The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (26) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (50) 1997 (54) 1998 (92) 1999 (127) 2000 (178) 2001 (306) 2002 (406) 2003 (624) 2004 (899) 2005 (1333) 2006 (1490) 2007 (1528) 2008 (1585) 2009 (1275) 2010 (673) 2011 (702) 2012 (813) 2013 (804) 2014 (989) 2015 (1073) 2016 (1206) 2017 (1461) 2018 (1759) 2019 (2206) 2020 (2727) 2021 (2982) 2022 (3370) 2023 (3864) 2024 (1050)
Publication types (Num. hits)
article(15280) book(15) data(11) incollection(195) inproceedings(19901) phdthesis(378) proceedings(22)
Venues (Conferences, Journals, ...)
CoRR(4079) IACR Cryptol. ePrint Arch.(1244) IEEE Access(507) RAID(446) CCS(308) IEEE Trans. Inf. Forensics Sec...(260) Comput. Secur.(249) USENIX Security Symposium(224) IEEE Trans. Smart Grid(198) GLOBECOM(197) ICC(193) FSE(187) ACSAC(184) CHES(178) Sensors(170) ARES(166) More (+10 of total 3761)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11110 occurrences of 2965 keywords

Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Catherine H. Gebotys, Brian A. White EM analysis of a wireless Java-based PDA. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF EM analysis, Side-channel analysis, countermeasures, power attacks
20Keijo Haataja New efficient intrusion detection and prevention system for Bluetooth networks. Search on Bibsonomy MOBILWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ad-hoc networks, intrusion detection, Bluetooth, wireless security, intrusion prevention, security attacks
20Blandine Debraize, Louis Goubin Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF guess-and-determine attacks, stream cipher, SAT solver, algebraic cryptanalysis, self-shrinking generator, multivariate quadratic equations
20Enes Pasalic Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fast Algebraic attacks, Algebraic Attack Resistant, High Degree Product, Boolean function, Stream ciphers, Algebraic Immunity, Annihilators
20Ming-Yang Su, Kai-Chi Chang, Hua-Fu Wei, Chun-Yuen Lin Feature Weighting and Selection for a Real-Time Network Intrusion Detection System Based on GA with KNN. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NIDS (Network Intrusion Detection System), DoS/DDoS Attacks, KNN (k-Nearest Neighbor), Genetic Algorithm, Network Security
20Ivan Martinovic, Frank A. Zdarsky, Matthias Wilhelm 0001, Christian Wegmann, Jens B. Schmitt Wireless client puzzles in IEEE 802.11 networks: security by wireless. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF denial-of-service (DoS), wireless security, impersonation attacks, client puzzles
20Qi Dong 0001, Donggang Liu, Peng Ning Pre-authentication filters: providing dos resistance for signature-based broadcast authentication in sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, sensor networks, broadcast authentication, DoS attacks
20Marcelo Masera, Igor Nai Fovino A Service-Oriented Approach for Assessing Infrastructure Security. Search on Bibsonomy Critical Infrastructure Protection The full citation details ... 2007 DBLP  DOI  BibTeX  RDF systemof- systems, services, attacks, vulnerabilities, threats, Security assessment
20Aline Gouget, Hervé Sibert Revisiting Correlation-Immunity in Filter Generators. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Nonlinear filter generator, Boolean function, distinguishing attacks, correlation-immunity
20Selim Volkan Kaya, Erkay Savas, Albert Levi, Özgür Erçetin Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF spatio-temporal attacks, security, privacy, RFID, public key cryptography
20Ian Fette, Norman M. Sadeh, Anthony Tomasic Learning to detect phishing emails. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF semantic attacks, learning, filtering, spam, email, phishing
20Gary S.-W. Yeo, Raphael Chung-Wei Phan On the security of the WinRAR encryption feature. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Encryption feature, WinRAR, WinZip, Compression, Attacks
20Catherine H. Gebotys A split-mask countermeasure for low-energy secure embedded systems. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF EM analysis, Side channel analysis, countermeasures, power attacks
20Sheng Zhang 0004, Amit Chakrabarti, James Ford, Fillia Makedon Attack detection in time series for recommender systems. Search on Bibsonomy KDD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF shilling attacks, recommender systems, anomaly detection, time series
20Rade Petrovic, Babak Tehranchi, Joseph M. Winograd Digital watermarking security considerations. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SDMI, copy control, watermark attacks, digital watermarking, digital rights management
20Yassir Nawaz, Guang Gong, Kishan Chand Gupta Upper Bounds on Algebraic Immunity of Boolean Power Functions. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Inverse exponent, Kasami exponent, Niho exponent, Algebraic attacks, Algebraic immunity, Power functions, Polynomial functions
20Frédéric Didier, Jean-Pierre Tillich Computing the Algebraic Immunity Efficiently. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Low degree multiple, Boolean functions, Stream ciphers, Algebraic attacks, Algebraic immunity, Annihilator
20Tal Malkin, François-Xavier Standaert, Moti Yung A Comparative Cost/Security Analysis of Fault Attack Countermeasures. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software
