The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Malicious with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1990 (17) 1991-1994 (15) 1995-1996 (19) 1997 (16) 1998 (34) 1999 (27) 2000 (47) 2001 (76) 2002 (100) 2003 (164) 2004 (264) 2005 (382) 2006 (463) 2007 (508) 2008 (584) 2009 (410) 2010 (169) 2011 (158) 2012 (173) 2013 (182) 2014 (208) 2015 (229) 2016 (261) 2017 (276) 2018 (369) 2019 (348) 2020 (394) 2021 (441) 2022 (395) 2023 (443) 2024 (125)
Publication types (Num. hits)
article(2248) book(8) data(5) incollection(29) inproceedings(4933) phdthesis(62) proceedings(12)
Venues (Conferences, Journals, ...)
CoRR(363) MALWARE(192) IACR Cryptol. ePrint Arch.(98) IEEE Access(90) ACSAC(85) CCS(70) Comput. Secur.(61) ICC(58) ARES(55) SAC(50) RAID(43) DSN(39) GLOBECOM(37) Sensors(37) ICDCS(35) Wirel. Pers. Commun.(35) More (+10 of total 1903)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3452 occurrences of 1510 keywords

Results
Found 7297 publication records. Showing 7297 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Yogesh Kalyani, Carlisle Adams Privacy Negotiation using a Mobile Agent. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Henry Tsai, Aaron Harwood A Scalable Anonymous Server Overlay Network. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Miklós Ajtai, Cynthia Dwork, Larry J. Stockmeyer An Architecture for Provably Secure Computation. Search on Bibsonomy LATIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Yue Zhang 0001, Kwei-Jay Lin, Raymond Klefstad DIRECT: A Robust Distributed Broker Framework for Trust and Reputation Management. Search on Bibsonomy CEC/EEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16David Whyte, Paul C. van Oorschot, Evangelos Kranakis Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan Malware prevalence in the KaZaA file-sharing network. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF KaZaA, virus prevalence, peer-to-peer
16William Sears, Zhen Yu, Yong Guan An Adaptive Reputation-based Trust Framework for Peer-to-Peer Applications. Search on Bibsonomy NCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Claudiu Duma, Nahid Shahmehri, Germano Caronni Dynamic Trust Metrics for Peer-to-Peer Systems. Search on Bibsonomy DEXA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Wei Yu 0003, Yan Sun 0001, K. J. Ray Liu HADOF: defense against routing disruptions in mobile ad hoc networks. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Joon Heo, Choong Seon Hong An Efficient and Secured Media Access Mechanism Using the Intelligent Coordinator in Low-Rate WPAN Environment. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Michael Venable, Mohamed R. Chouchane, Md. Enamul Karim, Arun Lakhotia Analyzing Memory Accesses in Obfuscated x86 Executables. Search on Bibsonomy DIMVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Leitao Guo, Shoubao Yang, Jing Wang, Jinyang Zhou Trust Model Based on Similarity Measure of Vectors in P2P Networks. Search on Bibsonomy GCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Gayatri Swamynathan, Ben Y. Zhao, Kevin C. Almeroth Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Matt Lepinski, Silvio Micali, Abhi Shelat Collusion-free protocols. Search on Bibsonomy STOC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF steganography, secure function evaluation
16MyungJoo Ham, Gul Agha ARA: A Robust Audit to Prevent Free-Riding in P2P Networks. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Jin Wook Byun, Dong Hoon Lee 0001, Jongin Lim 0001 Password-Based Group Key Exchange Secure Against Insider Guessing Attacks. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ad hoc network, Intrusion Detection, Network Security, Formal reasoning
16Jonathan W. Butts, Robert F. Mills, Rusty O. Baldwin Developing an Insider Threat Model Using Functional Decomposition. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Farooq Anjum, Rajesh Talpade LiPaD: lightweight packet drop detection for ad hoc networks. Search on Bibsonomy VTC Fall (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Yi Hu, Brajendra Panda A data mining approach for database intrusion detection. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data mining, intrusion detection, database security
16Vamsi Kambhampati, Indrajit Ray, Eunjong Kim A Secure Checkpointing Protocol for Survivable Server Design. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Nathan Curtis, Reihaneh Safavi-Naini, Willy Susilo X2Rep: Enhanced Trust Semantics for the XRep Protocol. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pariente A reputation-based trust management system for P2P networks. Search on Bibsonomy CCGRID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Saurabh Ganeriwal, Mani B. Srivastava Reputation-based framework for high integrity sensor networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF bayesian formulation, security, sensor networks, cryptography, trust, framework, reputation
