Collaborative Review System. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
design review system, security, virtual reality, collaborative environment, information assurance |
14 | Todd Kennedy, Ray Hunt |
A review of WPAN security: attacks and prevention. |
Mobility Conference |
2008 |
DBLP DOI BibTeX RDF |
bluetooth, ZigBee, wireless personal area network, near field communication |
14 | Wei Le, Mary Lou Soffa |
Marple: a demand-driven path-sensitive buffer overflow detector. |
SIGSOFT FSE |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Vassilis Kostakos |
Human-in-the-loop: rethinking security in mobile and pervasive systems. |
CHI Extended Abstracts |
2008 |
DBLP DOI BibTeX RDF |
pervasive and ubiquitous systems, security, usability, mobility, sociability |
14 | Alan B. Shaffer, Mikhail Auguston, Cynthia E. Irvine, Timothy E. Levin |
A security domain model to assess software for exploitable covert channels. |
PLAS |
2008 |
DBLP DOI BibTeX RDF |
automated program verification, security domain model, static analysis, specification language, covert channel, dynamic slicing |
14 | Lingyu Wang 0001, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia |
An Attack Graph-Based Probabilistic Security Metric. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang |
Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Nabil Schear, David R. Albrecht, Nikita Borisov |
High-Speed Matching of Vulnerability Signatures. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Sandeep Bhatkar, R. Sekar 0001 |
Data Space Randomization. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
address space randomization, buffer overflow, memory error |
14 | Xiang Fu 0001, Kai Qian |
SAFELI: SQL injection scanner using symbolic execution. |
TAV-WEB |
2008 |
DBLP DOI BibTeX RDF |
symbolic execution, automated testing, constraint solver, SQL injection attack |
14 | José Manuel Torres 0001, Finn Olav Sveen, Jose María Sarriegi |
Security Strategy Analysis for Critical Information Infrastructures. |
CRITIS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Minjin Kwon, Kyoochang Jeong, Heejo Lee |
PROBE: A Process Behavior-Based Host Intrusion Prevention System. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Ashutosh Saxena |
Dynamic authentication: Need than a choice. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs 0001 |
Dismantling MIFARE Classic. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Saar Drimer, Steven J. Murdoch, Ross J. Anderson |
Thinking Inside the Box: System-Level Failures of Tamper Proofing. |
SP |
2008 |
DBLP DOI BibTeX RDF |
Chip and PIN, PIN entry devices, certification, incentives, smartcard, banking, tamper resistance, common criteria, EMV |
14 | Ha-Thanh Le, Peter Kok Keong Loh |
Evaluating AVDL descriptions for web application vulnerability analysis. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Csilla Farkas, Michael N. Huhns |
Securing Enterprise Applications: Service-Oriented Security (SOS). |
CEC/EEE |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Benjamin G. Zorn |
Archipelago: trading address space for reliability and security. |
ASPLOS |
2008 |
DBLP DOI BibTeX RDF |
Archipelago, probabilistic memory safety, randomized algorithms, virtual memory, buffer overflow, dynamic memory allocation, memory errors |
14 | Qijun Gu, Rizwan Noorani |
Towards self-propagate mal-packets in sensor networks. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
mal-packet, sensor worm, buffer overflow, control flow |
14 | Manhee Lee, Eun Jung Kim 0001 |
A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption |
14 | Rahul Telang, Sunil Wattal |
An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price. |
IEEE Trans. Software Eng. |
2007 |
DBLP DOI BibTeX RDF |
software vendors, quality, Information security, patching, software vulnerability, event-study |
14 | Marco Domenico Aime, Giorgio Calandriello, Antonio Lioy |
Dependability in Wireless Networks: Can We Rely on WiFi? |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jin-Cherng Lin, Jan-Min Chen, Hsing-Kuo Wong |
An Automatic Meta-revised Mechanism for Anti-malicious Injection. |
NBiS |
2007 |
DBLP DOI BibTeX RDF |
Malicious injection, Security gateway, Black box testing, Input validation |
14 | Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia |
Toward measuring network security using attack graphs. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
intrusion detection, security metrics, attack graphs, vulnerability analysis |
