The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Malicious with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1990 (17) 1991-1994 (15) 1995-1996 (19) 1997 (16) 1998 (34) 1999 (27) 2000 (47) 2001 (76) 2002 (100) 2003 (164) 2004 (264) 2005 (382) 2006 (463) 2007 (508) 2008 (584) 2009 (410) 2010 (169) 2011 (158) 2012 (173) 2013 (182) 2014 (208) 2015 (229) 2016 (261) 2017 (276) 2018 (369) 2019 (348) 2020 (394) 2021 (441) 2022 (395) 2023 (443) 2024 (125)
Publication types (Num. hits)
article(2248) book(8) data(5) incollection(29) inproceedings(4933) phdthesis(62) proceedings(12)
Venues (Conferences, Journals, ...)
CoRR(363) MALWARE(192) IACR Cryptol. ePrint Arch.(98) IEEE Access(90) ACSAC(85) CCS(70) Comput. Secur.(61) ICC(58) ARES(55) SAC(50) RAID(43) DSN(39) GLOBECOM(37) Sensors(37) ICDCS(35) Wirel. Pers. Commun.(35) More (+10 of total 1903)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3452 occurrences of 1510 keywords

Results
Found 7297 publication records. Showing 7297 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Yanguo Liu, Issa Traoré, Alexander M. Hoole A Service-Oriented Framework for Quantitative Security Analysis of Software Architectures. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Yuan Liang, Hai-Xin Duan An Admission Control Policy Based on Social Networks for P2P Systems. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Aaron Roth 0001 The Price of Malice in Linear Congestion Games. Search on Bibsonomy WINE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Frédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas A Robust Reputation Scheme for Decentralized Group Management Systems. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Pierre Parrend, Stéphane Frénot Classification of Component Vulnerabilities in Java Service Oriented Programming (SOP) Platforms. Search on Bibsonomy CBSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Kun Wang, Meng Wu, Subin Shen A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11A. Tanoue, Makoto Shimamura, Miyuki Hanaoka, Kenji Kono FlexBox: Sandboxing internet servers based on layer-7 contexts. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Thibault Cholez, Isabelle Chrisment, Olivier Festor A Distributed and Adaptive Revocation Mechanism for P2P Networks. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF revocation mechanism, remote accounts, P2P networks, reputation mechanism, KAD
11Nauman Mazhar, Muddassar Farooq A sense of danger: dendritic cells inspired artificial immune system for manet security. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF misbehavior detection, mobile ad hoc networks, self organization, artificial immune systems, dendritic cells
11Elias Athanasopoulos, A. Makridakis, Spyros Antonatos, Demetres Antoniades, Sotiris Ioannidis, Kostas G. Anagnostakis, Evangelos P. Markatos Antisocial Networks: Turning a Social Network into a Botnet. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Ashish Kamra, Elisa Bertino Database Intrusion Detection and Response. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Shang-Lin Hsieh, Pei-Da Wu, I-Ju Tsai, Bin-Yuan Huang A Recoverable Semi-fragile Watermarking Scheme Using Cosine Transform and Adaptive Median Filter. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integrity of images protection, adaptive median filter, tampered detection and recovery, discrete cosine transform, Semi-fragile watermarking
11Xiaowei Chen, Kaiyong Zhao, Xiaowen Chu 0001 SepRep: A Novel Reputation Evaluation Model in Peer-to-Peer Networks. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang Efficient Disjointness Tests for Private Datasets. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Private Set Disjointness, Private Matching, Secure Multi-Party Computation
11Najwa Aaraj, Anand Raghunathan, Niraj K. Jha Dynamic Binary Instrumentation-Based Framework for Malware Defense. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF control-data flow, execution context, dynamic binary instrumentation, virtualization, Malware
11Jianli Hu, Quanyuan Wu, Bin Zhou 0004 Distributed and Effective Reputation Mechanism in P2P Systems. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Wei Zhou 0011, Jianjun Yu, Gang Xue, Shaowen Yao 0001, Guowei Yu A Novel Reputation-Based Trust Architecture for P2P E-Commerce Systems. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Qiang Zhang, Ying Zhuo, Zhenghu Gong A Trust Inspection Model Based on Society Behavior Similarity Rule in Dynamic Networks. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Wen Ji, Shoubao Yang, Fuli Liu Sustained Online Duration - based Reputation Management for File-Sharing Peer-to-Peer Systems. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Giovanni Russello, Changyu Dong, Naranker Dulay, Michel R. V. Chaudron, Maarten van Steen Encrypted Shared Data Spaces. Search on Bibsonomy COORDINATION The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Xiaoxiao Wang 0001, Hassan Salmani, Mohammad Tehranipoor, James F. Plusquellic Hardware Trojan Detection and Isolation Using Current Integration and Localized Current Analysis. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Felix Halim, Yongzheng Wu, Roland H. C. Yap Security Issues in Small World Network Routing. Search on Bibsonomy SASO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Emmanuelle Anceaume, Romaric Ludinard, Aina Ravoaja, Francisco Vilar Brasileiro PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn. Search on Bibsonomy SASO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Jiajun Zhu, Jonathan Z. Bakdash, David Koller, Thomas Banton, Dennis Proffitt, Greg Humphreys Quantifying usability in secure graphics: assessing the user costs of protecting 3D content. Search on Bibsonomy APGV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure graphics, usability, perception, 3D reconstruction
11Wei Han, Tao Hao, Dong Zheng 0001, Kefei Chen, Xiaofeng Chen 0001 A Tamper-Evident Voting Machine Resistant to Covert Channels. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tamper-evident, receipt-free, electronic voting, covert channel
11Yongsheng Hao, Yuebin Xu, Guanfeng Liu 0001, Zhenkuan Pan 0001 A New Grid Resource Management Mechanism Based on D-S Theory. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF turst, Grid computing, resource scheduling
11Yonesy F. Nunez Maximizing an Organization's Information Security Posture by Distributedly Assessing and Remedying System Vulnerabilities. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Mehmet S. Kiraz, Berry Schoenmakers An Efficient Protocol for Fair Secure Two-Party Computation. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Bo Zhu 0001, Kui Ren 0001, Lingyu Wang 0001 Anonymous Misbehavior Detection in Mobile Ad Hoc Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Guorui Li, Jingsha He, Yingfang Fu A Distributed Intrusion Detection Scheme for Wireless Sensor Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Francis M. David, Ellick Chan, Jeffrey C. Carlyle, Roy H. Campbell Cloaker: Hardware Supported Rootkit Concealment. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, operating system, rootkit, ARM
11Davide Balzarotti, Marco Cova, Viktoria Felmetsger, Nenad Jovanovic, Engin Kirda, Christopher Kruegel, Giovanni Vigna Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Jiang Bian 0002, Yandong Liu, Eugene Agichtein, Hongyuan Zha A few bad votes too many?: towards robust ranking in social media. Search on Bibsonomy AIRWeb The full citation details ... 2008 DBLP  DOI  BibTeX  RDF vote spam, robustness, ranking, social media, community question answering
11Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, Amit Sahai Cryptography with constant computational overhead. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF constant computational overhead, cryptography, universal hashing
11Furong Wang, Chen Huang 0003, Jing Zhao, Chunming Rong IDMTM: A Novel Intrusion Detection Mechanism Based on Trust Model for Ad Hoc Networks. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF trust, Ad hoc, evidence, intrusion
11Yongyuth Permpoontanalarp, Jatupoom Kanokkanjanapong Dynamic Undeniable Fair Certified Email with DDoS Protection. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptographic Protocols, Fair Exchange Protocol, Certified Email
11Le-Hung Vu, Karl Aberer Effective Usage of Computational Trust Models in Rational Environments. Search on Bibsonomy Web Intelligence The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Roberto Perdisci, Andrea Lanzi, Wenke Lee McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Xinxin Fan, Guang Gong Key revocation based on Dirichlet multinomial model for mobile ad hoc networks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Joan Arnedo-Moreno, Jordi Herrera-Joancomartí Persistent Interoperable Security for JXTA Advertisements. Search on Bibsonomy CISIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Dimitris Geneiatakis, Georgios Kambourakis, Costas Lambrinoudakis A Mechanism for Ensuring the Validity and Accuracy of the Billing Services in IP Telephony. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Session Initiation Protocol (SIP), Voice Over IP (VoIP), Billing
11Paul C. van Oorschot, Tao Wan 0004, Evangelos Kranakis On interdomain routing security and pretty secure BGP (psBGP). Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, trust, certificates, BGP, public-key infrastructure, interdomain routing, secure routing protocols
11Runfang Zhou, Kai Hwang 0001 PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF eBay trace data set, distributed file sharing, P2P Grids, PSA benchmark, system scalability, distributed hash table, overlay network, Peer-to-Peer system, reputation system