16Christopher Krügel, William K. Robertson, Giovanni Vigna Detecting Kernel-Level Rootkits Through Binary Analysis. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Mudhakar Srivatsa, Ling Liu 0001 Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Jinshen Wang, Yuewei Dai, Stefan Thiemert, Zhiquan Wang A Feature-Watermarking Scheme for JPEG Image Authentication. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF semi-fragile, authentication, watermarking, features
16Danilo Bruschi, D. Fabris, V. Glave, Emilia Rosti How to unwittingly sign non-repudiable documents with Java applications. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Meng Yu 0001, Peng Liu 0005, Wanyu Zang Multi-Version Attack Recovery for Workflow System. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Christopher Krügel, Thomas Toth, Engin Kirda Service specific anomaly detection for network intrusion detection. Search on Bibsonomy SAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly eetection, intrusion eetection, network security
16Dirk Grunwald, Soraya Ghiasi Microarchitectural denial of service: insuring microarchitectural fairness. Search on Bibsonomy MICRO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Biljana Cubaleska, Weidong Qiu, Markus Schneider 0002 How to Play Sherlock Holmes in the World of Mobile Agents. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Biljana Cubaleska, Markus Schneider 0002 A Method for Protecting Mobile Agents against Denial of Service Attacks. Search on Bibsonomy CIA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Amitabha Das, Yao Gongxuan A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment. Search on Bibsonomy ISEC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Christoph C. Michael, Anup K. Ghosh Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary Report. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF data mining, machine learning, finite automata, feature detection
16Dirk Westhoff, Markus Schneider 0002, Claus Unger, Firoz Kaderali Protecting a Mobile Agent's Route against Collusions. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Yacov Yacobi, Zahava Shmuely On Key Distribution Systems. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
15Chu-Hsing Lin, Jung-Chun Liu, Ching-Ru Chen Access Log Generator for Analyzing Malicious Website Browsing Behaviors. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Vítor Estêvão Silva Souza, John Mylopoulos Monitoring and Diagnosing Malicious Attacks with Autonomic Software. Search on Bibsonomy ER The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Wei-Hung Lin, Yuh-Rau Wang, Shi-Jinn Horng, Tzong-Wann Kao Digital Image Watermarking for Malicious Attack. Search on Bibsonomy ICA3PP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF nongeometric attacks, watermarking, Copyright protection, forward error correction, geometric attacks
15Mohsen Saffarian, Matei Ciobanu Morogan A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AntNet, free-roaming forward ants, misdirection threat
15Iftach Haitner Semi-honest to Malicious Oblivious Transfer - The Black-Box Way. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Jin-Cherng Lin, Jan-Min Chen, Cheng-Hsiung Liu An Automatic Mechanism for Sanitizing Malicious Injection. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Marc Sánchez Artigas, Pedro García López, Antonio Fernandez Gómez-Skarmeta Bypass: Providing secure DHT routing through bypassing malicious peers. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Changguang Wang, Xu Bai, Shuai Fu, Jianfeng Ma 0001 Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Raimund Ubar, Sergei Devadze, Maksim Jenihhin, Jaan Raik, Gert Jervan, Peeter Ellervee Hierarchical Calculation of Malicious Faults for Evaluating the Fault-Tolerance. Search on Bibsonomy DELTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF high-level decision diagrams, fault tolerance, fault simulation
15Christine Laurendeau, Michel Barbeau Hyperbolic location estimation of malicious nodes in mobile WiFi/802.11 networks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. Search on Bibsonomy Australasian Conference on Artificial Intelligence The full citation details ... 2008 DBLP  DOI  BibTeX  RDF density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security
15Eric Filiol Formalisation and implementation aspects of K -ary (malicious) codes. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cohen model, k-ary malware, Detection problem, Metamorphism, Code interaction, Polymorphism
15Martin Rehák, Michal Pechoucek, Jan Tozicka, Magdalena Prokopová, David Medvigy, Jiri Novotný Agent-Based Network Protection Against Malicious Code. Search on Bibsonomy CEEMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Stefan Böttcher, Sebastian Obermeier 0001 Secure Anonymous Union Computation Among Malicious Partners. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Xiaojing Ma 0002, Zhitang Li, Yao Li 0002, Jiping Zhang 0002 A Scalable Multicast Key Management to Expel a Malicious Receiver in MARKS. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Rakesh Nune, Pamela M. Murray-Tuite Comparision of potential paths selected by a malicious entity with hazardous materials: minimization of time vs. minimization of distance. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Daniel-Ioan Curiac, Ovidiu Banias, Florin Dragan 0002, Constantin Volosencu, Octavian Dranga Malicious Node Detection in Wireless Sensor Networks Using an Autoregression Technique. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15José Fonseca 0002, Marco Vieira, Henrique Madeira Detecting Malicious SQL. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Intrusion Detection, Web applications
