|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 668 occurrences of 366 keywords
|
|
|
Results
Found 1659 publication records. Showing 1618 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
33 | Kurt Thomas, Rony Amira, Adi Ben-Yoash, Ori Folger, Amir Hardon, Ari Berger, Elie Bursztein, Michael D. Bailey |
The Abuse Sharing Economy: Understanding the Limits of Threat Exchanges. |
RAID |
2016 |
DBLP DOI BibTeX RDF |
|
33 | Herbert Bos, Fabian Monrose, Gregory Blanc (eds.) |
Research in Attacks, Intrusions, and Defenses - 18th International Symposium, RAID 2015, Kyoto, Japan, November 2-4, 2015, Proceedings |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | |
4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS@RAID 2015, Kyoto, Japan, November 5, 2015 |
BADGERS@RAID |
2015 |
DBLP BibTeX RDF |
|
33 | Xiaokui Shu, Danfeng (Daphne) Yao, Barbara G. Ryder |
A Formal Framework for Program Anomaly Detection. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Johanna Ullrich, Edgar R. Weippl |
Privacy is Not an Option: Attacking the IPv6 Privacy Extension. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Lukas Krämer, Johannes Krupp, Daisuke Makita, Tomomi Nishizoe, Takashi Koide, Katsunari Yoshioka, Christian Rossow |
AmpPot: Monitoring and Defending Against Amplification DDoS Attacks. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Pinghai Yuan, Qingkai Zeng 0002, Xuhua Ding |
Hardware-Assisted Fine-Grained Code-Reuse Attack Detection. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Meining Nie, Purui Su, Qi Li 0002, Zhi Wang 0004, Lingyun Ying, Jinlong Hu, Dengguo Feng |
Xede: Practical Exploit Early Detection. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Rahul Murmuria, Angelos Stavrou, Daniel Barbará, Dan Fleck |
Continuous Authentication on Mobile Devices Using Power Consumption, Touch Gestures and Physical Movement of Users. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Mohamed Elsabagh, Daniel Barbará, Dan Fleck, Angelos Stavrou |
Radmin: Early Detection of Application-Level Resource Exhaustion and Starvation Attacks. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Thomas Barabosch, Adrian Dombeck, Khaled Yakdan, Elmar Gerhards-Padilla |
BotWatcher - Transparent and Generic Botnet Tracking. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Johanna Amann, Robin Sommer |
Providing Dynamic Control to Passive Network Security Monitoring. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Christian Röpke 0001, Thorsten Holz |
SDN Rootkits: Subverting Network Operating Systems of Software-Defined Networks. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Aleksandar Milenkoski, Bryan D. Payne, Nuno Antunes, Marco Vieira, Samuel Kounev, Alberto Avritzer, Matthias Luft |
Evaluation of Intrusion Detection Systems in Virtualized Environments Using Attack Injection. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Yang Zhang 0021, Xiaoshan Sun, Yi Deng 0002, Liang Cheng 0004, Shuke Zeng, Yu Fu, Dengguo Feng |
Improving Accuracy of Static Integer Overflow Detection in Binary. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Giancarlo Pellegrino, Constantin Tschürtz, Eric Bodden, Christian Rossow |
jÄk: Using Dynamic Analysis to Crawl and Test Modern Web Applications. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Jaehyun Nam, Muhammad Jamshed, Byungkwon Choi, Dongsu Han, KyoungSoo Park |
Haetae: Scaling the Performance of Network Intrusion Detection with Many-Core Processors. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Qilang Yang, Dimitrios Damopoulos, Georgios Portokalidis |
WYSISNWIV: What You Scan Is Not What I Visit. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Wenbo Yang, Yuanyuan Zhang 0002, Juanru Li, Junliang Shu, Bodong Li, Wenjun Hu, Dawu Gu |
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Thomas Kittel 0001, Sebastian Vogl, Julian Kirsch, Claudia Eckert 0001 |
Counteracting Data-Only Malware with Code Pointer Examination. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Haitao Xu 0002, Haining Wang, Angelos Stavrou |
Privacy Risk Assessment on Online Photos. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Clémentine Maurice, Nicolas Le Scouarnec, Christoph Neumann 0001, Olivier Heen, Aurélien Francillon |
Reverse Engineering Intel Last-Level Cache Complex Addressing Using Performance Counters. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Dario Weißer, Johannes Dahse, Thorsten Holz |
Security Analysis of PHP Bytecode Protection Mechanisms. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Quentin Jacquemart, Pierre-Antoine Vervier, Guillaume Urvoy-Keller, Ernst W. Biersack |
