The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Muoi Tran, Loi Luu, Min Suk Kang, Iddo Bentov, Prateek Saxena Obscuro: A Bitcoin Mixer using Trusted Execution Environments. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adam J. Aviv, Flynn Wolf, Ravi Kuber Comparing Video Based Shoulder Surfing with Live Simulation. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xin Lin, Lingguang Lei, Yuewu Wang, Jiwu Jing, Kun Sun 0001, Quan Zhou A Measurement Study on Linux Container Security: Attacks and Countermeasures. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Chengbin Pang, Yunlan Du, Bing Mao, Shanqing Guo Mapping to Bits: Efficiently Detecting Type Confusion Errors. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Steven Van Acker, Daniel Hausknecht, Andrei Sabelfeld Raising the Bar: Evaluating Origin-wide Security Manifests. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shota Futagami, Tomoya Unoki, Kenichi Kourai Secure Out-of-band Remote Management of Virtual Machines with Transparent Passthrough. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Christof Ferreira Torres, Julian Schütte, Radu State Osiris: Hunting for Integer Bugs in Ethereum Smart Contracts. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vivek Jain, Sanjay Rawat 0001, Cristiano Giuffrida, Herbert Bos TIFF: Using Input Type Inference To Improve Fuzzing. Search on Bibsonomy ACSAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ronny Chevalier, Maugan Villatel, David Plaquin, Guillaume Hiet Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jun Young Kim, Ralph Holz, Wen Hu, Sanjay Jha 0001 Automated Analysis of Secure Internet of Things Protocols. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ali Abbasi 0002, Thorsten Holz, Emmanuele Zambon, Sandro Etalle ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Binbin Chen 0001, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jianyu Jiang, Shixiong Zhao, Danish Alsayed, Yuexuan Wang, Heming Cui, Feng Liang, Zhaoquan Gu Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang 0001 Analysis of SEAndroid Policies: Combining MAC and DAC in Android. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon 0001, Brendan Saltaformaggio, Xiangyu Zhang 0001, Dongyan Xu RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hua Yan, Yulei Sui, Shiping Chen 0001, Jingling Xue Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anh Quach, Matthew Cole, Aravind Prakash Supplementing Modern Software Defenses with Stack-Pointer Sanity. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Matús Nemec, Dusan Klinec, Petr Svenda, Peter Sekan, Vashek Matyas Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ivo Sluganovic, Matej Serbec, Ante Derek, Ivan Martinovic HoloPair: Securing Shared Augmented Reality Using Microsoft HoloLens. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Junya Ogasawara, Kenji Kono Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jelena Mirkovic, Erik Kline, Peter L. Reiher RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Peter C. Johnson 0001, Sergey Bratus, Sean W. Smith Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Christopher Salls, Yan Shoshitaishvili, Nick Stephens, Christopher Kruegel, Giovanni Vigna Piston: Uncooperative Remote Runtime Patching. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Chris McMahon Stone, Tom Chothia, Flavio D. Garcia Spinner: Semi-Automatic Detection of Pinning without Hostname Verification. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 33rd Annual Computer Security Applications Conference, Orlando, FL, USA, December 4-8, 2017 Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kevin A. Roundy, Acar Tamersoy, Michael Spertus, Michael Hart, Daniel Kats, Matteo Dell'Amico, Robert Scott Smoke Detector: Cross-Product Intrusion Detection With Weak Indicators. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Hoyeon Lee, Seungyeon Kim, Taekyoung Kwon 0002 Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Adam J. Aviv, John T. Davin, Flynn Wolf, Ravi Kuber Towards Baselines for Shoulder Surfing on Mobile Authentication. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar A Secure Mobile Authentication Alternative to Biometrics. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Roel Peeters, Jens Hermans, Pieter Maene, Katri Grenman, Kimmo Halunen, Juha Häikiö n-Auth: Mobile Authentication Done Right. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Matteo Dell'Amico, Leyla Bilge, Ashwin Kumar Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiaolei Wang 0003, Sencun Zhu, Dehua Zhou, Yuexiang Yang Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jake Weidman, Jens Grossklags I Like It, but I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Changhoon Yoon, Seungwon Shin, Phillip A. Porras, Vinod Yegneswaran, Heedo Kang, Martin W. Fong, Brian O'Connor, Thomas Vachuska A Security-Mode for Carrier-Grade SDN Controllers. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Richard Skowyra, Steven R. Gomez, David Bigelow, James Landry, Hamed Okhravi QUASAR: Quantitative Attack Space Analysis and Reasoning. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mingwei Zhang 0005, Michalis Polychronakis, R. Sekar 0001 Protecting COTS Binaries from Disclosure-guided Code Reuse Attacks. