The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (26) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (50) 1997 (54) 1998 (92) 1999 (127) 2000 (178) 2001 (306) 2002 (406) 2003 (624) 2004 (899) 2005 (1333) 2006 (1490) 2007 (1528) 2008 (1585) 2009 (1275) 2010 (673) 2011 (702) 2012 (813) 2013 (804) 2014 (989) 2015 (1073) 2016 (1206) 2017 (1461) 2018 (1759) 2019 (2206) 2020 (2727) 2021 (2982) 2022 (3370) 2023 (3864) 2024 (1050)
Publication types (Num. hits)
article(15280) book(15) data(11) incollection(195) inproceedings(19901) phdthesis(378) proceedings(22)
Venues (Conferences, Journals, ...)
CoRR(4079) IACR Cryptol. ePrint Arch.(1244) IEEE Access(507) RAID(446) CCS(308) IEEE Trans. Inf. Forensics Sec...(260) Comput. Secur.(249) USENIX Security Symposium(224) IEEE Trans. Smart Grid(198) GLOBECOM(197) ICC(193) FSE(187) ACSAC(184) CHES(178) Sensors(170) ARES(166) More (+10 of total 3761)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11110 occurrences of 2965 keywords

Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Frederik Armknecht, Matthias Krause 0001 Algebraic Attacks on Combiners with Memory. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Artemios G. Voyiatzis, Dimitrios N. Serpanos Active hardware attacks and proactive countermeasures. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Suresh Chari, Josyula R. Rao, Pankaj Rohatgi Template Attacks. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22John Haggerty, Qi Shi 0001, Madjid Merabti Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Alex Biryukov, David A. Wagner 0001 Advanced Slide Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Steve H. Weingart Physical Security Devices for Computer Subsystems: A Survey of Attacks and Defences. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
22Jonathan T. Trostle Timing Attacks Against Trusted Path. Search on Bibsonomy S&P The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
22Birgit Pfitzmann, Michael Waidner Attacks on Protocols for Server-Aided RSA Computation. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
22Marco Cova, Christopher Krügel, Giovanni Vigna Detection and analysis of drive-by-download attacks and malicious JavaScript code. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF drive-by-download attacks, web client exploits, anomaly detection
22James Cheng, Ada Wai-Chee Fu, Jia Liu K-isomorphism: privacy preserving network publication against structural attacks. Search on Bibsonomy SIGMOD Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF structural attacks, social networks, privacy preservation, graph isomorphism, data publishing
22Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. Search on Bibsonomy HCI (16) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks
22Udaya Kiran Tupakula, Vijay Varadharajan, Srini Rao Pandalaneni DoSTRACK: a system for defending against DoS attacks. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Smurf, TCP SYN flood, DoS, DDoS, reflection attacks
22Nuno Laranjeiro, Marco Vieira, Henrique Madeira Protecting Database Centric Web Services against SQL/XPath Injection Attacks. Search on Bibsonomy DEXA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF XPath Injection, Web services, vulnerabilities, SQL Injection, code instrumentation, security attacks
22Nils Ole Tippenhauer, Kasper Bonne Rasmussen, Christina Pöpper, Srdjan Capkun Attacks on public WLAN-based positioning systems. Search on Bibsonomy MobiSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF localization attacks, public wlan localization
22Abid Khan, Qasim Arshad, Xiamu Niu, Yong Zhang 0023, Muhammad Waqas Anwar On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Graph head Sealing, execution integrity, security properties, Mobile Agent security, malicious hosts, active attacks
22Emmanuel Prouff, Robert P. McEvoy First-Order Side-Channel Attacks on the Permutation Tables Countermeasure. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Permutation Tables, MIA, Side-Channel Attacks, Masking, CPA
22Thomas Dreibholz, Erwin P. Rathgeb, Xing Zhou On Robustness and Countermeasures of Reliable Server Pooling Systems Against Denial of Service Attacks. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Robustness, Denial of Service, Attacks, Countermeasures, Reliable Server Pooling
22Sanjog Ray, Ambuj Mahanti Strategies for Effective Shilling Attacks against Recommender Systems. Search on Bibsonomy PinKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Shilling attacks, Recommender systems, Collaborative filtering
22Gaston Ormazabal, Sarvesh Nagpal, Eilon Yardeni, Henning Schulzrinne Secure SIP: A Scalable Prevention Mechanism for DoS Attacks on SIP Based VoIP Systems. Search on Bibsonomy IPTComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Signaling Attacks, Application Layer Firewall, Security, Scalability, Distributed Computing, SIP, VoIP, DoS, DDoS, Deep Packet Inspection
22Salem Benferhat, Tayeb Kenaza, Aïcha Mokhtari A Naive Bayes Approach for Detecting Coordinated Attacks. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF coordinated attacks, Bayesian networks, IDS