Demystifying the IP Blackspace. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Junyuan Zeng, Zhiqiang Lin |
Towards Automatic Inference of Kernel Object Semantics from Binary Code. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Charles Smutz, Angelos Stavrou |
Preventing Exploits in Microsoft Office Documents Through Content Randomization. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan |
Probabilistic Inference on Integrity for Access Behavior Based Malware Detection. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Nicoló Andronio, Stefano Zanero, Federico Maggi |
HelDroid: Dissecting and Detecting Mobile Ransomware. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Yangyi Chen, Vincent Bindschaedler, XiaoFeng Wang 0001, Stefan Berger, Dimitrios E. Pendarakis |
Elite: Automatic Orchestration of Elastic Detection Services to Secure Cloud Hosting. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Khaled N. Khasawneh, Meltem Ozsoy, Caleb Donovick, Nael B. Abu-Ghazaleh, Dmitry V. Ponomarev |
Ensemble Learning for Low-Level Hardware-Supported Malware Detection. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Ryan M. Gerdes, Saptarshi Mallick |
Physical-Layer Detection of Hardware Keyloggers. |
RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Nolan P. Donoghue, Bridger Hahn, Helen Xu 0001, Thomas M. Kroeger, David Zage, Rob Johnson |
Tracking Network Events with Write Optimized Data Structures. |
BADGERS@RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Nour Moustafa, Jill Slay |
The Significant Features of the UNSW-NB15 and the KDD99 Data Sets for Network Intrusion Detection Systems. |
BADGERS@RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Pernelle Mensah, Gregory Blanc, Kazuya Okada, Daisuke Miyamoto, Youki Kadobayashi |
AJNA: Anti-phishing JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS. |
BADGERS@RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Panagiotis Papadopoulos, Thanasis Petsas, Giorgos Christou, Giorgos Vasiliadis |
MAD: A Middleware Framework for Multi-step Attack Detection. |
BADGERS@RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Yasuhiro Yamamoto, Daisuke Miyamoto, Masaya Nakayama |
Text-Mining Approach for Estimating Vulnerability Score. |
BADGERS@RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Ayumu Hirata, Daisuke Miyamoto, Masaya Nakayama, Hiroshi Esaki |
INTERCEPT+: SDN Support for Live Migration-Based Honeypots. |
BADGERS@RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Ichiro Shimada, Yu Tsuda, Masashi Eto, Daisuke Inoue |
Using Bayesian Decision Making to Detect Slow Scans. |
BADGERS@RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Iasonas Polakis, Panagiotis Ilia, Zacharias Tzermias, Sotiris Ioannidis, Paraskevi Fragopoulou |
Social Forensics: Searching for Needles in Digital Haystacks. |
BADGERS@RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Anael Bonneton, Daniel Migault, Stéphane Sénécal, Nizar Kheir |
DGA Bot Detection with Time Series Decision Trees. |
BADGERS@RAID |
2015 |
DBLP DOI BibTeX RDF |
|
33 | Angelos Stavrou, Herbert Bos, Georgios Portokalidis (eds.) |
Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014. Proceedings |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Marc Kührer, Christian Rossow, Thorsten Holz |
Paint It Black: Evaluating the Effectiveness of Malware Blacklists. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Nathaniel Boggs, Hang Zhao, Senyao Du, Salvatore J. Stolfo |
Synthetic Data Generation and Defense in Depth Measurement of Web Applications. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Felix Schuster, Thomas Tendyck, Jannik Pewny, Andreas Maaß, Martin Steegmanns, Moritz Contag, Thorsten Holz |
Evaluating the Effectiveness of Current Anti-ROP Defenses. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis |
Dynamic Reconstruction of Relocation Information for Stripped Binaries. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Apurva Kumar |
A Lightweight Formal Approach for Analyzing Security of Web Protocols. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Kartik Nayak, Daniel Marino, Petros Efstathopoulos, Tudor Dumitras |
Some Vulnerabilities Are Different Than Others - Studying Vulnerabilities and Attack Surfaces in the Wild. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Zhaoyan Xu, Jialong Zhang, Guofei Gu, Zhiqiang Lin |
GoldenEye: Efficiently and Effectively Unveiling Malware's Targeted Environment. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Enrico Budianto, Yaoqi Jia, Xinshu Dong, Prateek Saxena, Zhenkai Liang |