20Xian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng 0001 On Algebraic Immunity and Annihilators. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hypergraph Theory, Greedy Algorithm, Algebraic Attacks, Algebraic Immunity
20Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar Templates vs. Stochastic Methods. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF High-Order Attacks, Performance Analysis, Stochastic Model, Power Analysis, Side Channel Cryptanalysis, Template Attack
20Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru Venkataramani, Milos Prvulovic Comprehensively and efficiently protecting the heap. Search on Bibsonomy ASPLOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF heap attacks, heap security, heap server, computer security
20Mehmet Kivanç Mihçak, Ramarathnam Venkatesan, Tie Liu 0002 Watermarking via optimization algorithms for quantizing randomized semi-global image statistics. Search on Bibsonomy Multim. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Semi-global image statistics, Dithered quantization, Estimation attacks, Security, Watermarking, Randomization, Image watermarking
20Thomas Reidemeister, Klemens Böhm, Paul A. S. Ward, Erik Buchmann Malicious Behaviour in Content-Addressable Peer-to-Peer Networks. Search on Bibsonomy CNSR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF malicious behaviour, networking, DHT, attacks, CAN
20Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu A Note on the Cramer-Damgård Identification Scheme. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF ?OR, Cryptography, identification scheme, man-in-the- middle attacks
20Nicolas T. Courtois Cryptanalysis of Sfinks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF solving systems of multivariate equations, fast algebraic attacks on stream ciphers, Boolean functions, stream ciphers, nonlinear filters, algebraic cryptanalysis
20Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Extended Resiliency, Extended Immunity, Divide-and- Conquer Algebraic Attacks
20Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung Collision Attack on XTR and a Countermeasure with a Fixed Pattern. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack
20Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
20Tadayoshi Kohno Attacking and repairing the winZip encryption scheme. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WinZip, Zip, security fixes, compression, encryption, attacks, applied cryptography
20Shuhong Wang 0001, Jie Wang 0038, Maozhi Xu Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cross-realm setting, Security, Dictionary attacks, Password-authenticated key exchange
20Pradeep Kumar Mishra, Palash Sarkar 0001 Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF scalar multipication, field inversion, side-channel attacks, elliptic curves, hyperelliptic curves, explicit formulae
20Natasa Terzija, Walter Geisselhardt Digital image watermarking using complex wavelet transform. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF image processing, watermarking, attacks, robust algorithms, complex wavelet transform
20Marek Hejmo, Brian L. Mark, Charikleia Zouridaki, Roshan K. Thomas Denial-of-service resistant quality-of-service signaling for mobile ad hoc networks. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF qos signaling, security, quality of service, ad hoc networks, denial of service, attacks
20Kai Schramm, Christof Paar IT Security Project: Implementation of the Advanced Encryption Standard (AES) on a Smart Card. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RISC architecture, smart cards, AES, side channel attacks
20Maneli Noorkami, Faramarz Fekri A Fast Correlation Attack via Unequal Error Correcting LDPC Codes. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, Stream ciphers, linear feedback shift registers, fast correlation attacks, LDPC codes
20Jean-Claude Bajard, Laurent Imbert, Pierre-Yvan Liardet, Yannick Teglia Leak Resistant Arithmetic. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RNS Montgomery multiplication, Side channel attacks, residue number systems
20Wei Li 0012, Xiangyang Xue Audio Watermarking Based on Music Content Analysis: Robust against Time Scale Modification. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF music content analysis, localized watermarking, synchronization attacks
20Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
20Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems
20Tanmoy Kanti Das, Subhamoy Maitra A Robust Block Oriented Watermarking Scheme in Spatial Domain. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptanalytic Attacks, Digital Watermarking, Information Hiding, Gray Scale Image, Stirmark
20James Cannady Applying CMAC-Based On-Line Learning to Intrusion Detection. Search on Bibsonomy IJCNN (5) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Intrusion detection, CMAC, denial of service attacks
20Jens Palsberg, S. Krishnaswamy, Minseok Kwon, Di Ma, Qiuyun Shao, Y. Zhang Experience with Software Watermarking. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF program-transformation attacks, heap-space usage, watermark retrieval time, protection technique, tamperproofing, Java, Java, data structures, security of data, execution times, obfuscation, dynamic data structures, code size, software watermarking, copy protection
20William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cascaded ciphers, Shannon model, Double DES, information theory, DES, Ciphers, meet in the middle attacks
