The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Worms with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1997 (21) 1998-2002 (21) 2003 (32) 2004 (67) 2005 (129) 2006 (115) 2007 (124) 2008 (94) 2009 (60) 2010 (26) 2011 (22) 2012-2013 (27) 2014 (16) 2015-2016 (20) 2017-2019 (22) 2020-2022 (18) 2023-2024 (13)
Publication types (Num. hits)
article(216) incollection(8) inproceedings(603)
Venues (Conferences, Journals, ...)
WORM(35) IEEE Secur. Priv.(18) ACSAC(15) RAID(15) CoRR(14) Comput. Secur.(13) CCS(9) DIMVA(9) ICC(9) IEEE Trans. Parallel Distribut...(9) INFOCOM(9) IPCCC(9) ISI(9) J. Comput. Virol.(8) PADS(8) Computer(7) More (+10 of total 437)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 783 occurrences of 399 keywords

Results
Found 836 publication records. Showing 827 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
9Hiroaki Kikuchi, Naoya Fukuno, Masato Terada, Norihisa Doi Principal Components of Port-Address Matrices in Port-Scan Analysis. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Konrad Rieck, Stefan Wahl, Pavel Laskov, Peter Domschitz, Klaus-Robert Müller A Self-learning System for Detection of Anomalous SIP Messages. Search on Bibsonomy IPTComm The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Marc Lelarge, Jean Bolot Network externalities and the deployment of security features and protocols in the internet. Search on Bibsonomy SIGMETRICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, game theory, economics, price of anarchy, epidemics, cascading
9Thomas Panas Signature visualization of software binaries. Search on Bibsonomy SOFTVIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malware visualization, binary analysis
9Noriaki Kamiyama, Tatsuya Mori, Ryoichi Kawahara, Shigeaki Harada, Hideaki Yoshino Extracting Worm-Infected Hosts Using White List. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Yu Zhang 0003, Tao Li, Jia Sun, Renchao Qin An FSM-Based Approach for Malicious Code Detection Using the Self-Relocation Gene. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF self-relocation gene, finite-state machine, malicious code detection
9Kandha Sankarpandian, Travis Little, W. Keith Edwards Talc: using desktop graffiti to fight software vulnerability. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF usable security, internet security, software vulnerabilities, security framework, patch management, home users, graffiti
9Chia-Tien Dan Lo, Yi-Gang Tai Highly Space Efficient Counters for Perl Compatible Regular Expressions in FPGAs. Search on Bibsonomy ARC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9M. Zubair Shafiq, Muddassar Farooq, Syed Ali Khayam A Comparative Study of Fuzzy Inference Systems, Neural Networks and Adaptive Neuro Fuzzy Inference Systems for Portscan Detection. Search on Bibsonomy EvoWorkshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information Theoretic Features, Portscan Detection, Neural Networks, Adaptive Neuro Fuzzy Inference System (ANFIS)
9Tobias Eggendorfer Application Level Proxies on Bridges. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Network, Proxy, Bridge, Content Filter
9Lorenzo Martignoni, Elizabeth Stinson, Matt Fredrikson, Somesh Jha, John C. Mitchell A Layered Architecture for Detecting Malicious Behaviors. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Dynamic, Malware, Behavior, Data-Flow, Semantic Gap
9Milan Vojnovic, Varun Gupta, Thomas Karagiannis, Christos Gkantsidis Sampling Strategies for Epidemic-Style Information Dissemination. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Sirui Yang, Hai Jin 0001, Xiaofei Liao, Sanmin Liu Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Rose Epidemic, Modeling, Social Network, Portable Device
9Fabrizio Baiardi, Daniele Sgandurra Secure Sharing of an ICT Infrastructure through Vinci. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Ahmad Ghanbari, Ali Rostami, Sayyed Mohammad Reza Sayyed Noorani, Mir Masoud Seyyed Fakhrabadi Modeling and Simulation of Inchworm Mode Locomotion. Search on Bibsonomy ICIRA (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Inchworm robot, Crawling locomotion, Simulation, Manipulator, Close loop, Trajectory generation
9Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov Learning and Classification of Malware Behavior. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Ting-Fang Yen, Michael K. Reiter Traffic Aggregation for Malware Detection. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Narisa Zhao, Xianfeng Zhang The Worm Propagation Model and Control Strategy Based on Distributed Honeynet. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9M. Eric Johnson, Dan McGuire, Nicholas D. Willey The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Hao Tu, Zhitang Li, Bin Liu 0013 Mining Network Traffic for Worm Signature Extraction. Search on Bibsonomy FSKD (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera MAISim: mobile agent malware simulator. Search on Bibsonomy SimuTools The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer attacks, security, simulation, mobile agents, malware, critical infrastructures, ACM proceedings