22Nicolas T. Courtois, Gregory V. Bard, David A. Wagner 0001 Algebraic and Slide Attacks on KeeLoq. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unbalanced Feistel ciphers, Gröbner bases, KeeLoq, block ciphers, SAT solvers, algebraic cryptanalysis, slide attacks
22Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF random value addition, side channel attacks, Tate pairing, ? T pairing
22Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fiérrez-Aguilar, Javier Ortega-Garcia Direct Attacks Using Fake Images in Iris Verification. Search on Bibsonomy BIOID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF direct attacks, fake iris, Biometrics, iris recognition
22Huo-Chong Ling, Raphael C.-W. Phan, Swee-Huay Heng Attacks on SVD-Based Watermarking Schemes. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF proof of ownership, robustness, watermarking, singular value decomposition, attacks
22Saikat Chakrabarti 0002, Mukesh Singhal Password-Based Authentication: Preventing Dictionary Attacks. Search on Bibsonomy Computer The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, dictionary attacks, password-based authentication
22Igor V. Kotenko, Alexander Ulanov Multi-agent Framework for Simulation of Adaptive Cooperative Defense Against Internet Attacks. Search on Bibsonomy AIS-ADM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF adaptation and learning in multi-agent systems, security simulation, network attacks and defense, applications
22Johannes Blömer, Volker Krummel Analysis of Countermeasures Against Access Driven Cache Attacks on AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF AES, countermeasures, threat model, random permutations, cache attacks
22Joaquín García-Alfaro, Guillermo Navarro-Arribas Prevention of Cross-Site Scripting Attacks on Current Web Applications. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security Policies, Software Protection, Code Injection Attacks
22Arnaud Boscher, Robert Naciri, Emmanuel Prouff CRT RSA Algorithm Protected Against Fault Attacks. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Smart Card, RSA, Chinese Remainder Theorem, Fault Attacks, Simple Power Analysis, Modular Exponentiation
22Amir Moradi 0001, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani Power Analysis Attacks on MDPL and DRSL Implementations. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DRSL, MDPL, Side-Channel Attacks, DPA, flip-flop
22Pedro Peris-Lopez, Julio César Hernández Castro, Juan M. Estévez-Tapiador, Arturo Ribagorda An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IUC, Light-weight Hash functions, Security, Authentication, RFID, Active-attacks
22Vedat Coskun, Erdal Cayirci, Albert Levi, Serdar Sancak Quarantine Region Scheme to Mitigate Spam Attacks in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF quarantine region, spam attacks, wireless sensor networks, authentication, Network-level security and protection
22Thorsten Holz, Simon Marechal, Frédéric Raynal New Threats and Attacks on the World Wide Web. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XSS worms, back doors, attacks, worms, SQL injection, viruses, web application security
22Nong Ye, Toni Farley, Deepak Lakshminarasimhan An attack-norm separation approach for detecting cyber attacks. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computer and network security, Intrusion detection, Signal processing, Signal detection, Cyber attacks
22Weichao Wang, Aidong Lu Visualization assisted detection of sybil attacks in wireless networks. Search on Bibsonomy VizSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF interactive detection, topology visualization, visualization on network security, wireless networks, sybil attacks
22Camille Vuillaume, Katsuyuki Okeya Flexible Exponentiation with Resistance to Side Channel Attacks. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fractional width, RSA, side channel attacks, simple power analysis
22Carlos Roberto Moratelli, Érika F. Cota, Marcelo Lubaszewski A cryptography core tolerant to DFA fault attacks. Search on Bibsonomy SBCCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, smart cards, fault attacks
22Jiqiang Lu, Changhoon Lee, Jongsung Kim Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cobra-F64a, Cobra-F64b, Block cipher, Differential cryptanalysis, Related-key attacks, Data-dependent permutation
22Douglas Stebila, Nicolas Thériault Unified Point Addition Formulæ and Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unified point addition formulæ, projective coordinates, elliptic-curve cryptography, side-channel attacks
22Mathieu Baudet Deciding security of protocols against off-line guessing attacks. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF second-order e-unification, formal methods, security protocols, guessing attacks
22Engin Kirda, Christopher Krügel Protecting Users Against Phishing Attacks with AntiPhish. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Phishing Attacks, User Protection, Security
22Jing Deng 0002, Richard Han 0001, Shivakant Mishra Defending against path-based DoS attacks in wireless sensor networks. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, sensor networks, denial of services attacks
22Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002, Dukjae Moon Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cobra-H64, Cobra-H128, Block Ciphers, Related-Key Attacks, Data-Dependent Permutations