11Shuiming Ye, Qibin Sun, Ee-Chien Chang Statistics- and Spatiality-Based Feature Distance Measure for Error Resilient Image Authentication. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Feature Distance Measure, Digital Signature, Digital Watermarking, Error Concealment, Image Authentication, Image Transmission
11Kui Wu 0001, Chong Liu 0001, Jianping Pan 0001, Dandan Huang Robust Range-Free Localization in Wireless Sensor Networks. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wireless sensor networks, reliability, range-free localization
11Gary McGraw Silver Bullet Talks with Mikko Hypponen [Interview]. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11William H. Allen Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Daniel Bilar On callgraphs and generative mechanisms. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Daniel Bilar On callgraphs and generative mechanisms. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Joseph Chee Ming Teo, Chik How Tan, Jim Mee Ng Denial-of-service attack resilience dynamic group key agreement for heterogeneous networks. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authenticated group key agreement, Dynamic group membership, Heterogeneous networks, Secure group communication, DoS attacks
11Raphael Eidenbenz, Yvonne Anne Oswald, Stefan Schmid 0001, Roger Wattenhofer Manipulation in Games. Search on Bibsonomy ISAAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Takashi Nanya Challenges in Dependability of Networked Systems for Information Society. Search on Bibsonomy NPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Mooi Choo Chuah, Peng Yang, Jianbin Han A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Zhu Han 0001, Yan Lindsay Sun Securing Cooperative Transmission in Wireless Communications. Search on Bibsonomy MobiQuitous The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Soshant Bali, Sridhar Machiraju, Hui Zang, Victor Frost A Measurement Study of Scheduler-Based Attacks in 3G Wireless Networks. Search on Bibsonomy PAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Md. Nurul Islam, Atsuhi Kara Using SCTP to Implement Multihomed Web Servers. Search on Bibsonomy DNIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Transport Protocol, Stream Control Transmission Protocol, Multihoming
11Tyler Moore 0001, Jolyon Clulow Secure Path-Key Revocation for Symmetric Key Pre-distribution Schemes in Sensor Networks. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11John Haggerty, Mark John Taylor FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Donald P. Cox, Youssif B. Al-Nashif, Salim Hariri Application of autonomic agents for global information grid management and security. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF autonomia, global information grid, net-centric warfare, network security, autonomic agents
11Yongdong Wu, Feng Bao 0001, Robert H. Deng, Marc Mouffron, Frederic Rousseau 0002 Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Mayuresh Ektare, Yanxia Yang The Balancing Act Between Computer Security and Convenience. Search on Bibsonomy HCI (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF convenience, user experience, Computer security, user behavior, Spyware, Viruses
11Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Pavel Minarík, David Medvigy Collaborative Attack Detection in High-Speed Networks. Search on Bibsonomy CEEMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Zhitang Li, Shudong Shi A Secure Routing Protocol for Mobile Ad hoc Networks. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Andrew Bortz, Dan Boneh Exposing private information by timing web applications. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF web browser design, privacy, phishing, web application security, web spoofing
11Vasileios Karyotis, Symeon Papavassiliou, Mary Grammatikou On the Risk-Based Operation of Mobile Attacks in Wireless Ad Hoc Networks. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Xu Su, Rajendra V. Boppana On Mitigating In-band Wormhole Attacks in Mobile Ad Hoc Networks. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Keith B. Frikken Privacy-Preserving Set Union. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11S. Venkatesan 0002, Chenniappan Chellappan Recovery model for free-roaming mobile agent against multiple attacks. Search on Bibsonomy MobiMedia The full citation details ... 2007 DBLP  DOI  BibTeX  RDF agent recovery, colluded attacks, free-roaming mobile agent, k-response, offer recovery
