|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 774 occurrences of 392 keywords
|
|
|
Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna |
Tracking Memory Writes for Malware Classification and Code Reuse Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 134-143, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna |
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 102-122, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Christian Rossow, Christian J. Dietrich, Herbert Bos |
Large-Scale Analysis of Malware Downloaders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 42-61, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Brian Schulte, Haris Andrianakis, Kun Sun 0001, Angelos Stavrou |
NetGator: Malware Detection Using Program Interactive Challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 164-183, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Yongzheng Wu, Roland H. C. Yap |
Experiments with Malware Visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 123-133, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Patrick Stewin, Iurii Bystrov |
Understanding DMA Malware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 21-41, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu |
Using File Relationships in Malware Classification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment - 9th International Conference, DIMVA 2012, Heraklion, Crete, Greece, July 26-27, 2012, Revised Selected Papers, pp. 1-20, 2012, Springer, 978-3-642-37299-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir |
Investigation of bypassing malware defences and malware detections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: 7th International Conference on Information Assurance and Security, IAS 2011, Melacca, Malaysia, December 5-8, 2011, pp. 173-178, 2011, IEEE, 978-1-4577-2154-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Damiano Bolzoni, Christiaan Schade, Sandro Etalle |
A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LISA ![In: The Past, Present, and Future of System Administration: Proceedings of the 25th Large Installation System Administration Conference, LISA 2011, Boston, MA, USA, December 4-9, 2011, 2011, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
18 | Graham Cluley |
Sizing up the malware threat - key malware trends for 2010. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Netw. Secur. ![In: Netw. Secur. 2010(4), pp. 8-10, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Cory Q. Nguyen, James E. Goldman |
Malware analysis reverse engineering (MARE) methodology & malware defense (M.D.) timeline. ![Search on Bibsonomy](Pics/bibsonomy.png) |
InfoSecCD ![In: Information Security Curriculum Development Conference, InfoSecCD 2010, Kennesaw, GA, USA, October 1-3, 2010, pp. 8-14, 2010, ACM, 978-1-4503-0202-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao |
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 92-D(5), pp. 945-954, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Martin Johns, Justus Winter |
Protecting the Intranet Against "JavaScript Malware" and Related Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 4th International Conference, DIMVA 2007, Lucerne, Switzerland, July 12-13, 2007, Proceedings, pp. 40-59, 2007, Springer, 978-3-540-73613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Heiko Fangmeier, Michel Messerschmidt, Fabian Müller, Jan Seedorf |
Risiken der Nichterkennung von Malware in komprimierter Form. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware & Vulnerability Assessment, GI SIG SIDAR Workshop, DIMVA 2004, Dortmund, Germany, July 6.7, 2004, Proceedings, pp. 201-211, 2004, GI, 3-88579-375-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
15 | Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, Yan Chen 0004 |
Security Issues in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 15(4), pp. 56-63, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
structural attacks, malware attacks, survey, online social networks, security & privacy |
15 | Saeed Abu-Nimeh, Thomas M. Chen, Omar A. Alzubi |
Malicious and Spam Posts in Online Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 44(9), pp. 23-28, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Uniform resource locators, Security, Spam, Malware, Facebook, Online social networks, URLs |
15 | Charlie Miller |
Mobile Attacks and Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 9(4), pp. 68-70, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
jailbreaking, App Store, Android Market, data execution prevention, DEP, address space layout randomization, ASLR, computer security, malware, SMS, smart phone, Android, iPhone, sandbox, iOS |
15 | Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada, Nur Rohman Rosyid |
Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: The 14th International Conference on Network-Based Information Systems, NBiS 2011, Tirana, Albania, September 7-9, 2011, pp. 92-97, 2011, IEEE Computer Society, 978-1-4577-0789-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
PrefixSpan, Coordinated Attacks, Malware, Botnets, Apriori |
15 | Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh |
