The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yuan Tian 0001, Eric Yawei Chen, Xiaojun Ma, Shuo Chen 0001, Xiao Wang 0040, Patrick Tague Swords and shields: a study of mobile game hacks and existing defenses. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Zhen Li 0027, Deqing Zou, Shouhuai Xu, Hai Jin 0001, Hanchao Qi, Jie Hu VulPecker: an automated vulnerability detection system based on code similarity analysis. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Nabil Schear, Patrick T. Cable II, Thomas M. Moyer, Bryan Richard, Robert Rudd Bootstrapping and maintaining trust in the cloud. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Stephen Schwab, William K. Robertson, Davide Balzarotti (eds.) Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016, Los Angeles, CA, USA, December 5-9, 2016 Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Manar Mohamed, Nitesh Saxena Gametrics: towards attack-resilient behavioral authentication with simple cognitive games. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb Cypider: building community-based cyber-defense infrastructure for android malware detection. Search on Bibsonomy ACSAC The full citation details ... 2016 DBLP  BibTeX  RDF
1Pietro Ferrara 0001, Omer Tripp, Marco Pistoia MorphDroid: Fine-grained Privacy Verification. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang 0001, Dongyan Xu Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Shouling Ji, Shukun Yang, Ting Wang 0006, Changchang Liu, Wei-Han Lee, Raheem A. Beyah PARS: A Uniform and Open-source Password Analysis and Research System. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Simone Mutti, Enrico Bacis, Stefano Paraboschi SeSQLite: Security Enhanced SQLite: Mandatory Access Control for Android databases. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wai-Kit Sze, R. Sekar 0001 Provenance-based Integrity Protection for Windows. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Adam J. Aviv, Devon Budzitowski, Ravi Kuber Is Bigger Better? Comparing User-Generated Passwords on 3x3 vs. 4x4 Grid Sizes for Android's Pattern Unlock. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bing Chang, Zhan Wang, Bo Chen, Fengwei Zhang MobiPluto: File System Friendly Deniable Storage for Mobile Devices. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ali Zand, Amir Houmansadr, Giovanni Vigna, Richard A. Kemmerer, Christopher Kruegel Know Your Achilles' Heel: Automatic Detection of Network Critical Services. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mingwei Zhang 0005, R. Sekar 0001 Control Flow and Code Integrity for COTS binaries: An Effective Defense Against Real-World ROP Attacks. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andriana Gkaniatsou, Fiona McNeill, Alan Bundy, Graham Steel, Riccardo Focardi, Claudio Bozzato Getting to know your Card: Reverse-Engineering the Smart-Card Application Protocol Data Unit. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Simone Mutti, Yanick Fratantonio, Antonio Bianchi, Luca Invernizzi, Jacopo Corbetta, Dhilung Kirat, Christopher Kruegel, Giovanni Vigna BareDroid: Large-Scale Analysis of Android Apps on Real Devices. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Song Gao 0010, Manar Mohamed, Nitesh Saxena, Chengcui Zhang Emerging Image Game CAPTCHAs for Resisting Automated and Human-Solver Relay Attacks. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maarten Decat, Bert Lagaisse, Wouter Joosen Scalable and Secure Concurrent Evaluation of History-based Access Control Policies. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ibrahim Ethem Bagci, Utz Roedig, Ivan Martinovic, Matthias Schulz 0001, Matthias Hollick Using Channel State Information for Tamper Detection in the Internet of Things. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Benjamin Edwards, Steven A. Hofmeyr, Stephanie Forrest, Michel van Eeten Analyzing and Modeling Longitudinal Security Data: Promise and Pitfalls. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aanjhan Ranganathan, Boris Danev, Srdjan Capkun Proximity Verification for Contactless Access Control and Authentication Systems. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1István Haller, Enes Göktas, Elias Athanasopoulos, Georgios Portokalidis, Herbert Bos ShrinkWrap: VTable Protection without Loose Ends. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin Pettai, Peeter Laud Combining Differential Privacy and Secure Multiparty Computation. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thomas Hupperich, Davide Maiorca, Marc Kührer, Thorsten Holz, Giorgio Giacinto On the Robustness of Mobile Device Fingerprinting: Can Mobile Users Escape Modern Web-Tracking Mechanisms? Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sören Bleikertz, Carsten Vogel, Thomas Groß 0001, Sebastian Mödersheim Proactive Security Analysis of Changes in Virtualized Infrastructures. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maliheh Shirvanian, Nitesh Saxena On the Security and Usability of Crypto Phones. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Hui Wang 0037, Yuanyuan Zhang 0002, Juanru Li, Hui Liu, Wenbo Yang, Bodong Li, Dawu Gu Vulnerability Assessment of OAuth Implementations in Android Applications. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mariana Raykova 0001, Hasnain Lakhani, Hasanat Kazmi, Ashish Gehani Decentralized Authorization and Privacy-Enhanced Routing for Information-Centric Networks. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jing (Dave) Tian, Adam Bates 0001, Kevin R. B. Butler Defending Against Malicious USB Firmware with GoodUSB. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jinpeng Wei, Lok K. Yan, Muhammad Azizul Hakim MOSE: Live Migration Based On-the-Fly Software Emulation. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Sankardas Roy, Jordan DeLoach, Yuping Li, Nic Herndon, Doina Caragea, Xinming Ou, Venkatesh Prasad Ranganath, Hongmin Li 0001, Nicolais Guevara Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Letitia W. Li, Guillaume Duc, Renaud Pacalet Hardware-assisted Memory Tracing on New SoCs Embedding FPGA Fabrics. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Lucian Cojocar, Jonas Zaddach, Roel Verdult, Herbert Bos, Aurélien Francillon, Davide Balzarotti PIE: Parser Identification in Embedded Systems. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, Joshua Sunshine Evaluating the Flexibility of the Java Sandbox. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Konrad-Felix Krentz, Christoph Meinel Handling Reboots and Mobility in 802.15.4 Security. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peter Mayer 0001, Melanie Volkamer Secure and Efficient Key Derivation in Portfolio Authentication Schemes Using Blakley Secret Sharing. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ramya Jayaram Masti, Claudio Marforio, Kari Kostiainen, Claudio Soriente, Srdjan Capkun Logical Partitions on Many-Core Platforms. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nethanel Gelernter, Yoel Grinstein, Amir Herzberg Cross-Site Framing Attacks. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Nick Pantic, Mohammad Iftekhar Husain Covert Botnet Command and Control Using Twitter. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Johannes Götzfried, Tilo Müller, Ruan de Clercq, Pieter Maene, Felix C. Freiling, Ingrid Verbauwhede Soteria: Offline Software Protection within Low-cost Embedded Devices. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 31st Annual Computer Security Applications Conference, Los Angeles, CA, USA, December 7-11, 2015 Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  BibTeX  RDF
1Theofilos Petsios, Vasileios P. Kemerlis, Michalis Polychronakis, Angelos D. Keromytis DynaGuard: Armoring Canary-based Protections against Brute-force Attacks. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Minghua Wang, Heng Yin 0001, Abhishek Vasisht Bhaskar, Purui Su, Dengguo Feng Binary Code Continent: Finer-Grained Control Flow Integrity for Stripped Binaries. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aravind Prakash, Heng Yin 0001 Defeating ROP Through Denial of Stack Pivot. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Luca Falsina, Yanick Fratantonio, Stefano Zanero, Christopher Kruegel, Giovanni Vigna, Federico Maggi Grab 'n Run: Secure and Practical Dynamic Code Loading for Android Applications. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tianlin Li, Yaohui Hu, Ping Yang 0002, Kartik Gopalan Privacy-preserving Virtual Machine. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jasper Bogaerts, Maarten Decat, Bert Lagaisse, Wouter Joosen Entity-Based Access Control: supporting more expressive access control policies. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Chen Cao, Neng Gao, Peng Liu 0005, Ji Xiang Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tung Tran 0003, Riccardo Pelizzi, R. Sekar 0001 JaTE: Transparent and Efficient JavaScript Confinement. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Junia Valente, Alvaro A. Cárdenas Using Visual Challenges to Verify the Integrity of Security Cameras. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Rui Qiao 0002, Mingwei Zhang 0005, R. Sekar 0001 A Principled Approach for ROP Defense. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Giuseppe Petracca, Yuqiong Sun, Trent Jaeger, Ahmad Atamli AuDroid: Preventing Attacks on Audio Channels in Mobile Devices. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammed H. Almeshekah, Christopher N. Gutierrez, Mikhail J. Atallah, Eugene H. Spafford ErsatzPasswords: Ending Password Cracking and Detecting Password Leakage. Search on Bibsonomy ACSAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Marco Balduzzi, Alessandro Pasta, Kyle Wilhoit A security evaluation of AIS automated identification system. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tamara Denning, Daniel B. Kramer, Batya Friedman, Matthew R. Reynolds, Brian T. Gill, Tadayoshi Kohno CPS: beyond usability: applying value sensitive design based methods to investigate domain characteristics for security for implantable cardiac devices. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuzhe Richard Tang, Ting Wang 0006, Ling Liu 0001, Xin Hu 0001, Jiyong Jang Lightweight authentication of freshness in outsourced key-value stores. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Sven Bugiel, Sebastian Gerling Scippa: system-centric IPC provenance on Android. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Samuel Junjie Tan, Sergey Bratus, Travis Goodspeed Interrupt-oriented bugdoor programming: a minimalist approach to bugdooring embedded systems firmware. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yiming Jing, Ziming Zhao 0001, Gail-Joon Ahn, Hongxin Hu Morpheus: automatically generating heuristics to detect Android emulators. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1John Slankas, Xusheng Xiao, Laurie A. Williams, Tao Xie 0001 Relation extraction for inferring access control rules from natural language artifacts. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sören Bleikertz, Carsten Vogel, Thomas Groß 0001 Cloud radar: near real-time detection of security failures in dynamic virtualized infrastructures. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aviel D. Rubin Taking two-factor to the next level: protecting online poker, banking, healthcare and other applications. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hendrik Meutzner, Viet-Hung Nguyen, Thorsten Holz, Dorothea Kolossa Using automatic speech recognition for attacking acoustic CAPTCHAs: the trade-off between usability and security. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mingshen Sun, Min Zheng, John C. S. Lui, Xuxian Jiang Design and implementation of an Android host-based intrusion prevention system. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Weixuan Mao, Zhongmin Cai, Xiaohong Guan, Don Towsley Centrality metrics of importance in access behaviors and malware detections. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hubert Ritzdorf, Nikolaos Karapanos, Srdjan Capkun Assisted deletion of related content. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jason Gionta, Ahmed M. Azab, William Enck, Peng Ning, Xiaolan Zhang 0001 SEER: practical memory virus scanning as a service. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tianwei Zhang 0004, Ruby B. Lee New models of cache architectures characterizing information leakage from cache side channels. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sebastian Biedermann, Stefan Katzenbeisser 0001, Jakub Szefer Hot-hardening: getting more out of your security settings. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rui Han, Alejandro Mesa, Mihai Christodorescu, Saman A. Zonouz TroGuard: context-aware protection against web-based socially engineered trojans. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gabi Nakibly, Adi Sosnovich, Eitan Menahem, Ariel Waizel, Yuval Elovici OSPF vulnerability to persistent poisoning attacks: a systematic analysis. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Arthur Gervais, Srdjan Capkun, Ghassan O. Karame, Damian Gruber On the privacy provisions of Bloom filters in lightweight bitcoin clients. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dina Hadziosmanovic, Robin Sommer, Emmanuele Zambon, Pieter H. Hartel Through the eye of the PLC: semantic security monitoring for industrial processes. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Adrian Dabrowski, Nicola Pianta, Thomas Klepp, Martin Mulazzani, Edgar R. Weippl IMSI-catch me if you can: IMSI-catcher-catchers. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Henry Carter, Charles Lever, Patrick Traynor Whitewash: outsourcing garbled circuit generation for mobile devices. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Raoul Strackx, Bart Jacobs 0002, Frank Piessens ICE: a passive, high-speed, state-continuity scheme. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tamas K. Lengyel, Steve Maresca, Bryan D. Payne, George D. Webster, Sebastian Vogl, Aggelos Kiayias Scalability, fidelity and stealth in the DRAKVUF dynamic malware analysis system. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Sven Bugiel, Sebastian Gerling, Philipp von Styp-Rekowsky Android security framework: extensible multi-layered access control on Android. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Willem De Groef, Fabio Massacci, Frank Piessens NodeSentry: least-privilege library integration for server-side JavaScript. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sevtap Duman, Kaan Onarlioglu, Ali Osman Ulusoy, William K. Robertson, Engin Kirda TrueClick: automatically distinguishing trick banners from genuine download links. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chao Yang 0022, Jialong Zhang, Guofei Gu A taste of tweets: reverse engineering Twitter spammers. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Adam J. Aviv, Dane Fichter Understanding visual perceptions of usability and security of Android's graphical password pattern. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Qian Feng, Aravind Prakash, Heng Yin 0001, Zhiqiang Lin MACE: high-coverage and robust memory analysis for commodity operating systems. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jannik Pewny, Felix Schuster, Lukas Bernhard, Thorsten Holz, Christian Rossow Leveraging semantic signatures for bug search in binary programs. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Robert Gawlik, Thorsten Holz Towards automated integrity protection of C++ virtual function tables in binary programs. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yinzhi Cao, Xiang Pan, Yan Chen 0004, Jianwei Zhuge JShield: towards real-time and vulnerability-based detection of polluted drive-by download attacks. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hongyu Gao, Yi Yang 0042, Kai Bu, Yan Chen 0004, Doug Downey, Kathy Lee, Alok N. Choudhary Spam ain't as diverse as it seems: throttling OSN spam with templates underneath. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fabienne Eigner, Matteo Maffei, Ivan Pryvalov, Francesca Pampaloni, Aniket Kate Differentially private data aggregation with optimal utility. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Charles N. Payne Jr., Adam Hahn, Kevin R. B. Butler, Micah Sherr (eds.) Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, New Orleans, LA, USA, December 8-12, 2014 Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  BibTeX  RDF
1Carlos A. Barreto, Alvaro A. Cárdenas, Nicanor Quijano, Eduardo Mojica-Nava CPS: market analysis of attacks against demand response in the smart grid. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Drew Davidson, Matt Fredrikson, Benjamin Livshits MoRePriv: mobile OS support for application personalization and privacy. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1M. Zubair Rafique, Juan Caballero, Christophe Huygens, Wouter Joosen Network dialog minimization and network dialog diffing: two novel primitives for network security applications. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Schulmann, Bruno Crispo Less is more: cipher-suite negotiation for DNSSEC. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marina Krotofil, Alvaro A. Cárdenas, Bradley Manning, Jason Larsen CPS: driving cyber-physical systems to unsafe operating conditions by timing DoS attacks on sensor signals. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lance Alt, Robert Beverly, Alberto Dainotti Uncovering network tarpits with degreaser. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Marios Pomonis, Theofilos Petsios, Kangkook Jee, Michalis Polychronakis, Angelos D. Keromytis IntFlow: improving the accuracy of arithmetic error detection using information flow tracking. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Xavier de Carné de Carnavalet, Mohammad Mannan Challenges and implications of verifiable builds for security-critical open-source software. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniela Oliveira 0001, Marissa Rosenthal, Nicole Morin, Kuo-Chuan Yeh, Justin Cappos, Yanyan Zhuang It's the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer's blind spots. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mathy Vanhoef, Frank Piessens Advanced Wi-Fi attacks using commodity hardware. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 1667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license