The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Hyungsub Kim, Sangho Lee 0001, Jong Kim 0001 Exploring and mitigating privacy threats of HTML5 geolocation API. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yuru Shao, Xiapu Luo, Chenxiong Qian, Pengfei Zhu 0001, Lei Zhang 0006 Towards a scalable resource-driven approach for detecting repackaged Android applications. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Schulmann DNS authentication as a service: preventing amplification attacks. Search on Bibsonomy ACSAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ting-Fang Yen, Alina Oprea, Kaan Onarlioglu, Todd Leetham, William K. Robertson, Ari Juels, Engin Kirda Beehive: large-scale log analysis for detecting suspicious activity in enterprise networks. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohsen Zohrevandi, Rida A. Bazzi Auto-FBI: a user-friendly approach for secure access to sensitive content on the web. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matthias Lange, Steffen Liebergeld Crossover: secure and usable user interface for mobile devices with multiple isolated OS personalities. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Min Li, Wanyu Zang, Kun Bai, Meng Yu 0001, Peng Liu 0005 MyCloud: supporting user-configured privacy protection in cloud computing. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gabriele Bonetti, Marco Viglione, Alessandro Frossi, Federico Maggi, Stefano Zanero A comprehensive black-box methodology for testing the forensic characteristics of solid-state drives. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Panagiotis Papadopoulos, Antonis Papadogiannakis, Michalis Polychronakis, Apostolis Zarras, Thorsten Holz, Evangelos P. Markatos k-subscription: privacy-preserving microblogging browsing through obfuscation. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhui Deng, Xiangyu Zhang 0001, Dongyan Xu SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Schmidt, Trent Jaeger Pitfalls in the automated strengthening of passwords. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nathaniel Boggs, Wei Wang 0084, Suhas Mathur, Baris Coskun, Carol Pincock Discovery of emergent malicious campaigns in cellular networks. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stephen E. McLaughlin CPS: stateful policy enforcement for control system device usage. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sirinda Palahan, Domagoj Babic, Swarat Chaudhuri, Daniel Kifer Extraction of statistically significant malware behaviors. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Luca Invernizzi, Christopher Kruegel, Giovanni Vigna Message in a bottle: sailing past censorship. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Felix Rohrer, Yuting Zhang, Lou Chitkushev, Tanya Zlateva DR BACA: dynamic role based access control for Android. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Murat Akpulat, Kemal Bicakci, Ugur Cil Revisiting graphical passwords for augmenting, not replacing, text passwords. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wai-Kit Sze, R. Sekar 0001 A portable user-level approach for system-wide integrity protection. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jonas Zaddach, Anil Kurmus, Davide Balzarotti, Erik-Oliver Blass, Aurélien Francillon, Travis Goodspeed, Moitrayee Gupta, Ioannis Koltsidas Implementation and implications of a stealth hard-drive backdoor. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yangchun Fu, Zhiqiang Lin, Kevin W. Hamlen Subverting system authentication with context-aware, reactive virtual machine introspection. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Carl E. Landwehr A building code for building code: putting what we know works to work. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1William Young, Nancy G. Leveson Systems thinking for safety and security. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1B. Amann 0001, Robin Sommer, Matthias Vallentin, Seth Hall No attack necessary: the surprising dynamics of SSL trust relationships. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Charles N. Payne Jr. (eds.) Annual Computer Security Applications Conference, ACSAC '13, New Orleans, LA, USA, December 9-13, 2013 Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  BibTeX  RDF
1Jordan Wilberding, Andrew Yates, Micah Sherr, Wenchao Zhou Validating web content with senser. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Iasonas Polakis, Stamatis Volanis, Elias Athanasopoulos, Evangelos P. Markatos The man who was there: validating check-ins in location-based services. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Collin Mulliner, Jon Oberheide, William K. Robertson, Engin Kirda PatchDroid: scalable third-party security patches for Android devices. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marcin Nagy, Emiliano De Cristofaro, Alexandra Dmitrienko, N. Asokan, Ahmad-Reza Sadeghi Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Amir Herzberg, Haya Schulmann Socket overloading for fun and cache-poisoning. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiao Zhang, Amit Ahlawat, Wenliang Du AFrame: isolating advertisements from mobile applications in Android. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ryan M. Gerdes, Chris Winstead, Kevin P. Heaslip CPS: an efficiency-motivated attack against autonomous vehicular transportation. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mahmudur Rahman, Umut Topkara, Bogdan Carbunar Seeing is not believing: visual verifications through liveness analysis using mobile devices. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yogesh Mundada, Anirudh Ramachandran, Nick Feamster SilverLine: preventing data leaks from compromised web applications. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xin Hu 0001, Kang G. Shin DUET: integration of dynamic and static analyses for malware clustering with cluster ensembles. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dhilung Kirat, Lakshmanan Nataraj, Giovanni Vigna, B. S. Manjunath SigMal: a static signal processing based malware triage. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jannik Pewny, Thorsten Holz Control-flow restrictor: compiler-based CFI for iOS. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1François Gauthier 0001, Thierry Lavoie, Ettore Merlo Uncovering access control weaknesses and flaws with security-discordant software clones. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Behrad Garmany, Tilo Müller PRIME: private RSA infrastructure for memory-less encryption. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Giovanni Russello, Arturo Blas Jimenez, Habib Naderi, Wannes van der Mark FireDroid: hardening security in almost-stock Android. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nathaniel Husted, Steven A. Myers, Abhi Shelat, Paul Grubbs GPU and CPU parallelization of honest-but-curious secure two-party computation. Search on Bibsonomy ACSAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martina Lindorfer, Alessandro Di Federico, Federico Maggi, Paolo Milani Comparetti, Stefano Zanero Lines of malicious code: insights into the malicious software industry. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shari Trewin, Calvin Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, Shay Ben-David Biometric authentication on a mobile device: a study of user effort, error and task disruption. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Divya Muthukumaran, Sandra Julieta Rueda, Nirupama Talele, Hayawardh Vijayakumar, Jason Teutsch, Trent Jaeger Transforming commodity security policies to enforce Clark-Wilson integrity. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Angeliki Zavou, Georgios Portokalidis, Angelos D. Keromytis Self-healing multitier architectures using cascading rescue points. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Charles Smutz, Angelos Stavrou Malicious PDF detection using metadata and structural features. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Iasonas Polakis, Marco Lancini, Georgios Kontaxis, Federico Maggi, Sotiris Ioannidis, Angelos D. Keromytis, Stefano Zanero All your face are belong to us: breaking Facebook's social authentication. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Daniel McCarney, David Barrera 0003, Jeremy Clark, Sonia Chiasson, Paul C. van Oorschot Tapas: design, implementation, and usability evaluation of a password manager. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Devin J. Pohly, Stephen E. McLaughlin, Patrick D. McDaniel, Kevin R. B. Butler Hi-Fi: collecting high-fidelity whole-system provenance. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Martin Johns, Sebastian Lekies, Bastian Braun, Benjamin Flesch BetterAuth: web authentication revisited. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yingnong Dang, Dongmei Zhang 0001, Song Ge, Chengyun Chu, Yingjun Qiu, Tao Xie 0001 XIAO: tuning code clones at hands of engineers in practice. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Miro Enev, Jaeyeon Jung, Liefeng Bo, Xiaofeng Ren, Tadayoshi Kohno SensorSift: balancing sensor data privacy and utility in automated face understanding. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christopher S. Gates, Ninghui Li, Jing Chen 0005, Robert W. Proctor CodeShield: towards personalized application whitelisting. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Indrajeet Singh, Michael Butkiewicz, Harsha V. Madhyastha, Srikanth V. Krishnamurthy, Sateesh Addepalli Enabling private conversations on Twitter. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Roberto Perdisci, Man Chon U VAMO: towards a fully automated malware clustering validity analysis. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Apurva Kumar Using automated model analysis for reasoning about security of web protocols. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Claudio Marforio, Hubert Ritzdorf, Aurélien Francillon, Srdjan Capkun Analysis of the communication between colluding applications on modern smartphones. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Carsten Willems, Ralf Hund, Andreas Fobian, Dennis Felsch, Thorsten Holz, Amit Vasudevan Down to the bare metal: using processor features for binary analysis. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Paul Dunphy, Patrick Olivier On automated image choice for secure and usable graphical passwords. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vasant Tendulkar, Ryan Snyder, Joe Pletcher, Kevin R. B. Butler, Ashwin Shashidharan, William Enck Abusing cloud-based browsers for fun and profit. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Carsten Willems, Felix C. Freiling, Thorsten Holz Using memory management to detect and extract illegitimate code for malware analysis. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vasumathi Sridharan, Vaibhav Shankar, Minaxi Gupta Twitter games: how successful spammers pick targets. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sumayah A. Alrwais, Alexandre Gerber, Christopher W. Dunn, Oliver Spatscheck, Minaxi Gupta, Eric Osterweil Dissecting ghost clicks: ad fraud via misdirected human clicks. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Adam J. Aviv, Benjamin Sapp, Matt Blaze, Jonathan M. Smith Practicality of accelerometer side channels on smartphones. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Emil Stefanov, Marten van Dijk, Ari Juels, Alina Oprea Iris: a scalable cloud file system with efficient integrity checks. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, Srdjan Capkun Enabling trusted scheduling in embedded systems. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Johannes Schlumberger, Christopher Kruegel, Giovanni Vigna Jarhead analysis and detection of malicious Java applets. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Richard Wartell, Vishwath Mohan, Kevin W. Hamlen, Zhiqiang Lin Securing untrusted code via compiler-agnostic binary rewriting. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ross J. Anderson Security economics: a personal perspective. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shuang Zhao, Patrick P. C. Lee, John C. S. Lui, Xiaohong Guan, Xiaobo Ma, Jing Tao Cloud-based push-styled mobile botnets: a case study of exploiting the cloud to device messaging service. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1John P. McDermott, Bruce E. Montrose, Margery Li, James Kirby, Myong H. Kang Separation virtual machine monitors. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shiva Houshmand, Sudhir Aggarwal Building better passwords using probabilistic techniques. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alessandro Reina, Aristide Fattori, Fabio Pagani, Lorenzo Cavallaro, Danilo Bruschi When hardware meets software: a bulletproof solution to forensic memory acquisition. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Pieter Agten, Steven Van Acker, Yoran Brondsema, Phu H. Phung, Lieven Desmet, Frank Piessens JSand: complete client-side sandboxing of third-party JavaScript without browser modifications. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Leyla Bilge, Davide Balzarotti, William K. Robertson, Engin Kirda, Christopher Kruegel Disclosure: detecting botnet command and control servers through large-scale NetFlow analysis. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Olivier Levillain, Arnaud Ébalard, Benjamin Morin, Hervé Debar One year of SSL internet measurement. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Susan D. Alexander Trust engineering: rejecting the tyranny of the weakest link. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Robert H'obbes' Zakon (eds.) 28th Annual Computer Security Applications Conference, ACSAC 2012, Orlando, FL, USA, 3-7 December 2012 Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  BibTeX  RDF
1Eitaro Shioji, Yuhei Kawakoya, Makoto Iwamura, Takeo Hariu Code shredding: byte-granular randomization of program layout for detecting code-reuse attacks. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fabian Yamaguchi, Markus Lottmann, Konrad Rieck Generalized vulnerability extrapolation using abstract syntax trees. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sean Heelan, Agustin Gianni Augmenting vulnerability analysis of binary code. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Abhinav Srivastava, Jonathon T. Giffin Efficient protection of kernel data structures via object partitioning. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Christian S. Collberg, Sam Martin, Jonathan Myers, Jasvir Nagra Distributed application tamper detection via continuous software updates. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mariano Graziano, Corrado Leita, Davide Balzarotti Towards network containment in malware analysis systems. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xuetao Wei, Lorenzo Gomez, Iulian Neamtiu, Michalis Faloutsos Permission evolution in the Android ecosystem. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chris Jarabek, David Barrera 0003, John Aycock ThinAV: truly lightweight mobile cloud-based anti-malware. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Erik-Oliver Blass, William Robertson 0002 TRESOR-HUNT: attacking CPU-bound encryption. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sarah M. Diesburg, Christopher R. Meyers, Mark J. Stanovich, Michael Mitchell, Justin Marshall, Julia Gould, An-I Andy Wang, Geoff Kuenning TrueErase: per-file secure deletion for the storage data path. Search on Bibsonomy ACSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Hart, Claude Castille, Manoj Harpalani, Jonathan Toohill, Rob Johnson PhorceField: a phish-proof password ceremony. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Paul F. Syverson A peel of onion. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marek Jawurek, Martin Johns, Konrad Rieck Smart metering de-pseudonymization. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1John Wilander, Nick Nikiforakis, Yves Younan, Mariam Kamkar, Wouter Joosen RIPE: runtime intrusion prevention evaluator. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Robert H'obbes' Zakon, John P. McDermott, Michael E. Locasto (eds.) Twenty-Seventh Annual Computer Security Applications Conference, ACSAC 2011, Orlando, FL, USA, 5-9 December 2011 Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yazan Boshmaf, Ildar Muslukhov, Konstantin Beznosov, Matei Ripeanu The socialbot network: when bots socialize for fame and money. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pavel Laskov, Nedim Srndic Static detection of malicious JavaScript-bearing PDF documents. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ang Cui, Jatin Kataria, Salvatore J. Stolfo From prey to hunter: transforming legacy embedded devices into exploitation sensor grids. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ahmed Khurshid, Firat Kiyak, Matthew Caesar 0001 Improving robustness of DNS to software vulnerabilities. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Patrick Simmons Security through amnesia: a software-based solution to the cold boot attack on disk encryption. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yacin Nadji, Jonathon T. Giffin, Patrick Traynor Automated remote repair for mobile malware. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vasilis Pappas, Mariana Raykova 0001, Binh Vo, Steven M. Bellovin, Tal Malkin Private search in the real world. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 1667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license