|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 738 occurrences of 436 keywords
|
|
|
Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena |
Obscuro: A Bitcoin Mixer using Trusted Execution Environments. |
ACSAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Aviv, Flynn Wolf, Ravi Kuber |
Comparing Video Based Shoulder Surfing with Live Simulation. |
ACSAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xin Lin, Lingguang Lei, Yuewu Wang, Jiwu Jing, Kun Sun 0001, Quan Zhou |
A Measurement Study on Linux Container Security: Attacks and Countermeasures. |
ACSAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chengbin Pang, Yunlan Du, Bing Mao, Shanqing Guo |
Mapping to Bits: Efficiently Detecting Type Confusion Errors. |
ACSAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld |
Raising the Bar: Evaluating Origin-wide Security Manifests. |
ACSAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shota Futagami, Tomoya Unoki, Kenichi Kourai |
Secure Out-of-band Remote Management of Virtual Machines with Transparent Passthrough. |
ACSAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Christof Ferreira Torres, Julian Schütte, Radu State |
Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. |
ACSAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Vivek Jain, Sanjay Rawat 0001, Cristiano Giuffrida, Herbert Bos |
TIFF: Using Input Type Inference To Improve Fuzzing. |
ACSAC |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna |
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ronny Chevalier, Maugan Villatel, David Plaquin, Guillaume Hiet |
Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jun Young Kim, Ralph Holz, Wen Hu, Sanjay Jha 0001 |
Automated Analysis of Secure Internet of Things Protocols. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ali Abbasi 0002, Thorsten Holz, Emmanuele Zambon, Sandro Etalle |
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Binbin Chen 0001, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng |
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jianyu Jiang, Shixiong Zhao, Danish Alsayed, Yuexuan Wang, Heming Cui, Feng Liang, Zhaoquan Gu |
Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang 0001 |
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon 0001, Brendan Saltaformaggio, Xiangyu Zhang 0001, Dongyan Xu |
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hua Yan, Yulei Sui, Shiping Chen 0001, Jingling Xue |
Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Anh Quach, Matthew Cole, Aravind Prakash |
Supplementing Modern Software Defenses with Stack-Pointer Sanity. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Matús Nemec, Dusan Klinec, Petr Svenda, Peter Sekan, Vashek Matyas |
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl |
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ivo Sluganovic, Matej Serbec, Ante Derek, Ivan Martinovic |
HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Junya Ogasawara, Kenji Kono |
Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jelena Mirkovic, Erik Kline, Peter L. Reiher |
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Peter C. Johnson 0001, Sergey Bratus, Sean W. Smith |
Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Christopher Salls, Yan Shoshitaishvili, Nick Stephens, Christopher Kruegel, Giovanni Vigna |
Piston: Uncooperative Remote Runtime Patching. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Chris McMahon Stone, Tom Chothia, Flavio D. Garcia |
Spinner: Semi-Automatic Detection of Pinning without Hostname Verification. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017 |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Kevin A. Roundy, Acar Tamersoy, Michael Spertus, Michael Hart, Daniel Kats, Matteo Dell'Amico, Robert Scott |
Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Hoyeon Lee, Seungyeon Kim, Taekyoung Kwon 0002 |
Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Adam J. Aviv, John T. Davin, Flynn Wolf, Ravi Kuber |
Towards Baselines for Shoulder Surfing on Mobile Authentication. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar |
A Secure Mobile Authentication Alternative to Biometrics. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö |
n-Auth: Mobile Authentication Done Right. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Matteo Dell'Amico, Leyla Bilge, Ashwin Kumar Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier |
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xiaolei Wang 0003, Sencun Zhu, Dehua Zhou, Yuexiang Yang |
Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jake Weidman, Jens Grossklags |
I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska |
A Security-Mode for Carrier-Grade SDN Controllers. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens |
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Richard Skowyra, Steven R. Gomez, David Bigelow, James Landry, Hamed Okhravi |
QUASAR: Quantitative Attack Space Analysis and Reasoning. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Mingwei Zhang 0005, Michalis Polychronakis, R. Sekar 0001 |
Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Timothy Barron, Nick Nikiforakis |
Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Uyeong Jang, Xi Wu 0001, Somesh Jha |
Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Maliheh Shirvanian, Nitesh Saxena, Jesvin James George |
On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed, Bill Chu, Xi Niu |
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter |
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xiyue Deng, Jelena Mirkovic |
Commoner Privacy And A Study On Network Traces. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Lingwei Chen, Shifu Hou, Yanfang Ye 0001 |
SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Long Cheng 0005, Ke Tian, Danfeng (Daphne) Yao |
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Gianluca Stringhini, Yun Shen, Yufei Han, Xiangliang Zhang 0001 |
Marmite: Spreading Malicious File Reputation Through Download Graphs. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Richard J. Thomas, Mihai Ordean, Tom Chothia, Joeri de Ruiter |
TRAKS: A Universal Key Management Scheme for ERTMS. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Wei Yang 0013, Deguang Kong, Tao Xie 0001, Carl A. Gunter |
Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz |
Breaking and Fixing Destructive Code Read Defenses. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Le Guan, Shijie Jia 0001, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu 0005, Xinyu Xing, Luning Xia |
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyu Cao, Neil Zhenqiang Gong |
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy |
Predicting Cyber Threats with Virtual Security Products. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya |
The Devil's in The Details: Placing Decoy Routers in the Internet. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringhini, William K. Robertson, Engin Kirda |
Ex-Ray: Detection of History-Leaking Browser Extensions. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwenolé Quellec, Michel Cozic |
Proxy Re-Encryption Based on Homomorphic Encryption. |
ACSAC |
2017 |
DBLP DOI BibTeX RDF |
|
1 | Andy Applebaum, Doug Miller, Blake Strom, Chris Korban, Ross Wolf |
Intelligent, automated red team emulation. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler |
CPAC: securing critical infrastructure with cyber-physical access control. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel |
Reliably determining data leakage in the presence of strong attackers. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi |
ShieldFS: a self-healing, ransomware-aware filesystem. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Petar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara 0001 |
FASE: functionality-aware security enforcement. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Stephanos Matsumoto, Samuel Steffen, Adrian Perrig |
CASTLE: CA signing in a touch-less environment. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Hui Wang 0037, Yuanyuan Zhang 0002, Juanru Li, Dawu Gu |
The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Robin Sommer, Johanna Amann, Seth Hall |
Spicy: a unified deep packet inspection framework for safely dissecting all your data. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper |
Multi-receiver GPS spoofing detection: error models and realization. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Pengfei Sun, Rui Han, Mingbo Zhang, Saman A. Zonouz |
Trace-free memory data structure forensics via past inference and future speculations. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Jannik Pewny, Thorsten Holz |
EvilCoder: automated bug insertion. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Nicholas Chang-Fong, Aleksander Essex |
The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Hyungsub Kim, Sangho Lee 0001, Jong Kim 0001 |
Inferring browser activity and status through remote monitoring of storage usage. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Lei Yang 0037, Abdulmalik Humayed, Fengjun Li |
A multi-cloud based privacy-preserving data publishing scheme for the internet of things. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Sebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner |
Code obfuscation against symbolic execution attacks. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Mark R. Beaumont, Jim McCarthy, Toby C. Murray |
The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Zhen Xie, Sencun Zhu, Qing Li 0063, Wenjing Wang |
You can promote, but you can't hide: large-scale abused app detection in mobile app stores. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Mohammad N. AlShehri, Heather Crawford |
Using image saliency and regions of interest to encourage stronger graphical passwords. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Wei Huang 0027, Zhen Huang 0002, Dhaval Miyani, David Lie |
LMP: light-weighted memory protection with hardware assistance. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic |
Life-experience passwords (LEPs). |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth 0001, Berk Sunar |
Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Huan Feng, Kang G. Shin |
Understanding and defending the binder attack surface in Android. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Ioannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis |
Location-enhanced authentication using the IoT: because you cannot be in two places at once. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Furkan Alaca, Paul C. van Oorschot |
Device fingerprinting for augmenting web authentication: classification and analysis of methods. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom |
Amplifying side channels through performance degradation. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Farid Molazem Tabrizi, Karthik Pattabiraman |
Formal security analysis of smart embedded systems. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena |
Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Tran Phuong Thao, Kazumasa Omote |
ELAR: extremely lightweight auditing and repairing for cloud security. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos |
VTPin: practical VTable hijacking protection for binaries. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang 0001, Zhiwei Zhang, Luo Si, Xiangyu Zhang 0001, Dongyan Xu |
HERCULE: attack story reconstruction via community discovery on correlated log graph. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Bo Chen, Shijie Jia 0001, Luning Xia, Peng Liu 0005 |
Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger |
Pileus: protecting user resources from vulnerable cloud services. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, XiaoFeng Wang 0001, Zhou Li 0001 |
Catching predators at watering holes: finding and understanding strategically compromised websites. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Julian Horsch, Sascha Wessel, Claudia Eckert 0001 |
CoKey: fast token-based cooperative cryptography. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero |
RevProbe: detecting silent reverse proxies in malicious server infrastructures. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Jeremy Martin, Erik C. Rye, Robert Beverly |
Decomposition of MAC address structure for granular device inference. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Khaled Al-Naami, Swarup Chandra, Ahmad M. Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham |
Adaptive encrypted traffic fingerprinting with bi-directional dependence. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Shiqi Shen, Shruti Tople, Prateek Saxena |
Auror: defending against poisoning attacks in collaborative deep learning systems. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Thang Hoang, Attila Altay Yavuz, Jorge Guajardo |
Practical and secure dynamic searchable encryption via oblivious access on distributed data structure. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | John Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller |
Timing-based reconnaissance and defense in software-defined networks. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel |
On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Abdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan |
A security analysis of automated chinese turing tests. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
1 | Yang Shi 0002, Wujing Wei, Zongjian He, Hongfei Fan |
An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices. |
ACSAC |
2016 |
DBLP BibTeX RDF |
|
Displaying result #401 - #500 of 1667 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|