You Can't Be Me: Enabling Trusted Paths and User Sub-origins in Web Browsers. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Adrian Tang, Simha Sethumadhavan, Salvatore J. Stolfo |
Unsupervised Anomaly-Based Malware Detection Using Hardware Features. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Yinzhi Cao, Yan Shoshitaishvili, Kevin Borgolte, Christopher Krügel, Giovanni Vigna, Yan Chen 0004 |
Protecting Web-Based Single Sign-on Protocols against Relying Party Impersonation Attacks through a Dedicated Bi-directional Authenticated Secure Channel. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | José Benito Camiña, Jorge Rodríguez-Ruiz, Raúl Monroy |
Towards a Masquerade Detection System Based on User's Tasks. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Hamed Okhravi, James Riordan, Kevin M. Carter 0001 |
Quantitative Evaluation of Dynamic Platform Techniques as a Defensive Mechanism. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Michael Weissbacher, Tobias Lauinger, William K. Robertson |
Why Is CSP Failing? Trends and Challenges in CSP Adoption. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Nathaniel Boggs, Senyao Du, Salvatore J. Stolfo |
Measuring Drive-by Download Defense in Depth. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Johanna Amann, Seth Hall, Robin Sommer |
Count Me In: Viable Distributed Summary Statistics for Securing High-Speed Networks. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Ali Abbasi 0002, Jos Wetzels, Wouter Bokslag, Emmanuele Zambon, Sandro Etalle |
On Emulation-Based Network Intrusion Detection Systems. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Gorka Irazoqui Apecechea, Mehmet Sinan Inci, Thomas Eisenbarth 0001, Berk Sunar |
Wait a Minute! A fast, Cross-VM Attack on AES. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Jacopo Corbetta, Luca Invernizzi, Christopher Krügel, Giovanni Vigna |
Eyes of a Human, Eyes of a Program: Leveraging Different Views of the Web for Analysis and Detection. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Hassan Khan, Aaron Atwater, Urs Hengartner |
A Comparative Evaluation of Implicit Authentication Schemes. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Kevin D. Bowers, Catherine Hart, Ari Juels, Nikos Triandopoulos |
PillarBox: Combating Next-Generation Malware with Fast Forward-Secure Logging. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Il-Gu Lee, Hyunwoo Choi, Yongdae Kim, Seungwon Shin, Myungchul Kim 0001 |
Run Away If You Can: - Persistent Jamming Attacks against Channel Hopping Wi-Fi Devices in Dense Networks. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Noomene Ben Henda, Karl Norrman |
Formal Analysis of Security Procedures in LTE - A Feasibility Study. |
RAID |
2014 |
DBLP DOI BibTeX RDF |
|
33 | Salvatore J. Stolfo, Angelos Stavrou, Charles V. Wright (eds.) |
Research in Attacks, Intrusions, and Defenses - 16th International Symposium, RAID 2013, Rodney Bay, St. Lucia, October 23-25, 2013. Proceedings |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Johannes Hoffmann, Stephan Neumann, Thorsten Holz |
Mobile Malware Detection Based on Energy Fingerprints - A Dead End? |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Denis Bueno, Kevin J. Compton, Karem A. Sakallah, Michael D. Bailey |
Detecting Traditional Packers, Decisively. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Nan Jiang 0017, Yu Jin 0001, Ann Skudlark, Zhi-Li Zhang |
Understanding SMS Spam in a Large Cellular Network: Characteristics, Strategies and Defenses. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Yuhei Kawakoya, Makoto Iwamura, Eitaro Shioji, Takeo Hariu |
API Chaser: Anti-analysis Resistant Malware Analyzer. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee |
Connected Colors: Unveiling the Structure of Criminal Networks. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | M. Zubair Rafique, Juan Caballero |
FIRMA: Malware Clustering and Network Signature Generation with Mixed Network Behaviors. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Patrick Stewin |
A Primitive for Revealing Stealthy Peripheral-Based Attacks on the Computing Platform's Main Memory. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Arun Viswanathan, Kymie Tan, Clifford Neuman |
Deconstructing the Assessment of Anomaly-based Intrusion Detectors. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Jakob Fritz, Corrado Leita, Michalis Polychronakis |
Server-Side Code Injection Attacks: A Historical Perspective. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Mariano Graziano, Andrea Lanzi, Davide Balzarotti |
Hypervisor Memory Forensics. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Bin Zhao, Peng Liu 0005 |
