The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for RAID with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-1991 (15) 1992-1993 (17) 1994-1995 (30) 1996-1997 (20) 1998-1999 (52) 2000 (32) 2001 (27) 2002 (33) 2003 (41) 2004 (44) 2005 (55) 2006 (54) 2007 (66) 2008 (79) 2009 (82) 2010 (71) 2011 (63) 2012 (66) 2013 (72) 2014 (64) 2015 (80) 2016 (70) 2017 (57) 2018 (84) 2019 (72) 2020 (62) 2021 (61) 2022 (55) 2023 (87) 2024 (7)
Publication types (Num. hits)
article(327) book(1) incollection(4) inproceedings(1252) phdthesis(7) proceedings(27)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 668 occurrences of 366 keywords

Results
Found 1659 publication records. Showing 1618 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
33Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael D. Bailey The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges. Search on Bibsonomy RAID The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Herbert Bos, Fabian Monrose, Gregory Blanc (eds.) Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@RAID 2015, Kyoto, Japan, November 5, 2015 Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  BibTeX  RDF
33Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder A Formal Framework for Program Anomaly Detection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Johanna Ullrich, Edgar R. Weippl Privacy is Not an Option: Attacking the IPv6 Privacy Extension. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Pinghai Yuan, Qingkai Zeng 0002, Xuhua Ding Hardware-Assisted Fine-Grained Code-Reuse Attack Detection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Meining Nie, Purui Su, Qi Li 0002, Zhi Wang 0004, Lingyun Ying, Jinlong Hu, Dengguo Feng Xede: Practical Exploit Early Detection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla BotWatcher - Transparent and Generic Botnet Tracking. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Johanna Amann, Robin Sommer Providing Dynamic Control to Passive Network Security Monitoring. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Christian Röpke 0001, Thorsten Holz SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Aleksandar Milenkoski, Bryan D. Payne, Nuno Antunes, Marco Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Yang Zhang 0021, Xiaoshan Sun, Yi Deng 0002, Liang Cheng 0004, Shuke Zeng, Yu Fu, Dengguo Feng Improving Accuracy of Static Integer Overflow Detection in Binary. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Qilang Yang, Dimitrios Damopoulos, Georgios Portokalidis WYSISNWIV: What You Scan Is Not What I Visit. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Wenbo Yang, Yuanyuan Zhang 0002, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Thomas Kittel 0001, Sebastian Vogl, Julian Kirsch, Claudia Eckert 0001 Counteracting Data-Only Malware with Code Pointer Examination. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Haitao Xu 0002, Haining Wang, Angelos Stavrou Privacy Risk Assessment on Online Photos. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Clémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann 0001, Olivier Heen, Aurélien Francillon Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Dario Weißer, Johannes Dahse, Thorsten Holz Security Analysis of PHP Bytecode Protection Mechanisms. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Quentin Jacquemart, Pierre-Antoine Vervier, Guillaume Urvoy-Keller, Ernst W. Biersack Demystifying the IP Blackspace. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Junyuan Zeng, Zhiqiang Lin Towards Automatic Inference of Kernel Object Semantics from Binary Code. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Charles Smutz, Angelos Stavrou Preventing Exploits in Microsoft Office Documents Through Content Randomization. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan Probabilistic Inference on Integrity for Access Behavior Based Malware Detection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Nicoló Andronio, Stefano Zanero, Federico Maggi HelDroid: Dissecting and Detecting Mobile Ransomware. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Yangyi Chen, Vincent Bindschaedler, XiaoFeng Wang 0001, Stefan Berger, Dimitrios E. Pendarakis Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev Ensemble Learning for Low-Level Hardware-Supported Malware Detection. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Ryan M. Gerdes, Saptarshi Mallick Physical-Layer Detection of Hardware Keyloggers. Search on Bibsonomy RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Nolan P. Donoghue, Bridger Hahn, Helen Xu 0001, Thomas M. Kroeger, David Zage, Rob Johnson Tracking Network Events with Write Optimized Data Structures. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Nour Moustafa, Jill Slay The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Panagiotis Papadopoulos, Thanasis Petsas, Giorgos Christou, Giorgos Vasiliadis MAD: A Middleware Framework for Multi-step Attack Detection. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama Text-Mining Approach for Estimating Vulnerability Score. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Ayumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki INTERCEPT+: SDN Support for Live Migration-Based Honeypots. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Ichiro Shimada, Yu Tsuda, Masashi Eto, Daisuke Inoue Using Bayesian Decision Making to Detect Slow Scans. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Iasonas Polakis, Panagiotis Ilia, Zacharias Tzermias, Sotiris Ioannidis, Paraskevi Fragopoulou Social Forensics: Searching for Needles in Digital Haystacks. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Anael Bonneton, Daniel Migault, Stéphane Sénécal, Nizar Kheir DGA Bot Detection with Time Series Decision Trees. Search on Bibsonomy BADGERS@RAID The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
