|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3452 occurrences of 1510 keywords
|
|
|
Results
Found 7297 publication records. Showing 7297 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Yanguo Liu, Issa Traoré, Alexander M. Hoole |
A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Yuan Liang, Hai-Xin Duan |
An Admission Control Policy Based on Social Networks for P2P Systems. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Aaron Roth 0001 |
The Price of Malice in Linear Congestion Games. |
WINE |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Frédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas |
A Robust Reputation Scheme for Decentralized Group Management Systems. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Pierre Parrend, Stéphane Frénot |
Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms. |
CBSE |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Kun Wang, Meng Wu, Subin Shen |
A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
|
11 | A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono |
FlexBox: Sandboxing internet servers based on layer-7 contexts. |
ISCC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Thibault Cholez, Isabelle Chrisment, Olivier Festor |
A Distributed and Adaptive Revocation Mechanism for P2P Networks. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
revocation mechanism, remote accounts, P2P networks, reputation mechanism, KAD |
11 | Nauman Mazhar, Muddassar Farooq |
A sense of danger: dendritic cells inspired artificial immune system for manet security. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
misbehavior detection, mobile ad hoc networks, self organization, artificial immune systems, dendritic cells |
11 | Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos |
Antisocial Networks: Turning a Social Network into a Botnet. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Ashish Kamra, Elisa Bertino |
Database Intrusion Detection and Response. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam |
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy |
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang |
A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
integrity of images protection, adaptive median filter, tampered detection and recovery, discrete cosine transform, Semi-fragile watermarking |
11 | Xiaowei Chen, Kaiyong Zhao, Xiaowen Chu 0001 |
SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang |
Efficient Disjointness Tests for Private Datasets. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Private Set Disjointness, Private Matching, Secure Multi-Party Computation |
11 | Najwa Aaraj, Anand Raghunathan, Niraj K. Jha |
Dynamic Binary Instrumentation-Based Framework for Malware Defense. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
control-data flow, execution context, dynamic binary instrumentation, virtualization, Malware |
11 | Jianli Hu, Quanyuan Wu, Bin Zhou 0004 |
Distributed and Effective Reputation Mechanism in P2P Systems. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Wei Zhou 0011, Jianjun Yu, Gang Xue, Shaowen Yao 0001, Guowei Yu |
A Novel Reputation-Based Trust Architecture for P2P E-Commerce Systems. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Qiang Zhang, Ying Zhuo, Zhenghu Gong |
A Trust Inspection Model Based on Society Behavior Similarity Rule in Dynamic Networks. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Wen Ji, Shoubao Yang, Fuli Liu |
Sustained Online Duration - based Reputation Management for File-Sharing Peer-to-Peer Systems. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen |
Encrypted Shared Data Spaces. |
COORDINATION |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Xiaoxiao Wang 0001, Hassan Salmani, Mohammad Tehranipoor, James F. Plusquellic |
Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis. |
DFT |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Felix Halim, Yongzheng Wu, Roland H. C. Yap |
Security Issues in Small World Network Routing. |
SASO |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Emmanuelle Anceaume, Romaric Ludinard, Aina Ravoaja, Francisco Vilar Brasileiro |
PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn. |
SASO |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Thomas Banton, Dennis Proffitt, Greg Humphreys |
Quantifying usability in secure graphics: assessing the user costs of protecting 3D content. |
APGV |
2008 |
DBLP DOI BibTeX RDF |
secure graphics, usability, perception, 3D reconstruction |
11 | Wei Han, Tao Hao, Dong Zheng 0001, Kefei Chen, Xiaofeng Chen 0001 |
A Tamper-Evident Voting Machine Resistant to Covert Channels. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
tamper-evident, receipt-free, electronic voting, covert channel |
11 | Yongsheng Hao, Yuebin Xu, Guanfeng Liu 0001, Zhenkuan Pan 0001 |
A New Grid Resource Management Mechanism Based on D-S Theory. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
turst, Grid computing, resource scheduling |
11 | Yonesy F. Nunez |
Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Mehmet S. Kiraz, Berry Schoenmakers |
An Efficient Protocol for Fair Secure Two-Party Computation. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Bo Zhu 0001, Kui Ren 0001, Lingyu Wang 0001 |
Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Guorui Li, Jingsha He, Yingfang Fu |
A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell |
Cloaker: Hardware Supported Rootkit Concealment. |
SP |
2008 |
DBLP DOI BibTeX RDF |
security, operating system, rootkit, ARM |