20Adam L. Young, Moti Yung Kleptography: Using Cryptography Against Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Cryptanalytic attacks, leakage bandwidth, design and manufacturing of cryptographic devices and software, black-box devices, SETUP mechanisms, RSA, randomness, information hiding, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, Discrete Log
20Claus-Peter Schnorr Security of 2^t-Root Identification and Signatures. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Fiat-Shamir scheme, active/passive impersonation attacks, adaptive chosen-message attack, factoring of integers, Identification, signature, random oracle model
20Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, Yan Chen 0004 Security Issues in Online Social Networks. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF structural attacks, malware attacks, survey, online social networks, security & privacy
20Naofumi Homma, Atsushi Miyamoto, Takafumi Aoki, Akashi Satoh, Adi Shamir Comparative Power Analysis of Modular Exponentiation Algorithms. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF waveform matching, RSA, Side-channel attacks, modular exponentiation, power-analysis attacks
20Xinran Wang, Chi-Chun Pan, Peng Liu 0005, Sencun Zhu SigFree: A Signature-Free Buffer Overflow Attack Blocker. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Intrusion detection, code-injection attacks, buffer overflow attacks
20Dov M. Gabbay Fibring Argumentation Frames. Search on Bibsonomy Stud Logica The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fibring argumentation frames, joint attacks, disjunctive attacks, critical sets, flow argumentation networks
20Haifeng Yu DoS-resilient secure aggregation queries in sensor networks. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multihop flooding attacks, secure aggregation queries, sensor networks, DoS attacks
20Mikhael Felker Internet War Games: Power of the Masses. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF defense methods, distributed DoS attacks, denial-of-service attacks
20Chi-Sung Laih, Fu-Kuan Tu Remarks on Parameter Selection for Server-Aided Secret RSA Computation Schemes. Search on Bibsonomy ICPP Workshops The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Server aided secret computation (SASC), passive attacks, RSA, Signature, active attacks
19Yongzhuang Wei, YuPu Hu New related-key rectangle attacks on reduced AES-192 and AES-256. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack
19Ziqing Mao, Ninghui Li, Ian M. Molloy Defeating Cross-Site Request Forgery Attacks with Browser-Enforced Authenticity Protection. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cross-Site Request Forgery, Web Security, Browser Security
19Jan Platos, Václav Snásel, Pavel Krömer, Ajith Abraham Detecting Insider Attacks Using Non-negative Matrix Factorization. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou SQLProb: a proxy-based architecture towards preventing SQL injection attacks. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection, information security, intrusion prevention, SQL injection attack
19Peter Ebinger, Malcolm Parsons Measuring the impact of attacks on the performance of mobile ad hoc networks. Search on Bibsonomy PE-WASUN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF performance evaluation, attack, performance metrics, manet, black hole
19Donggang Liu, Qi Dong 0001 Combating side-channel attacks using key management. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Ashley Chonka, Wanlei Zhou 0001, Yang Xiang 0001 Defending Grid Web Services from XDoS Attacks by SOTA. Search on Bibsonomy PerCom Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19John Dunagan, Alice X. Zheng, Daniel R. Simon Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs. Search on Bibsonomy SOSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF identity snowball, machine learning, support vector machine, authentication, access control, combinatorial optimization, attack graph, sparsest cut
19Yu Sasaki Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL
19Zunping Cheng, Neil Hurley Effective diverse and obfuscated attacks on model-based recommender systems. Search on Bibsonomy RecSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF recommender systems, collaborative filtering, detection, attack, obfuscation
19Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Yu Sasaki, Kazumaro Aoki Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RIPEMD, double branch, preimage, meet-in-the-middle
19Makoto Shimamura, Kenji Kono Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Network-level code emulation, Memory-scanning attack, Intrusion detection, Code-injection attack, Intrusion analysis
19Bharat K. Bhargava, Ruy de Oliveira, Yu Zhang, Nwokedi C. Idika Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Mike Ter Louw, V. N. Venkatakrishnan Blueprint: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields Passive-Logging Attacks Against Anonymous Communications Systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intersection attack, predecessor attack, privacy, anonymity, anonymous communication