22Olivier Billet, Henri Gilbert Resistance of SNOW 2.0 Against Algebraic Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SNOW 2.0, stream ciphers, algebraic attacks
22Haining Wang, Danlu Zhang, Kang G. Shin Change-Point Monitoring for the Detection of DoS Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CUSUM algorithm, protocol behavior, intrusion detection, DoS attacks
22Dong Hoon Lee 0002, Jaeheon Kim, Jin Hong 0001, Jae Woo Han, Dukjae Moon Algebraic Attacks on Summation Generators. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF summation generators, stream ciphers, algebraic attacks
22YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002 Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Differential-Linear Type Attacks, SHACAL-2, Block Cipher
22Lynn Margaret Batten Algebraic Attacks Over GF(q). Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF stream ciphers, finite fields, Algebraic attacks, annihilator
22Miodrag J. Mihaljevic, Hideki Imai The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF overdefined systems of equations, hypotheses testing, cryptanalysis, stream ciphers, algebraic attacks, decimation
22Loren D. Olson Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves
22Katsuyuki Okeya, Tsuyoshi Takagi A More Flexible Countermeasure against Side Channel Attacks Using Window Method. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Width-w NAF, Fractional window, Pre-computation Table, Smart Card, Side Channel Attacks, Elliptic Curve Cryptosystem, Memory Constraint
22Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF side channel attacks, elliptic curve cryptosystems, scalar multiplication, window method, memory constraints
22Jacques Patarin Generic Attacks on Feistel Schemes. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Feistel permutations, generic attacks on encryption schemes, Luby-Rackoff theory, pseudo-random permutations
22Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem
22Michael Semanko L-collision Attacks against Randomized MACs. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF L-collision, MACs, randomness, message authentication codes, birthday attacks
22Thomas Johansson 0001, Fredrik Jönsson Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Stream ciphers, Convolutional codes, Correlation attacks
22Thomas Johansson 0001, Fredrik Jönsson Fast Correlation Attacks Based on Turbo Code Techniques. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Stream ciphers, turbo codes, convolutional codes, iterative decoding, correlation attacks
22Jovan Dj. Golic, Renato Menicocci Correlation Attacks on Up/Down Cascades. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF clock-controlled shift registers, up/down and stop/go cascades, cryptanalysis, Stream ciphers, correlation attacks
21Jean-Jacques Quisquater The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? Search on Bibsonomy SSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Laurent Sauvage, Sylvain Guilley, Yves Mathieu Electromagnetic Radiations of FPGAs: High Spatial Resolution Cartography and Attack on a Cryptographic Module. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF EMA, security, FPGA, DPA, SCA, cartography
20Jieren Cheng, Jianping Yin, Yun Liu, Zhiping Cai, Min Li DDoS Attack Detection Algorithm Using IP Address Features. Search on Bibsonomy FAW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IP address features value, support vector machine, network security, distributed denial of service attack
20Adam Barth, Juan Caballero, Dawn Song Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Baruch Awerbuch, Reza Curtmola, David Holmer, Cristina Nita-Rotaru, Herbert Rubens ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, Ad hoc wireless networks, byzantine failures, on-demand routing
20Kui Ren 0001, Wenjing Lou, Yanchao Zhang LEDS: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Wireless sensor networks, integrity and protection
20Jaroslaw Skaruz, Franciszek Seredynski Some Issues on Intrusion Detection in Web Applications. Search on Bibsonomy ICAISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo 0001, San Ling, Huaxiong Wang Cryptanalysis of LASH. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Terrence O'Connor, Douglas S. Reeves Bluetooth Network-Based Misuse Detection. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Meng Yu 0001, Peng Liu 0005, Wanyu Zang, Sushil Jajodia Trusted Recovery. Search on Bibsonomy Secure Data Management in Decentralized Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Nikolaos Chatzis Motivation for Behaviour-Based DNS Security: A Taxonomy of DNS-Related Internet Threats. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Sushil Jajodia Topological analysis of network attack vulnerability. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Omer Berkman, Odelia Moshe Ostrovsky The Unbearable Lightness of PIN Cracking. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF API attack, Financial PIN Processing API, Phantom Withdrawal, VISA PVV, IBM 3624, Insider attack, HSM, EMV, Security API