9Xinghui Wang, Du Xu An Efficient Sequence Alignment Algorithm of Network Traffic. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Jan Tozicka, Stepán Urban, Magdalena Prokopová, Michal Pechoucek Filter Allocation Using Iterative ECNP. Search on Bibsonomy CIA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Sirui Yang, Hai Jin 0001, Bo Li 0001, Xiaofei Liao, Hong Yao, Xuping Tu The Content Pollution in Peer-to-Peer Live Streaming Systems: Analysis and Implications. Search on Bibsonomy ICPP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
9Huidong Jin 0001, Olivier Y. de Vel, Ke Zhang, Nianjun Liu Knowledge Discovery from Honeypot Data for Monitoring Malicious Attacks. Search on Bibsonomy Australasian Conference on Artificial Intelligence The full citation details ... 2008 DBLP  DOI  BibTeX  RDF density-based cluster visualisation, honeypot data, Knowledge discovery, outlier detection, botnet, Internet security
9Ramana Rao Kompella, Sumeet Singh, George Varghese On scalable attack detection in the network. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF data structures, denial of service, routers, scanning, streaming algorithms, network attacks, syn flooding
9Gianni La Spina, Michael Sfakiotakis, Dimitris P. Tsakiris, Arianna Menciassi, Paolo Dario Polychaete-Like Undulatory Robotic Locomotion in Unstructured Substrates. Search on Bibsonomy IEEE Trans. Robotics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Gary McGraw Silver Bullet Talks with Mikko Hypponen [Interview]. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Markos Avlonitis, Emmanouil Magkos, Michalis Stefanidakis, Vassilios Chrissikopoulos A spatial stochastic model for worm propagation: scale effects. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Vinoo Thomas, Nitin Jyoti Bot countermeasures. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Radu State, Olivier Festor Malware: a future framework for device, network and service management. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Attila Ondi, Richard Ford How good is good enough? Metrics for worm/anti-worm evaluation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Chunhe Xia, Yunping Shi, Xiaojian Li, Wei Gao P2P worm detection based on application identification. Search on Bibsonomy Frontiers Comput. Sci. China The full citation details ... 2007 DBLP  DOI  BibTeX  RDF P2P worm, worm detection, application identification
9Ram Dantu, João W. Cangussu, Sudeep Patwardhan Fast Worm Containment Using Feedback Control. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF general, network-level security and protection, Computer systems organization, computer systems organization, process control systems, special-purpose and application-based systems, communication/networking and information technology
9Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Gerhard Münz, Georg Carle Real-time Analysis of Flow Data for Network Attack Detection. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Tyrone Tai-On Kwok, Yu-Kwong Kwok Design and Evaluation of Parallel String Matching Algorithms for Network Intrusion Detection Systems. Search on Bibsonomy NPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan J. Eidenbenz, Vincent Q. Vu Bluetooth worm propagation: mobility pattern matters! Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF memory corruption, debugging, vulnerability analysis
9Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein Highly efficient techniques for network forensics. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF payload attribution, bloom filter, network forensics
9Michael Sfakiotakis, Dimitris P. Tsakiris, Kostas Karakasiliotis Polychaete-like Pedundulatory Robotic Locomotion. Search on Bibsonomy ICRA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jean-Jacques Quisquater The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? Search on Bibsonomy SSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Yang Xiang, Qiang Li 0008 Online Tracing Scanning Worm with Sliding Window. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Propagation path, Online tracing, Detection window, Worm
9Hanchuan Peng, Fuhui Long, Eugene W. Myers Straightening Worm Images. Search on Bibsonomy ISBI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jayamsakthi Shanmugam, M. Ponnavaikko A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Application-level web Security, cross-site scripting, security vulnerabilities
9Trevor Jim, Nikhil Swamy, Michael Hicks 0001 Defeating script injection attacks with browser-enforced embedded policies. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF script injection, cross-site scripting, web application security