Behavior Decomposition: Aspect-Level Browser Extension Clustering and Its Security Implications. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Christian Wressnegger, Frank Boldewin, Konrad Rieck |
Deobfuscating Embedded Malware Using Probable-Plaintext Attacks. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | David F. Oswald, Bastian Richter 0001, Christof Paar |
Side-Channel Attacks on the Yubikey 2 One-Time Password Generator. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Tobias Lauinger, Kaan Onarlioglu, Chaabane Abdelberi, Engin Kirda, William K. Robertson, Mohamed Ali Kâafar |
Holiday Pictures or Blockbuster Movies? Insights into Copyright Infringement in User Uploads to One-Click File Hosters. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Christoph Egger 0001, Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna |
Practical Attacks against the I2P Network. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Vasilis Pappas, Vasileios P. Kemerlis, Angeliki Zavou, Michalis Polychronakis, Angelos D. Keromytis |
CloudFence: Data Flow Tracking as a Cloud Service. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Blaine Stancill, Kevin Z. Snow, Nathan Otterness, Fabian Monrose, Lucas Davi, Ahmad-Reza Sadeghi |
Check My Profile: Leveraging Static Analysis for Fast and Accurate Detection of ROP Gadgets. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Martin Johns, Sebastian Lekies |
Tamper-Resistant LikeJacking Protection. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Mitsuaki Akiyama, Takeshi Yagi, Kazufumi Aoki, Takeo Hariu, Youki Kadobayashi |
Active Credential Leakage for Observing Web-Based Attack Cycle. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Kapil Singh |
Practical Context-Aware Permission Control for Hybrid Mobile Applications. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Xi Xiong, Peng Liu 0005 |
SILVER: Fine-Grained and Transparent Protection Domain Primitives in Commodity OS Kernel. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Richard Skowyra, Kelly Casteel, Hamed Okhravi, Nickolai Zeldovich, William W. Streilein |
Systematic Analysis of Defenses against Return-Oriented Programming. |
RAID |
2013 |
DBLP DOI BibTeX RDF |
|
33 | Davide Balzarotti, Salvatore J. Stolfo, Marco Cova (eds.) |
Research in Attacks, Intrusions, and Defenses - 15th International Symposium, RAID 2012, Amsterdam, The Netherlands, September 12-14, 2012. Proceedings |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro, Luis Javier García-Villalba |
Concurrency Optimization for NIDS (Poster Abstract). |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Mark Vella, Sotirios Terzis, Marc Roper |
Distress Detection (Poster Abstract). |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Jialong Zhang, Chao Yang 0022, Zhaoyan Xu, Guofei Gu |
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks. |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | B. Amann 0001, Robin Sommer, Aashish Sharma, Seth Hall |
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Jennifer Mankin, David R. Kaeli |
Dione: A Flexible Disk Monitoring and Analysis Framework. |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Abhinav Srivastava, Himanshu Raj, Jonathon T. Giffin, Paul England |
Trusted VM Snapshots in Untrusted Cloud Infrastructures. |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Daisuke Mashima, Alvaro A. Cárdenas |
Evaluating Electricity Theft Detectors in Smart Grid Networks. |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Dongkyun Ahn, Gyungho Lee |
A Memory Access Validation Scheme against Payload Injection Attacks. |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Jie Chu, Zihui Ge, Richard Huber, Ping Ji 0002, Jennifer Yates, Yung-Chao Yu |
ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection. |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Jinyu Wu, Lihua Yin, Binxing Fang |
Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract). |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Ahmed F. Shosha, Joshua James, Chen-Ching Liu, Pavel Gladyshev |
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract). |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee |
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection. |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
33 | Victor C. Valgenti, Jatin Chhugani, Yan Sun 0006, Nadathur Satish, Min Sik Kim, Changkyu Kim, Pradeep Dubey |
GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors. |
RAID |
2012 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 1618 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|