The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for vulnerabilities with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1990 (15) 1991-1998 (23) 1999-2000 (28) 2001 (32) 2002 (54) 2003 (93) 2004 (127) 2005 (198) 2006 (187) 2007 (249) 2008 (268) 2009 (190) 2010 (99) 2011 (93) 2012 (94) 2013 (90) 2014 (107) 2015 (135) 2016 (160) 2017 (167) 2018 (198) 2019 (254) 2020 (247) 2021 (268) 2022 (331) 2023 (377) 2024 (94)
Publication types (Num. hits)
article(1313) book(3) data(2) incollection(22) inproceedings(2772) phdthesis(66)
Venues (Conferences, Journals, ...)
CoRR(393) CCS(74) USENIX Security Symposium(66) ACSAC(53) ARES(44) Comput. Secur.(43) HICSS(41) IEEE Secur. Priv.(41) IEEE Access(37) DSN(34) AsiaCCS(32) NDSS(32) ICSE(27) ASE(26) SAC(26) RAID(23) More (+10 of total 1365)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1767 occurrences of 913 keywords

Results
Found 4178 publication records. Showing 4178 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Reid Kerr, Robin Cohen Smart cheaters do prosper: defeating trust and reputation systems. Search on Bibsonomy AAMAS (2) The full citation details ... 2009 DBLP  BibTeX  RDF electronic marketplaces, trust and reputation
14Nan Xu, Fan Zhang, Yisha Luo, Weijia Jia 0001, Dong Xuan, Jin Teng Stealthy video capturer: a new video-based spyware in 3G smartphones. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 3g smartphones, security, privacy, spyware
14Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng Attacks and improvements to an RIFD mutual authentication protocol and its extensions. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, privacy, authentication, rfid
14Stephen Farrell Security Boundaries. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Manuel Costa, Jon Crowcroft, Miguel Castro 0001, Antony I. T. Rowstron, Lidong Zhou, Lintao Zhang, Paul Barham 0001 Vigilante: End-to-end containment of Internet worm epidemics. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF self-certifying alerts, vulnerability condition slicing, program analysis, dynamic data-flow analysis, Worm containment
14Michael Price The Paradox of Security in Virtual Environments. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jelena Mirkovic, Peter L. Reiher, Christos Papadopoulos, Alefiya Hussain, Marla Shepard, Michael Berg, Robert Jung Testing a Collaborative DDoS Defense In a Red Team/Blue Team Exercise. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Selwyn Piramuthu Lightweight Cryptographic Authentication in Passive RFID-Tagged Systems. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Karthikeyan Bhargavan, Cédric Fournet, Andrew D. Gordon 0001 Verifying policy-based web services security. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Web services, pi calculus, XML security
14Guiomar Corral, Eva Armengol, Albert Fornells-Herrera, Elisabet Golobardes Data Security Analysis Using Unsupervised Learning and Explanations. Search on Bibsonomy Innovations in Hybrid Intelligent Systems The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Clustering, Network Security, Unsupervised Learning, Explanations
14Zhenhua Wu Biometrics Authentication System on Open Network and Security Analysis. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Chuanming Jing, Zhiliang Wang, Xia Yin, Jianping Wu A Formal Approach to Robustness Testing of Network Protocol. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Steven Crites, Francis Hsu, Hao Chen 0003 OMash: enabling secure web mashups via object abstractions. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF object abstraction, communication, web, mashup, protection, browser, security model, same origin policy
14Melissa Danforth Scalable Patch Management Using Evolutionary Analysis of Attack Graphs. Search on Bibsonomy ICMLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Andy Webber Security of community developed and 3rd-party wiki plug-ins. Search on Bibsonomy Int. Sym. Wikis The full citation details ... 2008 DBLP  DOI  BibTeX  RDF responsible disclosure, security, plug-in, cross site scripting
14Heli Tervo, Miia-Maarit Saarelainen, Jarmo J. Ahonen, Hanna-Miina Sihvonen The Impact of Decision-Making on Information System Dependability. Search on Bibsonomy ICSEA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Konstantinos Kemalis, Theodoros Tzouramanis SQL-IDS: a specification-based approach for SQL-injection detection. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF specification-based runtime validation, world-wide web, database security, web application security, SQL injection attacks
14Ming Luo, Tao Peng 0002, Christopher Leckie CPU-based DoS attacks against SIP servers. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Vikas R. Vasisht, Hsien-Hsin S. Lee SHARK: Architectural support for autonomic protection against stealth by rootkit exploits. Search on Bibsonomy MICRO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Scott Lintelman, Richard Robinson, Mingyan Li, Krishna Sampigethaya Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution. Search on Bibsonomy FM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Loadable Software Parts, Security, Formal Methods, Safety