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Timothy Barron, Nick Nikiforakis Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Uyeong Jang, Xi Wu 0001, Somesh Jha Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Maliheh Shirvanian, Nitesh Saxena, Jesvin James George On the Pitfalls of End-to-End Encrypted Communications: A Study of Remote Key-Fingerprint Verification. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed, Bill Chu, Xi Niu TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiyue Deng, Jelena Mirkovic Commoner Privacy And A Study On Network Traces. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Lingwei Chen, Shifu Hou, Yanfang Ye 0001 SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Long Cheng 0005, Ke Tian, Danfeng (Daphne) Yao Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gianluca Stringhini, Yun Shen, Yufei Han, Xiangliang Zhang 0001 Marmite: Spreading Malicious File Reputation Through Download Graphs. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Richard J. Thomas, Mihai Ordean, Tom Chothia, Joeri de Ruiter TRAKS: A Universal Key Management Scheme for ERTMS. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Wei Yang 0013, Deguang Kong, Tao Xie 0001, Carl A. Gunter Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jannik Pewny, Philipp Koppe, Lucas Davi, Thorsten Holz Breaking and Fixing Destructive Code Read Defenses. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Le Guan, Shijie Jia 0001, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu 0005, Xinyu Xing, Luning Xia Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Xiaoyu Cao, Neil Zhenqiang Gong Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy Predicting Cyber Threats with Virtual Security Products. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya The Devil's in The Details: Placing Decoy Routers in the Internet. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Michael Weissbacher, Enrico Mariconti, Guillermo Suarez-Tangil, Gianluca Stringhini, William K. Robertson, Engin Kirda Ex-Ray: Detection of History-Leaking Browser Extensions. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwenolé Quellec, Michel Cozic Proxy Re-Encryption Based on Homomorphic Encryption. Search on Bibsonomy ACSAC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Andy Applebaum, Doug Miller, Blake Strom, Chris Korban, Ross Wolf Intelligent, automated red team emulation. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Sriharsha Etigowni, Dave (Jing) Tian, Grant Hernandez, Saman A. Zonouz, Kevin R. B. Butler CPAC: securing critical infrastructure with cyber-physical access control. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Riccardo Bortolameotti, Andreas Peter, Maarten H. Everts, Willem Jonker, Pieter H. Hartel Reliably determining data leakage in the presence of strong attackers. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Andrea Continella, Alessandro Guagnelli, Giovanni Zingaro, Giulio De Pasquale, Alessandro Barenghi, Stefano Zanero, Federico Maggi ShieldFS: a self-healing, ransomware-aware filesystem. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Petar Tsankov, Marco Pistoia, Omer Tripp, Martin T. Vechev, Pietro Ferrara 0001 FASE: functionality-aware security enforcement. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Stephanos Matsumoto, Samuel Steffen, Adrian Perrig CASTLE: CA signing in a touch-less environment. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Hui Wang 0037, Yuanyuan Zhang 0002, Juanru Li, Dawu Gu The Achilles heel of OAuth: a multi-platform study of OAuth-based authentication. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Robin Sommer, Johanna Amann, Seth Hall Spicy: a unified deep packet inspection framework for safely dissecting all your data. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Kai Jansen, Nils Ole Tippenhauer, Christina Pöpper Multi-receiver GPS spoofing detection: error models and realization. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Pengfei Sun, Rui Han, Mingbo Zhang, Saman A. Zonouz Trace-free memory data structure forensics via past inference and future speculations. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Jannik Pewny, Thorsten Holz EvilCoder: automated bug insertion. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Nicholas Chang-Fong, Aleksander Essex The cloudier side of cryptographic end-to-end verifiable voting: a security analysis of Helios. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Hyungsub Kim, Sangho Lee 0001, Jong Kim 0001 Inferring browser activity and status through remote monitoring of storage usage. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Lei Yang 0037, Abdulmalik Humayed, Fengjun Li A multi-cloud based privacy-preserving data publishing scheme for the internet of things. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Sebastian Banescu, Christian S. Collberg, Vijay Ganesh, Zack Newsham, Alexander Pretschner Code obfuscation against symbolic execution attacks. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Mark R. Beaumont, Jim McCarthy, Toby C. Murray The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Zhen Xie, Sencun Zhu, Qing Li 0063, Wenjing Wang You can promote, but you can't hide: large-scale abused app detection in mobile app stores. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Mohammad N. AlShehri, Heather Crawford Using image saliency and regions of interest to encourage stronger graphical passwords. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Wei Huang 0027, Zhen Huang 0002, Dhaval Miyani, David Lie LMP: light-weighted memory protection with hardware assistance. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Simon S. Woo, Elsi Kaiser, Ron Artstein, Jelena Mirkovic Life-experience passwords (LEPs). Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Mehmet Sinan Inci, Gorka Irazoqui, Thomas Eisenbarth 0001, Berk Sunar Efficient, adversarial neighbor discovery using logical channels on Microsoft Azure. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Huan Feng, Kang G. Shin Understanding and defending the binder attack surface in Android. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Ioannis Agadakos, Per A. Hallgren, Dimitrios Damopoulos, Andrei Sabelfeld, Georgios Portokalidis Location-enhanced authentication using the IoT: because you cannot be in two places at once. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Furkan Alaca, Paul C. van Oorschot Device fingerprinting for augmenting web authentication: classification and analysis of methods. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Thomas Allan, Billy Bob Brumley, Katrina Falkner, Joop van de Pol, Yuval Yarom Amplifying side channels through performance degradation. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Farid Molazem Tabrizi, Karthik Pattabiraman Formal security analysis of smart embedded systems. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Babins Shrestha, Manar Mohamed, Sandeep Tamrakar, Nitesh Saxena Theft-resilient mobile wallets: transparently authenticating NFC users with tapping gesture biometrics. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Tran Phuong Thao, Kazumasa Omote ELAR: extremely lightweight auditing and repairing for cloud security. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Pawel Sarbinowski, Vasileios P. Kemerlis, Cristiano Giuffrida, Elias Athanasopoulos VTPin: practical VTable hijacking protection for binaries. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Kexin Pei, Zhongshu Gu, Brendan Saltaformaggio, Shiqing Ma, Fei Wang 0001, Zhiwei Zhang, Luo Si, Xiangyu Zhang 0001, Dongyan Xu HERCULE: attack story reconstruction via community discovery on correlated log graph. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Bo Chen, Shijie Jia 0001, Luning Xia, Peng Liu 0005 Sanitizing data is not enough!: towards sanitizing structural artifacts in flash media. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Yuqiong Sun, Giuseppe Petracca, Xinyang Ge, Trent Jaeger Pileus: protecting user resources from vulnerable cloud services. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Sumayah A. Alrwais, Kan Yuan, Eihal Alowaisheq, Xiaojing Liao, Alina Oprea, XiaoFeng Wang 0001, Zhou Li 0001 Catching predators at watering holes: finding and understanding strategically compromised websites. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Julian Horsch, Sascha Wessel, Claudia Eckert 0001 CoKey: fast token-based cooperative cryptography. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Antonio Nappa, Rana Faisal Munir, Irfan Khan Tanoli, Christian Kreibich, Juan Caballero RevProbe: detecting silent reverse proxies in malicious server infrastructures. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Jeremy Martin, Erik C. Rye, Robert Beverly Decomposition of MAC address structure for granular device inference. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Khaled Al-Naami, Swarup Chandra, Ahmad M. Mustafa, Latifur Khan, Zhiqiang Lin, Kevin W. Hamlen, Bhavani Thuraisingham Adaptive encrypted traffic fingerprinting with bi-directional dependence. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Shiqi Shen, Shruti Tople, Prateek Saxena Auror: defending against poisoning attacks in collaborative deep learning systems. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Thang Hoang, Attila Altay Yavuz, Jorge Guajardo Practical and secure dynamic searchable encryption via oblivious access on distributed data structure. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1John Sonchack, Anurag Dubey, Adam J. Aviv, Jonathan M. Smith, Eric Keller Timing-based reconnaissance and defense in software-defined networks. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Eduard Marin, Dave Singelée, Flavio D. Garcia, Tom Chothia, Rik Willems, Bart Preneel On the (in)security of the latest generation implantable cardiac defibrillators and how to secure them. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Abdalnaser Algwil, Dan Ciresan, Bei-Bei Liu, Jeff Yan A security analysis of automated chinese turing tests. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Yang Shi 0002, Wujing Wei, Zongjian He, Hongfei Fan An ultra-lightweight white-box encryption scheme for securing resource-constrained IoT devices. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
Displaying result #401 - #500 of 1667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license