19Wei Yu 0002, Nan Zhang 0004, Xinwen Fu, Riccardo Bettati, Wei Zhao 0001 On localization attacks to Internet Threat Monitors: An information-theoretic framework. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Salem Benferhat, Karim Tabia Classification features for detecting Server-side and Client-side Web attacks. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Dongwon Seo, Heejo Lee, Ejovi Nuwere Detecting More SIP Attacks on VoIP Services by Combining Rule Matching and State Transition Models. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Nisheeth Shrivastava, Anirban Majumder, Rajeev Rastogi Mining (Social) Network Graphs to Detect Random Link Attacks. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Hiroshi Tsunoda, Kenjirou Arai, Yuji Waizumi, Nirwan Ansari, Yoshiaki Nemoto Detecting Pulsing Denial-of-Service Attacks Based on the Bandwidth Usage Condition. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Xiaolin Chen, Hui Deng, Feng Wang 0039, Mu Mu 0001, Sanglu Lu A Deployable Architecture against Application-level DDoS Attacks. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Hakem Beitollahi, Geert Deconinck An overlay protection layer against Denial-of-Service attacks. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Claude Carlet, Keqin Feng An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Boolean function, Stream cipher, Algebraic attack
19Xiangbin Cheng, Jun Bi, Xing Li Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS Attacks. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IPv6, Shim6, DoS attack
19Nan Zhang 0004, Wei Yu 0002, Xinwen Fu, Sajal K. Das 0001 Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. Search on Bibsonomy ICPADS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Eli Biham New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer Second Preimage Attacks on Dithered Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Hash Function, Dithering
19Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision
19Peter Djalaliev, Muhammad Jamshed, Nicholas L. Farnan, José Carlos Brustoloni Sentinel: Hardware-Accelerated Mitigation of Bot-Based DDoS Attacks. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Raphael C.-W. Phan, Bok-Min Goi Attacks on Improved Key Distribution Protocols with Perfect Reparability. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Xinfeng Ye Countering DDoS and XDoS Attacks against Web Services. Search on Bibsonomy EUC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Young-Gab Kim, Sanghyun Cho, Junsup Lee, Min-Soo Lee, In Ho Kim, Sung Hoon Kim Method for Evaluating the Security Risk of a Website Against Phishing Attacks. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Ahmed Zeeshan, Anwar M. Masood, Zafar M. Faisal, Azam Kalim, Naheed Farzana PrISM: Automatic Detection and Prevention from Cyber Attacks. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information Security Management System, Intrusion Detection, Network security, Computer Security, Intrusion Prevention
19Marinho P. Barcellos, Daniel Bauermann, Henrique Sant'anna, Matheus B. Lehmann, Rodrigo B. Mansilha Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS Attacks. Search on Bibsonomy SRDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Nachiketh R. Potlapally, Anand Raghunathan, Srivaths Ravi 0001, Niraj K. Jha, Ruby B. Lee Aiding Side-Channel Attacks on Cryptographic Software With Satisfiability-Based Analysis. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mridul Nandi, Douglas R. Stinson Multicollision Attacks on Some Generalized Sequential Hash Functions. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yun Huang 0001, Xianjun Geng, Andrew B. Whinston Defeating DDoS attacks by fixing the incentive chain. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, Denial-of-service, incentive, pricing
19Jorge Belenguer, Carlos Miguel Tavares Calafate A low-cost embedded IDS to monitor and prevent Man-in-the-Middle attacks on wired LAN environments. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mauro Conti, Roberto Di Pietro, Luigi V. Mancini, Alessandro Mei A randomized, efficient, and distributed protocol for the detection of node replication attacks in wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2007 DBLP  DOI  BibTeX  RDF node replication attack detection, efficiency, resilience, distributed protocol, wireless sensor networks security
19Alex Wun, Alex King Yeung Cheung, Hans-Arno Jacobsen A taxonomy for denial of service attacks in content-based publish/subscribe systems. Search on Bibsonomy DEBS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, denial of service, publish/subscribe
19Tarik Taleb, Zubair Md. Fadlullah, Kazuo Hashimoto, Yoshiaki Nemoto, Nei Kato Tracing back attacks against encrypted protocols. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF encryption, intrusion detection system (IDS), traceback
19Anders Moen Hagalisletto Errors in Attacks on Authentication Protocols. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19F. Abdoli, Mohsen Kahani Using Attacks Ontology in Distributed Intrusion Detection System. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Xinfeng Ye, Santokh Singh A SOA Approach to Counter DDoS Attacks. Search on Bibsonomy ICWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Yingying Chen 0001, Wade Trappe, Richard P. Martin Detecting and Localizing Wireless Spoofing Attacks. Search on Bibsonomy SECON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Zhitang Li, Jie Lei 0004, Li Wang 0015, Dong Li Assessing Attack Threat by the Probability of Following Attacks. Search on Bibsonomy IEEE NAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19H. R. Nagesh, K. Chandra Sekaran, Adarsh Rao Kordcal Proactive model for Mitigating Internet Denial-of-Service Attacks. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 35802 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license