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 11th Annual International Symposium on Applications and the Internet, SAINT 2011, Munich, Germany, 18-21 July, 2011, Proceedings, pp. 1-10, 2011, IEEE Computer Society, 978-1-4577-0531-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
web-based malware, blacklist, drive-by-download |
15 | Bruce Potter |
My Information, Your Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 8(2), pp. 51-53, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
malware protection, mobile code, security and privacy, file formats |
15 | Blake C. Mason, Dipak Ghosal, Cherita L. Corbett |
Evaluation of a Massively Parallel Architecture for Network Security Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, PDP 2010, Pisa, Italy, February 17-19, 2010, pp. 85-91, 2010, IEEE Computer Society, 978-0-7695-3939-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Massively Parallelized Processing Architecture (MPPA), Ambric, entropy function, malware detection, experimental analysis, covert timing channel |
15 | Flavio Lombardi, Roberto Di Pietro |
A Security Management Architecture for the Protection of Kernel Virtual Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 948-953, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Security, Malware, Virtualization technology |
15 | Desmond Lobo, Paul A. Watters, Xin Wen Wu |
RBACS: Rootkit Behavioral Analysis and Classification System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Third International Conference on Knowledge Discovery and Data Mining, WKDD 2010, Phuket, Thailand, 9-10 January 2010, pp. 75-80, 2010, IEEE Computer Society, 978-0-7695-3923-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
data mining, classification, malware, behavioral analysis, rootkits |
15 | Akihiro Shimoda, Tatsuya Mori, Shigeki Goto |
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Tenth Annual International Symposium on Applications and the Internet, SAINT 2010, Seoul, Korea, 19-23 July, 2010, Proceedings, pp. 22-30, 2010, IEEE Computer Society, 978-1-4244-7526-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
low-interaction, unused IP address, malware, honeypot |
15 | George Lawton |
On the Trail of the Conficker Worm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 42(6), pp. 19-22, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Conficker, Malware, Worms, Buffer overflow, Security and privacy |
15 | Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Comput. Sci. ![In: Transactions on Computational Science IV, Special Issue on Security in Computing, pp. 244-262, 2009, Springer, 978-3-642-01003-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information theft detection, Intrusion detection, information theory, malware analysis |
15 | Ahmed Obied, Reda Alhajj |
Fraudulent and malicious sites on the web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Intell. ![In: Appl. Intell. 30(2), pp. 112-120, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Fraudulent, Malicious, Web, Search engines, Spam, Malware, Proxy, Phishing, Crawlers, Pharming |
15 | Ilir Gashi, Vladimir Stankovic 0002, Corrado Leita, Olivier Thonnard |
An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCA ![In: Proceedings of The Eighth IEEE International Symposium on Networking Computing and Applications, NCA 2009, July 9-11, 2009, Cambridge, Massachusetts, USA, pp. 4-11, 2009, IEEE Computer Society, 978-0-7695-3698-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
AntiVirus detection engine analyis, cluster analysis, malware detection |
15 | Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi |
Secure in-VM monitoring using hardware virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 477-487, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel integrity, virtual machines, malware, secure monitoring |
15 | Markus Jakobsson |
Captcha-free throttling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 2nd ACM Workshop on Security and Artificial Intelligence, AISec 2009, Chicago, Illinois, USA, November 9, 2009, pp. 15-22, 2009, ACM, 978-1-60558-781-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cookie theft, dns poisoning, usability, access, malware, scripting, cloning, captcha, throttle |
15 | Tzu-Yen Wang, Chin-Hsiung Wu, Chu-Cheng Hsieh |
Detecting Unknown Malicious Executables Using Portable Executable Headers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NCM ![In: International Conference on Networked Computing and Advanced Information Management, NCM 2009, Fifth International Joint Conference on INC, IMS and IDC: INC 2009: International Conference on Networked Computing, IMS 2009: International Conference on Advanced Information Management and Service, IDC 2009: International Conference on Digital Content, Multimedia Technology and its Applications, Seoul, Korea, August 25-27, 2009, pp. 278-284, 2009, IEEE Computer Society, 978-0-7695-3769-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
previously unseen malware, gain ratio, support vector machine, feature selection, information gain |
15 | Pei-Sheng Huang, Chung-Huang Yang, Tae-Nam Ahn |
Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICHIT ![In: Proceedings of the 2009 International Conference on Hybrid Information Technology, ICHIT 2009, Daejeon, Korea, August 27-29, 2009, pp. 232-238, 2009, ACM, 978-1-60558-662-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection system, firewall, malware, worm, honeypot |