14Shanai Ardi, Nahid Shahmehri Integrating a Security Plug-in with the OpenUP/Basic Development Process. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security plug-in, Software development process, Software security
14Fang Yu 0001, Tevfik Bultan, Marco Cova, Oscar H. Ibarra Symbolic String Verification: An Automata-Based Approach. Search on Bibsonomy SPIN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jianxin Li 0002, Teodor Sommestad, Patrick C. K. Hung, Xiang Li Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool. Search on Bibsonomy ICWS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Kai Li, Naijie Gu, Kun Bi, Hongzhu Ji Network Security Evaluation Algorithm Based on Access Level Vectors. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu An Automatic Mechanism for Sanitizing Malicious Injection. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Italo Dacosta, Neel Mehta, Evan Metrock, Jonathon T. Giffin Security Analysis of an IP Phone: Cisco 7960G. Search on Bibsonomy IPTComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IP phone, static binary analysis, embedded system security, VoIP security
14Fred Dysart, Mark Sherriff Automated Fix Generator for SQL Injection Attacks. Search on Bibsonomy ISSRE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Yuseung Sohn, Hyun-Yi Moon, Seunglim Yong, Sang-Ho Lee Security Issues of Collaborative Review System. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF design review system, security, virtual reality, collaborative environment, information assurance
14Todd Kennedy, Ray Hunt A review of WPAN security: attacks and prevention. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bluetooth, ZigBee, wireless personal area network, near field communication
14Wei Le, Mary Lou Soffa Marple: a demand-driven path-sensitive buffer overflow detector. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Vassilis Kostakos Human-in-the-loop: rethinking security in mobile and pervasive systems. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2008 DBLP  DOI  BibTeX  RDF pervasive and ubiquitous systems, security, usability, mobility, sociability
14Alan B. Shaffer, Mikhail Auguston, Cynthia E. Irvine, Timothy E. Levin A security domain model to assess software for exploitable covert channels. Search on Bibsonomy PLAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automated program verification, security domain model, static analysis, specification language, covert channel, dynamic slicing
14Lingyu Wang 0001, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia An Attack Graph-Based Probabilistic Security Metric. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Ryan Iwahashi, Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu, Jedidiah R. Crandall, Young-Jun Heo, Jintae Oh, Jong-Soo Jang Towards Automatically Generating Double-Free Vulnerability Signatures Using Petri Nets. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Nabil Schear, David R. Albrecht, Nikita Borisov High-Speed Matching of Vulnerability Signatures. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Sandeep Bhatkar, R. Sekar 0001 Data Space Randomization. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF address space randomization, buffer overflow, memory error
14Xiang Fu 0001, Kai Qian SAFELI: SQL injection scanner using symbolic execution. Search on Bibsonomy TAV-WEB The full citation details ... 2008 DBLP  DOI  BibTeX  RDF symbolic execution, automated testing, constraint solver, SQL injection attack
14José Manuel Torres 0001, Finn Olav Sveen, Jose María Sarriegi Security Strategy Analysis for Critical Information Infrastructures. Search on Bibsonomy CRITIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Minjin Kwon, Kyoochang Jeong, Heejo Lee PROBE: A Process Behavior-Based Host Intrusion Prevention System. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Ashutosh Saxena Dynamic authentication: Need than a choice. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur, Bart Jacobs 0001 Dismantling MIFARE Classic. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Saar Drimer, Steven J. Murdoch, Ross J. Anderson Thinking Inside the Box: System-Level Failures of Tamper Proofing. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chip and PIN, PIN entry devices, certification, incentives, smartcard, banking, tamper resistance, common criteria, EMV
14Ha-Thanh Le, Peter Kok Keong Loh Evaluating AVDL descriptions for web application vulnerability analysis. Search on Bibsonomy ISI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Csilla Farkas, Michael N. Huhns Securing Enterprise Applications: Service-Oriented Security (SOS). Search on Bibsonomy CEC/EEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Vitaliy B. Lvin, Gene Novark, Emery D. Berger, Benjamin G. Zorn Archipelago: trading address space for reliability and security. Search on Bibsonomy ASPLOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Archipelago, probabilistic memory safety, randomized algorithms, virtual memory, buffer overflow, dynamic memory allocation, memory errors
14Qijun Gu, Rizwan Noorani Towards self-propagate mal-packets in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mal-packet, sensor worm, buffer overflow, control flow