20Gaoli Wang, Nathan Keller, Orr Dunkelman The Delicate Issues of Addition with Respect to XOR Differences. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SHACAL-1, Block cipher, IDEA, Related-Key Rectangle attack
20Yurong Xu, Yi Ouyang 0001, Zhengyi Le, James Ford, Fillia Makedon Analysis of range-free anchor-free localization in a wsn under wormhole attack. Search on Bibsonomy MSWiM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Vishal Kher, Yongdae Kim Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage. Search on Bibsonomy SRDS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Christos Xenakis Malicious actions against the GPRS technology. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Yacine Bouzida, Frédéric Cuppens Detecting Known and Novel Network Intrusions. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Hyunsoo Song, Taekyoung Kwon 0002 Security Analysis of Secure Password Authentication for Keystroke Dynamics. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Sushil Jajodia Topological analysis of network attack vulnerability. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Zang Li, Wade Trappe, Yanyong Zhang, Badri Nath Robust statistical methods for securing wireless localization in sensor networks. Search on Bibsonomy IPSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Jiejun Kong, Xiaoyan Hong, Yunjung Yi, Joon-Sang Park, Jun Liu 0009, Mario Gerla A secure ad-hoc routing approach using localized self-healing communities. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF community-based security, self-healing ad hoc routing
20Shengqi Yang, Wayne H. Wolf, Narayanan Vijaykrishnan, Dimitrios N. Serpanos, Yuan Xie 0001 Power Attack Resistant Cryptosystem Design: A Dynamic Voltage and Frequency Switching Approach. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Tanja Lange 0001, Pradeep Kumar Mishra SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Hyunsang Choi, Heejo Lee PCAV: Internet Attack Visualization on Parallel Coordinates. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Zhenkai Liang, R. Sekar 0001 Automatic Generation of Buffer Overflow Attack Signatures: An Approach Based on Program Behavior Models. Search on Bibsonomy ACSAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan A Defense-Centric Taxonomy Based on Attack Manifestations. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Nathan Tuck, Brad Calder, George Varghese Hardware and Binary Modification Support for Code Pointer Protection From Buffer Overflow. Search on Bibsonomy MICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Mihui Kim, Hyunjung Na, Kijoon Chae, Hyochan Bang, Jung-Chan Na A Combined Data Mining Approach for DDoS Attack Detection. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Khin Mi Mi Aung, Jong Sou Park A Framework of Software Rejuvenation for Survivability. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Nicolas T. Courtois, Magnus Daum, Patrick Felke On the Security of HFE, HFEv- and Quartz. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF asymmetric cryptography, multivariate cryptanalysis, Gröbner bases, Hidden Field Equation, HFE problem, Quartz, Nessie project, finite fields
20Peng Liu 0005 Architectures for Intrusion Tolerant Database Systems. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
20Richard Lippmann, Joshua W. Haines, David J. Fried, Jonathan Korba, Kumar Das Analysis and Results of the 1999 DARPA Off-Line Intrusion Detection Evaluation. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Pei-Min Chen A Robust Digital Watermarking Based on a Statistic Approach. Search on Bibsonomy ITCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Marc Dacier, O. Sami Saydjari Special Seminar: Intrusion Detection. Search on Bibsonomy FTCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Yechiam Yemini, Apostolos Dailianas, Danilo Florissi MarketNet: Using Virtual Currency to Protect Information Systems. Search on Bibsonomy ECDL The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Adam L. Young, Moti Yung Cryptovirology: Extortion-Based Security Threats and Countermeasures. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
20Tilo Müller, Andreas Dewald, Felix C. Freiling AESSE: a cold-boot resistant implementation of AES. Search on Bibsonomy EUROSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cold boot attacks, streaming SIMD extensions, advanced encryption standard, Linux kernel
20Bimal Viswanath, Ansley Post, P. Krishna Gummadi, Alan Mislove An analysis of social network-based Sybil defenses. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF social network-based Sybil defense, communities, social networks, sybil attacks
20Emmanuelle Dottax, Christophe Giraud 0001, Matthieu Rivain, Yannick Sierra On Second-Order Fault Analysis Resistance for CRT-RSA Implementations. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Second Order, CRT-RSA, Fault Attacks, Countermeasure
20Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust Differential Cluster Analysis. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Differential Cluster Analysis, AES Hardware, Differential Power Analysis, Collision Attacks, Side-channel Cryptanalysis
Displaying result #401 - #500 of 35802 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license