15 | Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono |
On Technical Security Issues in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: IEEE International Conference on Cloud Computing, CLOUD 2009, Bangalore, India, 21-25 September, 2009, pp. 109-116, 2009, IEEE Computer Society, 978-1-4244-5199-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cloud Malware Injection, attacks, WS-Security, TLS, Cloud Computing security |
15 | Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang 0040, Yu Liu |
ReconBin: Reconstructing Binary File from Execution for Software Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Third IEEE International Conference on Secure Software Integration and Reliability Improvement, SSIRI 2009, Shanghai, China, July 8-10, 2009, pp. 222-229, 2009, IEEE Computer Society, 978-0-7695-3758-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software security analysis, binary analysis, execution monitoring, malware analysis |
15 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Multi-aspect profiling of kernel rootkit behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, pp. 47-60, 2009, ACM, 978-1-60558-482-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
kernel rootkit, profiling, malware |
15 | Mosin I. Hasan, Nilesh B. Prajapati |
An Attack Vector for Deception Through Persuasion Used by Hackers and Crakers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NetCoM ![In: First International Conference on Networks and Communications, NetCoM 2009, Chennai, India, December 27-29, 2009, pp. 254-258, 2009, IEEE Computer Society, 978-0-7695-3924-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Malware, Psychology, Spyware, Social Engineering |
15 | Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel |
Noninvasive Methods for Host Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 11(3), pp. 16:1-16:23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
network security, Certification, malware, assurance |
15 | Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni |
A data mining approach for analysis of worm activity through automatic signature generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec ![In: Proceedings of the 1st ACM Workshop on Security and Artificial Intelligence, AISec 2008, Alexandria, VA, USA, October 27, 2008, pp. 61-70, 2008, ACM, 978-1-60558-291-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
automatic signature generation, malware identification, data mining, intrusion detection, honeypots |
15 | Zonghua Zhang, Ruo Ando, Youki Kadobayashi |
Hardening Botnet by a Rational Botmaster. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 348-369, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, malware, botnet |
15 | Sanjam Garg, Huzur Saran |
Anti-DDoS Virtualized Operating System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 667-674, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Performance, Virtualization, Malware, Distributed Denial of Service Attack |
15 | Dawn Xiaodong Song, David Brumley, Heng Yin 0001, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena |
BitBlaze: A New Approach to Computer Security via Binary Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 1-25, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malware analysis and defense, vulnerability analysis and defense, reverse engineering, Binary analysis |
15 | Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh |
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 201-210, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic |
15 | Sébastien Josse |
Secure and advanced unpacking using computer emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 3(3), pp. 221-236, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis |
15 | Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén |
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 142-157, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
malware prevention, Information security, reputation systems |
15 | Bradley K. Jensen, Melinda Cline, Carl Stephen Guynes |
Teaching the undergraduate CS Information Security Course. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 38(2), pp. 61-63, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
teaching information security, intrusion detection, malware, information assurance |
15 | Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel |
A preliminary investigation of worm infections in a bluetooth environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2006 ACM Workshop on Rapid Malcode, WORM 2006, Alexandria, VA, USA, November 3, 2006, pp. 9-16, 2006, ACM Press, 1-59593-551-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Bluetooth, malware, worms |
15 | Johnathon A. Mohr |
The [216: 1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 257-262, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
adaptive support, network access standardization, personal computer security, preventative computing, network security, updates, malware, virus, spyware, remediation, antivirus, adaptive networking |
15 | Ari Juels, Markus Jakobsson, Tom N. Jagatic |