15Jens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt Key substitution attacks revisited: Taking into account malicious signers. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key substitution, Cryptanalysis, Digital signature
15Jaehyuck Lim, Hyobin Lee, Sangyoun Lee, Jaihie Kim Invertible Watermarking Algorithm with Detecting Locations of Malicious Manipulation for Biometric Image Authentication. Search on Bibsonomy ICB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Yu-Lun Huang, F. S. Ho, Hsin-Yi Tsai, H. M. Kao A control flow obfuscation method to discourage malicious tampering of software codes. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF control flow obfuscation, reverse engineering, tamper-resistance, intellectual property protection, software obfuscation
15Anindya Chakraborty, Manoj K. Garg, Arun K. Majumdar, Shamik Sural Online Recovery of a Distributed Database from Malicious Attack. Search on Bibsonomy IDEAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Online Recovery, Transaction dependency graph, Topics: Distributed and Parallel Databases, Privacy and security in database, Distributed Database, Damage Assessment
15Mun Choon Chan, Ee-Chien Chang, Liming Lu, Peng Song Ngiam Effect of Malicious Synchronization. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Denial of Service (DDoS) attacks, low rate DDoS attack, herding, synchronization, Network security, periodicity
15Rajendra V. Boppana, Saman Desilva Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Seung-Jae Yoo, Kuinam J. Kim Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Hyung-Woo Lee SVM Based Packet Marking Technique for Traceback on Malicious DDoS Traffic. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Boyun Zhang, Jianping Yin, Wensheng Tang, Jingbo Hao, Dingxing Zhang Unknown Malicious Codes Detection Based on Rough Set Theory and Support Vector Machine. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Joon S. Park, Gautam Jayaprakash, Joseph Giordano Component Integrity Check and Recovery Against Malicious Codes. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Boyun Zhang, Jianping Yin, Jingbo Hao, Shulin Wang, Dingxing Zhang New Malicious Code Detection Based on N-Gram Analysis and Rough Set Theory. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15István Zsolt Berta, Levente Buttyán, István Vajda A Framework for the Revocation of Unintended Digital Signatures Initiated by Malicious Terminals. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, privacy, Electronic commerce, authorization
15Bradley A. Malin, Edoardo M. Airoldi, Samuel Edoho-Eket, Yiheng Li Configurable Security Protocols for Multi-party Data Analysis with Malicious Participants. Search on Bibsonomy ICDE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Donald J. Reifer, Pranjali Baxi, Fabio Hirata, Jonathan Schifman, Ricky Tsao Addressing Malicious Code in COTS: A Protection Framework. Search on Bibsonomy ICCBSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Antonio Fernández 0001, Chryssis Georgiou, Luis López, Agustín Santos Reliably Executing Tasks in the Presence of Malicious Processors. Search on Bibsonomy DISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Oystein Hallaraker, Giovanni Vigna Detecting Malicious JavaScript Code in Mozilla. Search on Bibsonomy ICECCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Web Applications, JavaScript, Mobile Code
15Jeffrey B. Colombe, Gregory Stephens Statistical profiling and visualization for detection of malicious insider attacks on computer networks. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF human-computer interaction, information visualization, anomaly detection, cognitive load
15Lynn Choi, Yong Shin Enforcement of Architectural Safety Guards to Deter Malicious Code Attacks through Buffer Overflow Vulnerabilities. Search on Bibsonomy ARCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Peng Hong, Wang Jun, Tiefeng Wu, Dongna Zhang A malicious email detection method based on support vector machine. Search on Bibsonomy ICARCV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Prashant Dewan, Partha Dasgupta, Amiya Bhattacharya On Using Reputations in Ad hoc Networks to Counter Malicious Nodes. Search on Bibsonomy ICPADS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Jianyun Xu, Andrew H. Sung, Patrick Chavez, Srinivas Mukkamala Polymorphic Malicious Executable Scanner by API Sequence Analysis. Search on Bibsonomy HIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Kwai Ki Leung, Kam-Wing Ng Detection of Malicious Host Attacks by Tracing with Randomly Selected Hosts. Search on Bibsonomy EUC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Evgueni Dodonov, Joelle Quaini Sousa, Hélio Crestana Guardia GridBox: securing hosts from malicious and greedy applications. Search on Bibsonomy Middleware for Grid Computing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Venkata N. Padmanabhan, Daniel R. Simon Secure traceroute to detect faulty or malicious routing. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Yi Hu, Brajendra Panda Identification of Malicious Transactions in Database Systems. Search on Bibsonomy IDEAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Oscar Esparza, Marcel Fernandez, Miguel Soriano, Jose L. Muñoz, Jordi Forné Mobile Agent Watermarking and Fingerprinting: Tracing Malicious Hosts. Search on Bibsonomy DEXA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Frank Apap, Andrew Honig, Shlomo Hershkop, Eleazar Eskin, Salvatore J. Stolfo Detecting Malicious Software by Monitoring Anomalous Windows Registry Accesses. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Frank Adelstein, Matthew Stillerman, Dexter Kozen Malicious Code Detection for Open Firmware. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Mark Perry 0001, Qin Zhang SITA: Protecting Internet Trade Agents from Malicious Hosts. Search on Bibsonomy MATA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Fritz Hohl Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts. Search on Bibsonomy Mobile Agents and Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
15Dana Angluin, Martins Krikis Learning with Malicious Membership Queries and Exceptions (Extended Abstract). Search on Bibsonomy COLT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
15Farhad Farmani, Mohssen Abbasi Jannat-Abad, Reza Berangi Detection of SSDF Attack Using SVDD Algorithm in Cognitive Radio Networks. Search on Bibsonomy CICSyN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Support Vector Data ?, Spectrum Sensing Data Falsification, Cognitive radio network, Description, Malicious nodes
15Charles P. Pfleeger Crypto: Not Just for the Defensive Team. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Morris worm, polymorphic viruses, packers, Virut, Virtob, Conficker, cryptography, cryptanalysis, encryption, malicious code, security & privacy
15Marin Bertier, Achour Mostéfaoui, Gilles Trédan Low-Cost Secret-Sharing in Sensor Networks. Search on Bibsonomy HASE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Malicious Behavior, Sensor Network, Reliability, Distributed Algorithm, Wireless Communication, Resiliency
15Raja Khurram Shahzad, Syed Imran Haider, Niklas Lavesson Detection of Spyware by Mining Executable Files. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Spyware Detection, Data Mining, Feature Extraction, Malicious Code
15Katerina Goseva-Popstojanova, Brandon Miller, Risto Pantev, Ana Dimitrijevikj Empirical Analysis of Attackers Activity on Multi-tier Web Systems. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF port and vulnerability scans, empirical analysis of malicious traffic, attacks, Web-based systems, distribution fitting
15Sai Ho Kwok, Anthony C. T. Lai, Jason C. K. Yeung A study of online service and information exposure of public companies. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious hackers, public company, public server, web server, ports, cyber security
15Yuna Kim, Jong Kim 0001, Junghei You, Heejae Park Exclusion of Forged Files from Multi-source Downloadable P2P Systems. Search on Bibsonomy AINA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF forged file, malicious peer, two-layer hierarhical network, P2P, forgery detection
15Pattaraporn Klangpraphant, Pattarasinee Bhattarakosol e-mail authentication system: a spam filtering for smart senders. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF green mail, malicious e-mails, aspects, spam filtering
15Chia-Mei Chen, Wan-Yi Tsai, Hsiao-Chung Lin Anomaly Behavior Analysis for Web Page Inspection. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious webpage, Anomaly behavior, Drive-by download
15Natarajan Jaisankar, R. Saravanan 0001, K. Durai Swamy An Agent Based Security Framework for Protecting Routing Layer Operations in MANET. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network-layer security, honesty rate, routing, mobile ad hoc network, mobile agents, routing protocols, public key, packet forwarding, malicious nodes
15Sheikh Iqbal Ahamed, Munirul M. Haque, Nilothpal Talukder Service sharing with trust in pervasive environment: now it's time to break the jinx. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malicious recommendation, student's t-distribution, access control, trust model
15Olivier Thonnard, Jouni Viinikka, Corrado Leita, Marc Dacier Automating the Analysis of Honeypot Data (Extended Abstract). Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internet threats analysis, malicious behavior characterization, Honeypots
15Ruben E. Brown AWE: improving software analysis through modular integration of static and dynamic analyses. Search on Bibsonomy PASTE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF malicious software analysis, static analysis, dynamic analysis
15Qiong Ren, Yi Mu 0001, Willy Susilo SEFAP: An Email System for Anti-Phishing. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malicious Email, Digital Signature, Anti-Phishing
Displaying result #401 - #500 of 7297 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license