14Manhee Lee, Eun Jung Kim 0001 A Comprehensive Framework for Enhancing Security in InfiniBand Architecture. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cluster Security, InfiniBand Architecture, Galois/Counter Mode, Availability DoS, Authentication, Encryption
14Rahul Telang, Sunil Wattal An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software vendors, quality, Information security, patching, software vulnerability, event-study
14Marco Domenico Aime, Giorgio Calandriello, Antonio Lioy Dependability in Wireless Networks: Can We Rely on WiFi? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jin-Cherng Lin, Jan-Min Chen, Hsing-Kuo Wong An Automatic Meta-revised Mechanism for Anti-malicious Injection. Search on Bibsonomy NBiS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malicious injection, Security gateway, Black box testing, Input validation
14Lingyu Wang 0001, Anoop Singhal, Sushil Jajodia Toward measuring network security using attack graphs. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion detection, security metrics, attack graphs, vulnerability analysis
14Henrik Christiansson, Eric A. M. Luiijf Creating a European SCADA Security Testbed. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security testbed, risk assessment, SCADA systems
14Samer Fayssal, Salim Hariri, Youssif B. Al-Nashif, Guangzhi Qu Anomaly-Based Behavior Analysis of Wireless Network Security. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Ross J. Anderson Position Statement in RFID S&P Panel: RFID and the Middleman. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Vidar Kongsli Security testing with Selenium. Search on Bibsonomy OOPSLA Companion The full citation details ... 2007 DBLP  DOI  BibTeX  RDF misuse stories, security, testing, agile
14Bernhard Riedl, Thomas Neubauer, Gernot Goluch, Oswald Boehm, Gert Reinauer, Alexander Krumboeck A secure architecture for the pseudonymization of medical data. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Kevin Richardson, John A. Hamilton Jr., Martin C. Carlisle A performance analysis of the spring protocol through simulation. Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF SPRiNG, network simulation, wireless security, OPNET, WEP
14Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo 0001, Suranjan Pramanik, Ramkumar Chinchani, Sunu Mathew Insider Threat Analysis Using Information-Centric Modeling. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF capability acquisition graphs, key challenge graphs, Insider threats
14Pallavi Joshi, Koushik Sen, Mark Shlimovich Predictive testing: amplifying the effectiveness of software testing. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF assertion hoisting, predictive testing, random testing, symbolic execution, testing C programs
14Nauman Mazhar, Muddassar Farooq Vulnerability analysis and security framework (BeeSec) for nature inspired MANET routing protocols. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptographic security, misbehavior detection, mobile ad hoc networks, self-organization, swarm intelligence
14Zhichun Li, Lanjia Wang, Yan Chen 0004, Zhi Fu Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Frédéric Massicotte, Mathieu Couture, Lionel C. Briand, Yvan Labiche Model-Driven, Network-Context Sensitive Intrusion Detection. Search on Bibsonomy MoDELS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF OCL constraints, Intrusion Detection, UML modeling
14Jaziar Radianti, Jose J. Gonzalez Understanding Hidden Information Security Threats: The Vulnerability Black Market. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Vulnerability Black Market, Information Security, System Dynamics, Software Vulnerability, Integrated Operations
14Carl Hauser Minitrack: Cyber Security. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jung-Hyun Oh, Hyun Seok Kim, Jin-Young Choi A Light-weight Security Protocol for RFID System. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GNY logic, RFID, Security protocol, One-time pad
14Stefano Bistarelli, Pamela Peretti, Irina Trubitsyna Answer Set Optimization for and/or Composition of CP-Nets: A Security Scenario. Search on Bibsonomy CP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14José Meseguer 0001, Ralf Sasse, Helen J. Wang, Yi-Min Wang A Systematic Approach to Uncover Security Flaws in GUI Logic. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Silvano Chiaradonna, Felicita Di Giandomenico, Paolo Lollini Evaluation of Critical Infrastructures: Challenges and Viable Approaches. Search on Bibsonomy WADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Madhusudhanan Chandrasekaran, Mukarram Baig, Shambhu J. Upadhyaya AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Songtao Guo, Xintao Wu Deriving Private Information from Arbitrarily Projected Data. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Ming-Wei Wu, Sy-Yen Kuo Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Joseph A. Tucek, James Newsome, Shan Lu 0001, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou 0001, Dawn Xiaodong Song Sweeper: a lightweight end-to-end system for defending against fast worms. Search on Bibsonomy EuroSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF VSEF, flash worm, dynamic instrumentation, antibody
14Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang 0001 Automated Security Debugging Using Program Structural Constraints. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hishiyama, Yu Takahama Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Dianxiang Xu, Kendall E. Nygard Threat-Driven Modeling and Verification of Secure Software Using Aspect-Oriented Petri Nets. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF aspect-oriented Petri nets, modeling, verification, Petri nets, aspect-oriented software development, Software security, threat modeling
14William Suchan, Edward Sobiesk Strengthening the Weakest Link in Digital Protection. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten Bridging the gap between web application firewalls and web applications. Search on Bibsonomy FMSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF run-time enforcement, shared data repository, web spplication girewall, static verification
14Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh BIRD: Binary Interpretation using Runtime Disassembly. Search on Bibsonomy CGO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14George Yee Visualization for privacy compliance. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy legislation, visualization, privacy, compliance, e-services
14Yih Huang, David Arsenault, Arun Sood Securing DNS Services through System Self Cleansing and Hardware Enhancements. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Guiomar Corral, Albert Fornells, Elisabet Golobardes, Jaume Abella 0002 Cohesion Factors: Improving the Clustering Capabilities of Consensus. Search on Bibsonomy IDEAL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF AI applications, Network security, Self-Organization Map, Unsupervised Learning, K-means
14Ashish Aggarwal, Pankaj Jalote Monitoring the Security Health of Software Systems. Search on Bibsonomy ISSRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Weider D. Yu, Dhanya Aravind, Passarawarin Supthaweesuk Software Vulnerability Analysis for Web Services Software Systems. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu 0001, Edmund M. Clarke, Jeannette M. Wing Ranking Attack Graphs. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Google PageRank, Model Checking, security metric, Attack Graph, Attack Model
14Geuk Lee, Youngsup Kim, Sang-Jo Youk Development of Oval Based Vulnerability Management Tool (OVMT) on a Distributed Network Environment. Search on Bibsonomy KES (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Josh Dehlinger, Qian Feng, Lan Hu SSVChecker: unifying static security vulnerability detection tools in an Eclipse plug-in. Search on Bibsonomy ETX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security auditing, software security, secure programming
14Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz 0001, Karl N. Levitt, Matt Bishop Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. Search on Bibsonomy DIMVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Wei Li 0025, Rayford B. Vaughn Cluster Security Research Involving the Modeling of Network Exploitations Using Exploitation Graphs. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cluster security, exploitation graph (e-graph), network security, modeling and simulating
14Roland Rieke Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection
14Haibin Shen, Jimin Wang, Lingdi Ping, Kang Sun Securing C Programs by Dynamic Type Checking. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Miles A. McQueen, Wayne F. Boyer, Mark A. Flynn, George A. Beitel Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Francesco Palmieri 0002, Ugo Fiore Audit-Based Access Control in Nomadic Wireless Environments. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security audit, access control, Mobile networking
14Martin Johns SessionSafe: Implementing XSS Immune Session Handling. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, Kazuto Shimizu, Hidetsugu Irie, Masahiro Goshima, Shuichi Sakai Base Address Recognition with Data Flow Tracking for Injection Attack Detection. Search on Bibsonomy PRDC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF injection attack, base address, data flow tracking, security, vulnerability
14Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis Dark application communities. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF application communities, dark application communities, network security, automorphic
14Yves Younan, Wouter Joosen, Frank Piessens Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Kyle Ingols, Richard Lippmann, Keith Piwowarski Practical Attack Graph Generation for Network Defense. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru Venkataramani, Milos Prvulovic Comprehensively and efficiently protecting the heap. Search on Bibsonomy ASPLOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF heap attacks, heap security, heap server, computer security
14Usman Tariq, Manpyo Hong, Kyung-suk Lhee A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques. Search on Bibsonomy ADMA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 4178 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license