Cache Cookies for Browser Authentication (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2006 IEEE Symposium on Security and Privacy (S&P 2006), 21-24 May 2006, Berkeley, California, USA, pp. 301-305, 2006, IEEE Computer Society, 0-7695-2574-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cache cookies, privacy, personalization, malware, Web browser, phishing, pharming |
15 | Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis |
A multifaceted approach to understanding the botnet phenomenon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 41-52, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
network security, computer security, malware, botnets |
15 | Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker |
Finding diversity in remote code injection exploits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 6th ACM SIGCOMM Internet Measurement Conference, IMC 2006, Rio de Janeriro, Brazil, October 25-27, 2006, pp. 53-64, 2006, ACM, 1-59593-561-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
binary emulation, malware classification, worms, phylogeny, bots |
15 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 38(9), pp. 22-24, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
media distribution, swarmcasting technology, security, malware, worms, entertainment computing, wireless technology, power-aware computing, hackers, communications technology |
15 | Justin Ma, Geoffrey M. Voelker, Stefan Savage |
Self-stopping worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORM ![In: Proceedings of the 2005 ACM Workshop on Rapid Malcode, WORM 2005, Fairfax, VA, USA, November 11, 2005, pp. 12-21, 2005, ACM Press, 1-59593-229-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
self-stop, malware, worms, distributed protocols |
15 | David Dagon, Tom L. Martin, Thad Starner |
Mobile Phones as Computing Devices: The Viruses are Coming! ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 3(4), pp. 11-15, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
bluebugging, mobile phones, malware |
15 | Iván Arce, Gary McGraw |
Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 2(4), pp. 17-19, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
attacking systems, patterns, toolkits, malware, worms, viruses |
15 | Elinor M. Madigan, Corey Petrulich, Kelly Motuk |
The cost of non-compliance: when policies fail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 47-51, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
administrative staff, network policy, network, network security, tools, malware, viruses, backup |
10 | Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu 0001 |
Extracting compiler provenance from program binaries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASTE ![In: Proceedings of the 9th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, PASTE'10, Toronto, Ontario, Canada, June 5-6, 2010, pp. 21-28, 2010, ACM, 978-1-4503-0082-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
program provenance, static binary analysis, forensics |
10 | Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee |
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 101-111, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
fast-flux service network (FFSN), content distribution network (CDN), Botnet, Bayesian network classifier |
10 | Marco Cova, Christopher Krügel, Giovanni Vigna |
Detection and analysis of drive-by-download attacks and malicious JavaScript code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 281-290, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
drive-by-download attacks, web client exploits, anomaly detection |
10 | Sid Stamm, Brandon Sterne, Gervase Markham |
Reining in the web with content security policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 921-930, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
content restrictions, security policy, http, web security |
10 | Omer Demir, Bilal Khan 0002, Ala I. Al-Fuqaha |
Reconstruction of malicious internet flows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCMC ![In: Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, IWCMC 2010, Caen, France, June 28 - July 2, 2010, pp. 1182-1187, 2010, ACM, 978-1-4503-0062-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
flow reconstruction, distributed denial of service |
10 | D. J. Capelis, Darrell D. E. Long |
Fived: a service-based architecture implementation to innovate at the endpoints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2010 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New Delhi, India, August 30 -September 3, 2010, pp. 419-420, 2010, ACM, 978-1-4503-0201-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
fived, session layer, network design, network architecture, sessions |
10 | Arijit Khan 0001, Xifeng Yan, Kun-Lung Wu |
Towards proximity pattern mining in large graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2010, Indianapolis, Indiana, USA, June 6-10, 2010, pp. 867-878, 2010, ACM, 978-1-4503-0032-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
graph, pattern, association, mining |
10 | Virgil D. Gligor |
Architectures for practical security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings, pp. 161-162, 2010, ACM, 978-1-4503-0049-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
architectures |
10 | Sara Motiee, Kirstie Hawkey, Konstantin Beznosov |