11 | Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna |
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. |
SP |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Jiang Bian 0002, Yandong Liu, Eugene Agichtein, Hongyuan Zha |
A few bad votes too many?: towards robust ranking in social media. |
AIRWeb |
2008 |
DBLP DOI BibTeX RDF |
vote spam, robustness, ranking, social media, community question answering |
11 | Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai |
Cryptography with constant computational overhead. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
constant computational overhead, cryptography, universal hashing |
11 | Furong Wang, Chen Huang 0003, Jing Zhao, Chunming Rong |
IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
trust, Ad hoc, evidence, intrusion |
11 | Yongyuth Permpoontanalarp, Jatupoom Kanokkanjanapong |
Dynamic Undeniable Fair Certified Email with DDoS Protection. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
Cryptographic Protocols, Fair Exchange Protocol, Certified Email |
11 | Le-Hung Vu, Karl Aberer |
Effective Usage of Computational Trust Models in Rational Environments. |
Web Intelligence |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Roberto Perdisci, Andrea Lanzi, Wenke Lee |
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis |
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Xinxin Fan, Guang Gong |
Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Joan Arnedo-Moreno, Jordi Herrera-Joancomartí |
Persistent Interoperable Security for JXTA Advertisements. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
11 | Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis |
A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
Session Initiation Protocol (SIP), Voice Over IP (VoIP), Billing |
11 | Paul C. van Oorschot, Tao Wan 0004, Evangelos Kranakis |
On interdomain routing security and pretty secure BGP (psBGP). |
ACM Trans. Inf. Syst. Secur. |
2007 |
DBLP DOI BibTeX RDF |
authentication, trust, certificates, BGP, public-key infrastructure, interdomain routing, secure routing protocols |
11 | Runfang Zhou, Kai Hwang 0001 |
PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
eBay trace data set, distributed file sharing, P2P Grids, PSA benchmark, system scalability, distributed hash table, overlay network, Peer-to-Peer system, reputation system |
11 | Shuiming Ye, Qibin Sun, Ee-Chien Chang |
Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. |
Trans. Data Hiding Multim. Secur. |
2007 |
DBLP DOI BibTeX RDF |
Feature Distance Measure, Digital Signature, Digital Watermarking, Error Concealment, Image Authentication, Image Transmission |
11 | Kui Wu 0001, Chong Liu 0001, Jianping Pan 0001, Dandan Huang |
Robust Range-Free Localization in Wireless Sensor Networks. |
Mob. Networks Appl. |
2007 |
DBLP DOI BibTeX RDF |
wireless sensor networks, reliability, range-free localization |
11 | Gary McGraw |
Silver Bullet Talks with Mikko Hypponen [Interview]. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
11 | William H. Allen |
Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Daniel Bilar |
On callgraphs and generative mechanisms. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Daniel Bilar |
On callgraphs and generative mechanisms. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng |
Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks. |
Telecommun. Syst. |
2007 |
DBLP DOI BibTeX RDF |
Authenticated group key agreement, Dynamic group membership, Heterogeneous networks, Secure group communication, DoS attacks |
11 | Raphael Eidenbenz, Yvonne Anne Oswald, Stefan Schmid 0001, Roger Wattenhofer |
Manipulation in Games. |
ISAAC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Takashi Nanya |
Challenges in Dependability of Networked Systems for Information Society. |
NPC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Mooi Choo Chuah, Peng Yang, Jianbin Han |
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Zhu Han 0001, Yan Lindsay Sun |
Securing Cooperative Transmission in Wireless Communications. |
MobiQuitous |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Soshant Bali, Sridhar Machiraju, Hui Zang, Victor Frost |
A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks. |
PAM |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Md. Nurul Islam, Atsuhi Kara |
Using SCTP to Implement Multihomed Web Servers. |
DNIS |
2007 |
DBLP DOI BibTeX RDF |
Transport Protocol, Stream Control Transmission Protocol, Multihoming |
11 | Tyler Moore 0001, Jolyon Clulow |
Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | John Haggerty, Mark John Taylor |
FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Donald P. Cox, Youssif B. Al-Nashif, Salim Hariri |
Application of autonomic agents for global information grid management and security. |
SCSC |
2007 |
DBLP BibTeX RDF |
autonomia, global information grid, net-centric warfare, network security, autonomic agents |
11 | Yongdong Wu, Feng Bao 0001, Robert H. Deng, Marc Mouffron, Frederic Rousseau 0002 |
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Mayuresh Ektare, Yanxia Yang |
The Balancing Act Between Computer Security and Convenience. |
HCI (1) |
2007 |
DBLP DOI BibTeX RDF |
convenience, user experience, Computer security, user behavior, Spyware, Viruses |
11 | Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Pavel Minarík, David Medvigy |
Collaborative Attack Detection in High-Speed Networks. |
CEEMAS |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Zhitang Li, Shudong Shi |