14 | Henrik Christiansson, Eric A. M. Luiijf |
Creating a European SCADA Security Testbed. |
Critical Infrastructure Protection |
2007 |
DBLP DOI BibTeX RDF |
security testbed, risk assessment, SCADA systems |
14 | Samer Fayssal, Salim Hariri, Youssif B. Al-Nashif, Guangzhi Qu |
Anomaly-Based Behavior Analysis of Wireless Network Security. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Ross J. Anderson |
Position Statement in RFID S&P Panel: RFID and the Middleman. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Vidar Kongsli |
Security testing with Selenium. |
OOPSLA Companion |
2007 |
DBLP DOI BibTeX RDF |
misuse stories, security, testing, agile |
14 | Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck |
A secure architecture for the pseudonymization of medical data. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Kevin Richardson, John A. Hamilton Jr., Martin C. Carlisle |
A performance analysis of the spring protocol through simulation. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
SPRiNG, network simulation, wireless security, OPNET, WEP |
14 | Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo 0001, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew |
Insider Threat Analysis Using Information-Centric Modeling. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
capability acquisition graphs, key challenge graphs, Insider threats |
14 | Pallavi Joshi, Koushik Sen, Mark Shlimovich |
Predictive testing: amplifying the effectiveness of software testing. |
ESEC/SIGSOFT FSE |
2007 |
DBLP DOI BibTeX RDF |
assertion hoisting, predictive testing, random testing, symbolic execution, testing C programs |
14 | Nauman Mazhar, Muddassar Farooq |
Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols. |
GECCO |
2007 |
DBLP DOI BibTeX RDF |
cryptographic security, misbehavior detection, mobile ad hoc networks, self-organization, swarm intelligence |
14 | Zhichun Li, Lanjia Wang, Yan Chen 0004, Zhi Fu |
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Frédéric Massicotte, Mathieu Couture, Lionel C. Briand, Yvan Labiche |
Model-Driven, Network-Context Sensitive Intrusion Detection. |
MoDELS |
2007 |
DBLP DOI BibTeX RDF |
OCL constraints, Intrusion Detection, UML modeling |
14 | Jaziar Radianti, Jose J. Gonzalez |
Understanding Hidden Information Security Threats: The Vulnerability Black Market. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
Vulnerability Black Market, Information Security, System Dynamics, Software Vulnerability, Integrated Operations |
14 | Carl Hauser |
Minitrack: Cyber Security. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi |
A Light-weight Security Protocol for RFID System. (PDF / PS) |
PWC |
2007 |
DBLP DOI BibTeX RDF |
GNY logic, RFID, Security protocol, One-time pad |
14 | Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna |
Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario. |
CP |
2007 |
DBLP DOI BibTeX RDF |
|
14 | José Meseguer 0001, Ralf Sasse, Helen J. Wang, Yi-Min Wang |
A Systematic Approach to Uncover Security Flaws in GUI Logic. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Silvano Chiaradonna, Felicita Di Giandomenico, Paolo Lollini |
Evaluation of Critical Infrastructures: Challenges and Viable Approaches. |
WADS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya |
AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. |
AINA Workshops (2) |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper |
Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Songtao Guo, Xintao Wu |
Deriving Private Information from Arbitrarily Projected Data. |
PAKDD |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Ming-Wei Wu, Sy-Yen Kuo |
Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. |
PRDC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Joseph A. Tucek, James Newsome, Shan Lu 0001, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou 0001, Dawn Xiaodong Song |
Sweeper: a lightweight end-to-end system for defending against fast worms. |
EuroSys |
2007 |
DBLP DOI BibTeX RDF |
VSEF, flash worm, dynamic instrumentation, antibody |
14 | Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang 0001 |
Automated Security Debugging Using Program Structural Constraints. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hishiyama, Yu Takahama |
Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Dianxiang Xu, Kendall E. Nygard |
Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. |