33Angelos Stavrou, Herbert Bos, Georgios Portokalidis (eds.) Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Marc Kührer, Christian Rossow, Thorsten Holz Paint It Black: Evaluating the Effectiveness of Malware Blacklists. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo Synthetic Data Generation and Defense in Depth Measurement of Web Applications. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz Evaluating the Effectiveness of Current Anti-ROP Defenses. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis Dynamic Reconstruction of Relocation Information for Stripped Binaries. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Apurva Kumar A Lightweight Formal Approach for Analyzing Security of Web Protocols. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo Unsupervised Anomaly-Based Malware Detection Using Hardware Features. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen 0004 Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33José Benito Camiña, Jorge Rodríguez-Ruiz, Raúl Monroy Towards a Masquerade Detection System Based on User's Tasks. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Hamed Okhravi, James Riordan, Kevin M. Carter 0001 Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Michael Weissbacher, Tobias Lauinger, William K. Robertson Why Is CSP Failing? Trends and Challenges in CSP Adoption. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo Measuring Drive-by Download Defense in Depth. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Johanna Amann, Seth Hall, Robin Sommer Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Ali Abbasi 0002, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle On Emulation-Based Network Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth 0001, Berk Sunar Wait a Minute! A fast, Cross-VM Attack on AES. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Jacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Hassan Khan, Aaron Atwater, Urs Hengartner A Comparative Evaluation of Implicit Authentication Schemes. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim 0001 Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Noomene Ben Henda, Karl Norrman Formal Analysis of Security Procedures in LTE - A Feasibility Study. Search on Bibsonomy RAID The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright (eds.) Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Johannes Hoffmann, Stephan Neumann, Thorsten Holz Mobile Malware Detection Based on Energy Fingerprints - A Dead End? Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Denis Bueno, Kevin J. Compton, Karem A. Sakallah, Michael D. Bailey Detecting Traditional Packers, Decisively. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Nan Jiang 0017, Yu Jin 0001, Ann Skudlark, Zhi-Li Zhang Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu API Chaser: Anti-analysis Resistant Malware Analyzer. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee Connected Colors: Unveiling the Structure of Criminal Networks. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33M. Zubair Rafique, Juan Caballero FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Patrick Stewin A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Arun Viswanathan, Kymie Tan, Clifford Neuman Deconstructing the Assessment of Anomaly-based Intrusion Detectors. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Jakob Fritz, Corrado Leita, Michalis Polychronakis Server-Side Code Injection Attacks: A Historical Perspective. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Mariano Graziano, Andrea Lanzi, Davide Balzarotti Hypervisor Memory Forensics. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Bin Zhao, Peng Liu 0005 Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Christian Wressnegger, Frank Boldewin, Konrad Rieck Deobfuscating Embedded Malware Using Probable-Plaintext Attacks. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33David F. Oswald, Bastian Richter 0001, Christof Paar Side-Channel Attacks on the Yubikey 2 One-Time Password Generator. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Christoph Egger 0001, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna Practical Attacks against the I2P Network. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis CloudFence: Data Flow Tracking as a Cloud Service. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Martin Johns, Sebastian Lekies Tamper-Resistant LikeJacking Protection. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi Active Credential Leakage for Observing Web-Based Attack Cycle. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Kapil Singh Practical Context-Aware Permission Control for Hybrid Mobile Applications. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Xi Xiong, Peng Liu 0005 SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein Systematic Analysis of Defenses against Return-Oriented Programming. Search on Bibsonomy RAID The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33Davide Balzarotti, Salvatore J. Stolfo, Marco Cova (eds.) Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro, Luis Javier García-Villalba Concurrency Optimization for NIDS (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Mark Vella, Sotirios Terzis, Marc Roper Distress Detection (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Jialong Zhang, Chao Yang 0022, Zhaoyan Xu, Guofei Gu PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33B. Amann 0001, Robin Sommer, Aashish Sharma, Seth Hall A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Jennifer Mankin, David R. Kaeli Dione: A Flexible Disk Monitoring and Analysis Framework. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Abhinav Srivastava, Himanshu Raj, Jonathon T. Giffin, Paul England Trusted VM Snapshots in Untrusted Cloud Infrastructures. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Daisuke Mashima, Alvaro A. Cárdenas Evaluating Electricity Theft Detectors in Smart Grid Networks. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Dongkyun Ahn, Gyungho Lee A Memory Access Validation Scheme against Payload Injection Attacks. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Jie Chu, Zihui Ge, Richard Huber, Ping Ji 0002, Jennifer Yates, Yung-Chao Yu ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Jinyu Wu, Lihua Yin, Binxing Fang Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Ahmed F. Shosha, Joshua James, Chen-Ching Liu, Pavel Gladyshev Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract). Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
33Victor C. Valgenti, Jatin Chhugani, Yan Sun 0006, Nadathur Satish, Min Sik Kim, Changkyu Kim, Pradeep Dubey GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors. Search on Bibsonomy RAID The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 1618 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license