A Secure Routing Protocol for Mobile Ad hoc Networks. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Andrew Bortz, Dan Boneh |
Exposing private information by timing web applications. |
WWW |
2007 |
DBLP DOI BibTeX RDF |
web browser design, privacy, phishing, web application security, web spoofing |
11 | Vasileios Karyotis, Symeon Papavassiliou, Mary Grammatikou |
On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Xu Su, Rajendra V. Boppana |
On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Keith B. Frikken |
Privacy-Preserving Set Union. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
11 | S. Venkatesan 0002, Chenniappan Chellappan |
Recovery model for free-roaming mobile agent against multiple attacks. |
MobiMedia |
2007 |
DBLP DOI BibTeX RDF |
agent recovery, colluded attacks, free-roaming mobile agent, k-response, offer recovery |
11 | Like Zhang, Gregory B. White |
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Runfang Zhou, Kai Hwang 0001 |
Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Yiduo Mei, Shangyuan Guan, Xiaoshe Dong, Siyuan Ma, Zhao Wang 0001 |
A Framework for Reputation Management in Large-Scale Distributed Systems. |
CSCWD (Selected Papers) |
2007 |
DBLP DOI BibTeX RDF |
peer-to-peer network, reputation management, large-scale distributed system |
11 | Hesiri Weerasinghe, Huirong Fu |
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
Cooperative Black Hole attack, MANET, AODV |
11 | Weijia Yang, Shangteng Huang |
Privacy Preserving Clustering for Multi-party. |
DASFAA |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Emmanuel Bresson, Dario Catalano, Rosario Gennaro |
Improved On-Line/Off-Line Threshold Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Mehmet S. Kiraz, Berry Schoenmakers, José Villegas |
Efficient Committed Oblivious Transfer of Bit Strings. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Committed oblivious transfer, Commitments, Homomorphic encryption |
11 | Yufeng Wang 0001, Yoshiaki Hori, Kouichi Sakurai |
An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Li Weng, Bart Preneel |
Attacking Some Perceptual Image Hash Algorithms. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Nilufer Tuptuk, Emil Lupu |
Risk Based Authorisation for Mobile Ad Hoc Networks. (PDF / PS) |
AIMS |
2007 |
DBLP DOI BibTeX RDF |
Mobile Ad Hoc Network, Trust, Authorisation, Bayesian Belief Networks |
11 | Qiong Huang 0001, Duncan S. Wong |
Generic Certificateless Key Encapsulation Mechanism. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Hae Young Lee, Tae Ho Cho |
Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd |
Reducing shoulder-surfing by using gaze-based password entry. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
gaze-based password entry, password entry, eye tracking, shoulder surfing |
11 | Jiping Zheng 0001, Xiaolin Qin, Jin Sun |
Data Dependency Based Recovery Approaches in Survival Database Systems. |
International Conference on Computational Science (2) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Marie Kim, YoungJun Lee, Jaecheol Ryou 0001 |
What Are Possible Security Threats in Ubiquitous Sensor Network Environment? |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
middleware, security threat, USN |
11 | Theodor Richardson, Chin-Tser Huang |
Containing Hitlist-Based Worms with Polymorphic Signatures. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Mark S. Withall, M. Shirantha de Silva, David J. Parish, Iain Phillips 0002 |
Honey Plotter and the Web of Terror. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Ruo Ando, Youki Kadobayashi, Yoichi Shinoda |
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Asynchronous snapshot, paravirtualized VMM, memory forensics, virtualized interruption, split kernel module |
11 | George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk |
An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). |
PM2HW2N |
2007 |
DBLP DOI BibTeX RDF |
handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes |
11 | Qiong Huang 0001, Duncan S. Wong |
Generic Certificateless Encryption in the Standard Model. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, Edwin Hsing-Mean Sha |
Parallel Network Intrusion Detection on Reconfigurable Platforms. |
EUC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Je Hong Park, Bo Gyeong Kang |
Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006. |
EUC Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Andreas Holzer, Johannes Kinder, Helmut Veith |
Using Verification Technology to Specify and Detect Malware. |
EUROCAST |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Wen Ji, Shoubao Yang, Dong Wei 0015, Weina Lu |
GARM: A Group - Anonymity Reputation Model in Peer-to-Peer System. |
GCC |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Jirí Moninec, Tomás Dymácek, David Medvigy |
High-Performance Agent System for Intrusion Detection in Backbone Networks. |
CIA |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Arati Baliga, Pandurang Kamat, Liviu Iftode |
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Hiroki Hisamitsu, Keiji Takeda |
The Security Analysis of e-Voting in Japan. |
VOTE-ID |
2007 |
DBLP DOI BibTeX RDF |
e-voting system, e-voting operation, e-voting |
11 | Souvik Ray, Giora Slutzki, Zhao Zhang |
Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach. |
ICPP |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici |
Host Based Intrusion Detection using Machine Learning. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 7297 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|