11Like Zhang, Gregory B. White An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Runfang Zhou, Kai Hwang 0001 Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Yiduo Mei, Shangyuan Guan, Xiaoshe Dong, Siyuan Ma, Zhao Wang 0001 A Framework for Reputation Management in Large-Scale Distributed Systems. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF peer-to-peer network, reputation management, large-scale distributed system
11Hesiri Weerasinghe, Huirong Fu Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cooperative Black Hole attack, MANET, AODV
11Weijia Yang, Shangteng Huang Privacy Preserving Clustering for Multi-party. Search on Bibsonomy DASFAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Emmanuel Bresson, Dario Catalano, Rosario Gennaro Improved On-Line/Off-Line Threshold Signatures. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Mehmet S. Kiraz, Berry Schoenmakers, José Villegas Efficient Committed Oblivious Transfer of Bit Strings. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Committed oblivious transfer, Commitments, Homomorphic encryption
11Yufeng Wang 0001, Yoshiaki Hori, Kouichi Sakurai An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Li Weng, Bart Preneel Attacking Some Perceptual Image Hash Algorithms. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Nilufer Tuptuk, Emil Lupu Risk Based Authorisation for Mobile Ad Hoc Networks. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Mobile Ad Hoc Network, Trust, Authorisation, Bayesian Belief Networks
11Qiong Huang 0001, Duncan S. Wong Generic Certificateless Key Encapsulation Mechanism. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Hae Young Lee, Tae Ho Cho Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Manu Kumar, Tal Garfinkel, Dan Boneh, Terry Winograd Reducing shoulder-surfing by using gaze-based password entry. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF gaze-based password entry, password entry, eye tracking, shoulder surfing
11Jiping Zheng 0001, Xiaolin Qin, Jin Sun Data Dependency Based Recovery Approaches in Survival Database Systems. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Marie Kim, YoungJun Lee, Jaecheol Ryou 0001 What Are Possible Security Threats in Ubiquitous Sensor Network Environment? Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF middleware, security threat, USN
11Theodor Richardson, Chin-Tser Huang Containing Hitlist-Based Worms with Polymorphic Signatures. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Mark S. Withall, M. Shirantha de Silva, David J. Parish, Iain Phillips 0002 Honey Plotter and the Web of Terror. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Ruo Ando, Youki Kadobayashi, Yoichi Shinoda Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Asynchronous snapshot, paravirtualized VMM, memory forensics, virtualized interruption, split kernel module
11George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). Search on Bibsonomy PM2HW2N The full citation details ... 2007 DBLP  DOI  BibTeX  RDF handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes
11Qiong Huang 0001, Duncan S. Wong Generic Certificateless Encryption in the Standard Model. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, Edwin Hsing-Mean Sha Parallel Network Intrusion Detection on Reconfigurable Platforms. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Je Hong Park, Bo Gyeong Kang Security Analysis of the Certificateless Signature Scheme Proposed at SecUbiq 2006. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Andreas Holzer, Johannes Kinder, Helmut Veith Using Verification Technology to Specify and Detect Malware. Search on Bibsonomy EUROCAST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Wen Ji, Shoubao Yang, Dong Wei 0015, Weina Lu GARM: A Group - Anonymity Reputation Model in Peer-to-Peer System. Search on Bibsonomy GCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Martin Rehák, Michal Pechoucek, Pavel Celeda, Vojtech Krmicek, Jirí Moninec, Tomás Dymácek, David Medvigy High-Performance Agent System for Intrusion Detection in Backbone Networks. Search on Bibsonomy CIA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Arati Baliga, Pandurang Kamat, Liviu Iftode Lurking in the Shadows: Identifying Systemic Threats to Kernel Data. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Hiroki Hisamitsu, Keiji Takeda The Security Analysis of e-Voting in Japan. Search on Bibsonomy VOTE-ID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-voting system, e-voting operation, e-voting
11Souvik Ray, Giora Slutzki, Zhao Zhang Incentive-Driven P2P Anonymity System: A Game-Theoretic Approach. Search on Bibsonomy ICPP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Robert Moskovitch, Shay Pluderman, Ido Gus, Dima Stopel, Clint Feher, Yisrael Parmet, Yuval Shahar, Yuval Elovici Host Based Intrusion Detection using Machine Learning. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 7297 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license