9Leon Moonen, Spiros Mancoridis International Workshop on Code Based Software Security Assessments - CoBaSSA 2007. Search on Bibsonomy WCRE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Sangjin Kim, Changyong Lee, Daeyoung Kim 0004, Heekuck Oh A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols. Search on Bibsonomy ICDCIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jintao Xiong PID: A Queue Management Scheme for Improving Network Resilience Under Worm Attacks. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jun Li 0001, Dejing Dou, Shiwoong Kim, Han Qin, Yibo Wang On Knowledge-Based Classification of Abnormal BGP Events. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Bing Wu, Xiao-chun Yun, Xiang Cui Study on Worm Poisoning Technology. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Like Zhang, Gregory B. White An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Tutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira Performance Evaluation of a Multi-Stage Network Event Detection Scheme for Decreasing the False-Positive Rate for a Large Number of Simultaneous, Unknown Events. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi-Stage Network Anomaly Detection, Change-Point Detection, Large-Scale Simultaneous Event, Worm, Virus
9M. Patrick Collins, Michael K. Reiter Hit-List Worm Detection and Bot Identification in Large Networks Using Protocol Graphs. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly detection, Graph analysis, Large networks
9Jérôme François, Radu State, Olivier Festor Malware Models for Network and Service Management. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Jan Goebel, Thorsten Holz, Carsten Willems Measurement and Analysis of Autonomous Spreading Malware in a University Environment. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malware, Honeypots, Invasive Software
9Jon B. Weissman, Vipin Kumar 0001, Varun Chandola, Eric Eilertson, Levent Ertöz, György J. Simon, Seonho Kim, Jinoh Kim DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Data mining, Grid Computing
9George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). Search on Bibsonomy PM2HW2N The full citation details ... 2007 DBLP  DOI  BibTeX  RDF handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes
9Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda Design Issues of an Isolated Sandbox Used to Analyze Malwares. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Like Zhang, Gregory B. White Analysis of Payload Based Application level Network Anomaly Detection. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, Edwin Hsing-Mean Sha Parallel Network Intrusion Detection on Reconfigurable Platforms. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Andreas Holzer, Johannes Kinder, Helmut Veith Using Verification Technology to Specify and Detect Malware. Search on Bibsonomy EUROCAST The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Insu Kim, Keecheon Kim Secure Session Management Mechanism in VoIP Service. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion A Classification of Viruses Through Recursion Theorems. Search on Bibsonomy CiE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF iteration theorem, polymorphism, propagation, Computer viruses, recursion theorem
9Rui Joaquim, Carlos Ribeiro CodeVoting Protection Against Automatic Vote Manipulation in an Uncontrolled Environment. Search on Bibsonomy VOTE-ID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF vote manipulation, Internet voting
9Young-Gab Kim, Jongin Lim 0001 HMM-Based Approach for Evaluating Risk Propagation. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Geon Woo Kim 0001, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim Security Framework for Home Network: Authentication, Authorization, and Security Policy. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Authentication, Access Control, Authorization, Security Policy, Home Network
9John Leslie King Dig the Dirt. (PDF / PS) Search on Bibsonomy Virtuality and Virtualization The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Erhan J. Kartaltepe, T. Paul Parker, Shouhuai Xu How to Secure Your Email Address Book and Beyond. Search on Bibsonomy CANS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF self-spreading malicious emails, self-replicating malicious emails, email address book, encryption
9Thomas Gamer, Michael Scharf, Marcus Schöller Collaborative Anomaly-Based Attack Detection. Search on Bibsonomy IWSOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Srivaths Ravi 0001, Stefan Mangard Tutorial T1: Designing Secure SoCs. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Lien Deboosere, J. De Wachter, Pieter Simoens, Filip De Turck, Bart Dhoedt, Piet Demeester Thin Client Computing Solutions in Low- and High-Motion Scenarios. Search on Bibsonomy ICNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Yu Jin 0001, Zhi-Li Zhang, Kuai Xu, Feng Cao, Sambit Sahu Identifying and tracking suspicious activities through IP gray space analysis. Search on Bibsonomy MineNet The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IP gray space, entropy, anomaly detection, profiling, network traffic analysis