IEEE Trans. Software Eng. |
2006 |
DBLP DOI BibTeX RDF |
aspect-oriented Petri nets, modeling, verification, Petri nets, aspect-oriented software development, Software security, threat modeling |
14 | William Suchan, Edward Sobiesk |
Strengthening the Weakest Link in Digital Protection. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten |
Bridging the gap between web application firewalls and web applications. |
FMSE |
2006 |
DBLP DOI BibTeX RDF |
run-time enforcement, shared data repository, web spplication girewall, static verification |
14 | Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh |
BIRD: Binary Interpretation using Runtime Disassembly. |
CGO |
2006 |
DBLP DOI BibTeX RDF |
|
14 | George Yee |
Visualization for privacy compliance. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
privacy legislation, visualization, privacy, compliance, e-services |
14 | Yih Huang, David Arsenault, Arun Sood |
Securing DNS Services through System Self Cleansing and Hardware Enhancements. |
ARES |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Guiomar Corral, Albert Fornells, Elisabet Golobardes, Jaume Abella 0002 |
Cohesion Factors: Improving the Clustering Capabilities of Consensus. |
IDEAL |
2006 |
DBLP DOI BibTeX RDF |
AI applications, Network security, Self-Organization Map, Unsupervised Learning, K-means |
14 | Ashish Aggarwal, Pankaj Jalote |
Monitoring the Security Health of Software Systems. |
ISSRE |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Weider D. Yu, Dhanya Aravind, Passarawarin Supthaweesuk |
Software Vulnerability Analysis for Web Services Software Systems. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu 0001, Edmund M. Clarke, Jeannette M. Wing |
Ranking Attack Graphs. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Google PageRank, Model Checking, security metric, Attack Graph, Attack Model |
14 | Geuk Lee, Youngsup Kim, Sang-Jo Youk |
Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment. |
KES (3) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Josh Dehlinger, Qian Feng, Lan Hu |
SSVChecker: unifying static security vulnerability detection tools in an Eclipse plug-in. |
ETX |
2006 |
DBLP DOI BibTeX RDF |
security auditing, software security, secure programming |
14 | Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz 0001, Karl N. Levitt, Matt Bishop |
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Wei Li 0025, Rayford B. Vaughn |
Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. |
CCGRID |
2006 |
DBLP DOI BibTeX RDF |
cluster security, exploitation graph (e-graph), network security, modeling and simulating |
14 | Roland Rieke |
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection |
14 | Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun |
Securing C Programs by Dynamic Type Checking. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Miles A. McQueen, Wayne F. Boyer, Mark A. Flynn, George A. Beitel |
Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Francesco Palmieri 0002, Ugo Fiore |
Audit-Based Access Control in Nomadic Wireless Environments. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
security audit, access control, Mobile networking |
14 | Martin Johns |
SessionSafe: Implementing XSS Immune Session Handling. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, Kazuto Shimizu, Hidetsugu Irie, Masahiro Goshima, Shuichi Sakai |
Base Address Recognition with Data Flow Tracking for Injection Attack Detection. |
PRDC |
2006 |
DBLP DOI BibTeX RDF |
injection attack, base address, data flow tracking, security, vulnerability |
14 | Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis |
Dark application communities. |
NSPW |
2006 |
DBLP DOI BibTeX RDF |
application communities, dark application communities, network security, automorphic |
14 | Yves Younan, Wouter Joosen, Frank Piessens |
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Kyle Ingols, Richard Lippmann, Keith Piwowarski |
Practical Attack Graph Generation for Network Defense. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru Venkataramani, Milos Prvulovic |
Comprehensively and efficiently protecting the heap. |
ASPLOS |
2006 |
DBLP DOI BibTeX RDF |
heap attacks, heap security, heap server, computer security |
14 | Usman Tariq, Manpyo Hong, Kyung-suk Lhee |
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. |
ADMA |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 4178 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|