Investigating user account control practices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Extended Abstracts Volume, Atlanta, Georgia, USA, April 10-15, 2010, pp. 4129-4134, 2010, ACM, 978-1-60558-930-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
user account control, usable security, least privilege |
10 | Rick Wash |
Folk models of home computer security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
folk models, home security, mental models |
10 | Kyumin Lee, James Caverlee, Steve Webb |
Uncovering social spammers: social honeypots + machine learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2010, Geneva, Switzerland, July 19-23, 2010, pp. 435-442, 2010, ACM, 978-1-4503-0153-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
social honeypots, social media, spam |
10 | Susmit Jha, Sumit Gulwani, Sanjit A. Seshia, Ashish Tiwari 0001 |
Oracle-guided component-based program synthesis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE (1) ![In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, ICSE 2010, Cape Town, South Africa, 1-8 May 2010, pp. 215-224, 2010, ACM, 978-1-60558-719-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
oracle-based learning, SAT, program synthesis, SMT |
10 | Sung-Min Lee 0004, Sang-Bum Suh, Jong-Deok Choi |
Fine-grained I/O access control based on Xen virtualization for 3G/4G mobile devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 47th Design Automation Conference, DAC 2010, Anaheim, California, USA, July 13-18, 2010, pp. 108-113, 2010, ACM, 978-1-4503-0002-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
I/O access control, smart phone security, virtual machine, virtual machine monitor |
10 | Guanhua Yan, Stephan J. Eidenbenz |
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Mob. Comput. ![In: IEEE Trans. Mob. Comput. 8(3), pp. 353-368, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Linda Dailey Paulson |
News Briefs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 42(3), pp. 21-24, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis |
Cybercrime 2.0: when the cloud turns dark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 52(4), pp. 42-47, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Grégoire Jacob, Eric Filiol, Hervé Debar |
Functional polymorphic engines: formalisation, implementation and use cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 5(3), pp. 247-261, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis |
Cybercrime 2.0: When the Cloud Turns Dark. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 7(2), pp. 46-47, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Richard A. DeMillo |
Blighted Virtual Neighborhoods and Other Threats to Online Social Experiences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: Web Information Systems Engineering - WISE 2009, 10th International Conference, Poznan, Poland, October 5-7, 2009. Proceedings, pp. 1-2, 2009, Springer, 978-3-642-04408-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Peishun Liu, Xuefang Wang |
Identification of Malicious Web Pages by Inductive Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISM ![In: Web Information Systems and Mining, International Conference, WISM 2009, Shanghai, China, November 7-8, 2009. Proceedings, pp. 448-457, 2009, Springer, 978-3-642-05249-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Malicious detection, generalization, specialization, inductive learning, drive-by downloads |
10 | Peter Likarish, Eunjin Jung |
A targeted web crawling for building malicious javascript collection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM-DSMM ![In: Proceeding of the ACM First International Workshop on Data-Intensive Software Management and Mining, CIKM-DSMM 2009, Hong Kong, China, November 6, 2009, pp. 23-26, 2009, ACM, 978-1-60558-810-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malicious javascript, security, web crawling |
10 | Joshua Mason, Sam Small, Fabian Monrose, Greg MacManus |
English shellcode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 524-533, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
shellcode, natural language, network emulation |
10 | Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim |
Towards complete node enumeration in a peer-to-peer botnet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 23-34, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
infected hosts enumeration, storm, P2P, botnet |
10 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, STC 2009, Chicago, Illinois, USA, November 13, 2009, pp. 19-28, 2009, ACM, 978-1-60558-788-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
10 | Tyler Moore 0001, Richard Clayton 0001 |
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 13th International Conference, FC 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected Papers, pp. 256-272, 2009, Springer. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Shay Gueron, Jean-Pierre Seifert |
On the Impossibility of Detecting Virtual Machine Monitors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 143-151, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Felix Leder, Peter Martini |
NGBPA Next Generation BotNet Protocol Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Emerging Challenges for Security, Privacy and Trust, 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009. Proceedings, pp. 307-317, 2009, Springer, 978-3-642-01243-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Iván Sánchez Milara, Erno Kuusela, Sebastian Turpeinen, Juha Röning, Jukka Riekki |