9Jianwei Zhuge, Thorsten Holz, Xinhui Han, Chengyu Song, Wei Zou Collecting Autonomous Spreading Malware Using High-Interaction Honeypots. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion Detection Systems, Malware, Honeypots
9Xian Xu 0001 P Systems and Finite Automata. Search on Bibsonomy CISIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Zhuowei Li 0001, Amitabha Das, Jianying Zhou 0001 Towards Automatic Assembly of Privacy-Preserved Intrusion Signatures. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang 0002, Chi-Sung Laih Generating Attack Scenarios with Causal Relationship. Search on Bibsonomy GrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
9Bradley K. Jensen, Melinda Cline, Carl Stephen Guynes Teaching the undergraduate CS Information Security Course. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF teaching information security, intrusion detection, malware, information assurance
9Jisheng Wang, David J. Miller 0001, George Kesidis Efficient Mining of the Multidimensional Traffic Cluster Hierarchy for Digesting, Visualization, and Anomaly Identification. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Phillip A. Porras Privacy-Enabled Global Threat Monitoring. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Hong Yan 0002, Hui Zhang 0001, Kunwadee Sripanidkulchai, Zon-Yin Shae, Debanjan Saha Information leak vulnerabilities in SIP implementations. Search on Bibsonomy IEEE Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang 0001 A Multi-Resolution Approach for Worm Detection and Containment. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Bo Zhu, Sanjeev Setia, Sushil Jajodia Providing witness anonymity in peer-to-peer systems. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF k-times, witness anonymity, privacy, peer-to-peer systems, anonymous authentication
9Murat Can Ganiz, Sudhan Kanitkar, Mooi Choo Chuah, William M. Pottenger Detection of Interdomain Routing Anomalies Based on Higher-Order Path Analysis. Search on Bibsonomy ICDM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Thomas W. Reps, Gogul Balakrishnan, Junghee Lim Intermediate-representation recovery from low-level code. Search on Bibsonomy PEPM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Jan Camenisch Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Simon P. Chung, Aloysius K. Mok The LAIDS/LIDS Framework for Systematic IPS Design. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Minho Sung, Abhishek Kumar 0003, Li (Erran) Li, Jia Wang 0001, Jun (Jim) Xu Scalable and Efficient Data Streaming Algorithms for Detecting Common Content in Internet Traffic. Search on Bibsonomy ICDE Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9David Haussler Ultraconserved Elements, Living Fossil Transposons, and Rapid Bursts of Change: Reconstructing the Uneven Evolutionary History of the Human Genome. Search on Bibsonomy RECOMB The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun Traffic Anomaly Detection and Characterization in the Tunisian National University Network. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Temporal Characteristics, Principal Component Analysis, Anomaly Detection
9Gene Myers Imaging-Based Systems Biology. Search on Bibsonomy HiPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Michael Jarrett, Rudolph E. Seviora Diversity to Enhance Autonomic Computing Self-Protection. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Leon Moonen, Spiros Mancoridis Code Based Software Security Assessments. Search on Bibsonomy WCRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Thodoros Komninos, Yannis C. Stamatiou, G. Vavitsas A Worm Propagation Model Based on People's Email Acquaintance Profiles. Search on Bibsonomy WINE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Moez Draief, Ayalvadi J. Ganesh, Laurent Massoulié Thresholds for virus spread on networks. Search on Bibsonomy VALUETOOLS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SIR epidemic, largest connected component, random graphs, spectral radius
9Carrie Gates, Joshua J. McNutt, Joseph B. Kadane, Marc I. Kellner Scan Detection on Very Large Networks Using Logistic Regression Modeling. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
9Simon P. Chung, Aloysius K. Mok Allergy Attack Against Automatic Signature Generation. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Automatic Signature Generation, Adaptive Response, Intrusion Prevention
Displaying result #601 - #700 of 827 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license