Botnet-inspired architecture for interactive spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUM ![In: Proceedings of the 8th International Conference on Mobile and Ubiquitous Multimedia, MUM 2009, Cambridge, United Kingdom, November 22-25, 2009, 2009, ACM, 978-1-60558-846-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
architecture comparison, HCI, remote control, botnets, multimedia services, interactive spaces, IRC |
10 | Wayne Liu, Sudhir Aggarwal, Zhenhai Duan |
Incorporating accountability into internet email. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 875-882, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
email misuse, trust management, accountability |
10 | Jasmina Omic, Robert E. Kooij, Piet Van Mieghem |
Heterogeneous Protection in Regular and Complete Bi-partite Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2009, 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings, pp. 92-103, 2009, Springer, 978-3-642-01398-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Virus spread, heterogeneous networks, epidemic threshold |
10 | Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew |
Control flow obfuscation with information flow tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 42st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-42 2009), December 12-16, 2009, New York, New York, USA, pp. 391-400, 2009, ACM, 978-1-60558-798-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
control flow obfuscation, opaque predicate, information flow tracking, control speculation |
10 | Stephen Smaldone, Vinod Ganapathy, Liviu Iftode |
Working set-based access control for network file systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 207-216, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
access control, network file system |
10 | Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda |
Automated Spyware Collection and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 202-217, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | David Zage, Carl Livadas, Eve M. Schooler |
A Network-Aware Distributed Membership Protocol for Collaborative Defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (4) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 1123-1130, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni |
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATC ![In: Autonomic and Trusted Computing, 6th International Conference, ATC 2009, Brisbane, Australia, July 7-9, 2009, Proceedings, pp. 249-267, 2009, Springer, 978-3-642-02703-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms |
10 | Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi |
Testing CPU emulators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSTA ![In: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, ISSTA 2009, Chicago, IL, USA, July 19-23, 2009, pp. 261-272, 2009, ACM, 978-1-60558-338-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software testing, emulation, automatic test generation, fuzzing |
10 | Michael LeMay, Carl A. Gunter |
Cumulative Attestation Kernels for Embedded Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2009, 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings, pp. 655-670, 2009, Springer, 978-3-642-04443-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | XiaoFeng Wang 0001, Michael K. Reiter |
A multi-layer framework for puzzle-based denial-of-service defense. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(4), pp. 243-263, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Denial of service, Network protocols, Client puzzles |
10 | Steven J. Vaughan-Nichols |
Virtualization Sparks Security Concerns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 41(8), pp. 13-15, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Martim Carbone, Wenke Lee, Diego Zamboni |
Taming Virtualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(1), pp. 65-67, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Thomas E. Dube, Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington, Christopher E. Reuter |
Hindering Reverse Engineering: Thinking Outside the Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 6(2), pp. 58-65, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | David M. Nicol |
Efficient simulation of Internet worms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Model. Comput. Simul. ![In: ACM Trans. Model. Comput. Simul. 18(2), pp. 5:1-5:32, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
simulation, modeling, denial-of-service, Worms |
10 | Philippe Lagadec |
OpenDocument and Open XML security (OpenOffice.org and MS Office 2007). ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(2), pp. 115-125, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Nicolas Ruff |
Windows memory forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(2), pp. 83-100, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Éric Lacombe, Frédéric Raynal, Vincent Nicomette |
Rootkit modeling and experiments under Linux. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(2), pp. 137-157, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 7276 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|