The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for malware with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2004 (46) 2005 (53) 2006 (78) 2007 (125) 2008 (161) 2009 (175) 2010 (169) 2011 (216) 2012 (214) 2013 (262) 2014 (301) 2015 (335) 2016 (461) 2017 (486) 2018 (565) 2019 (615) 2020 (642) 2021 (742) 2022 (751) 2023 (733) 2024 (146)
Publication types (Num. hits)
article(2857) book(8) data(16) incollection(50) inproceedings(4185) phdthesis(128) proceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 774 occurrences of 392 keywords

Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
18André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna Tracking Memory Writes for Malware Classification and Code Reuse Identification. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Christian Rossow, Christian J. Dietrich, Herbert Bos Large-Scale Analysis of Malware Downloaders. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Brian Schulte, Haris Andrianakis, Kun Sun 0001, Angelos Stavrou NetGator: Malware Detection Using Program Interactive Challenges. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Yongzheng Wu, Roland H. C. Yap Experiments with Malware Visualization. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Patrick Stewin, Iurii Bystrov Understanding DMA Malware. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu Using File Relationships in Malware Classification. Search on Bibsonomy DIMVA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
18Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir Investigation of bypassing malware defences and malware detections. Search on Bibsonomy IAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
18Damiano Bolzoni, Christiaan Schade, Sandro Etalle A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. Search on Bibsonomy LISA The full citation details ... 2011 DBLP  BibTeX  RDF
18Graham Cluley Sizing up the malware threat - key malware trends for 2010. Search on Bibsonomy Netw. Secur. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Cory Q. Nguyen, James E. Goldman Malware analysis reverse engineering (MARE) methodology & malware defense (M.D.) timeline. Search on Bibsonomy InfoSecCD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Martin Johns, Justus Winter Protecting the Intranet Against "JavaScript Malware" and Related Attacks. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Heiko Fangmeier, Michel Messerschmidt, Fabian Müller, Jan Seedorf Risiken der Nichterkennung von Malware in komprimierter Form. Search on Bibsonomy DIMVA The full citation details ... 2004 DBLP  BibTeX  RDF
15Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, Yan Chen 0004 Security Issues in Online Social Networks. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF structural attacks, malware attacks, survey, online social networks, security & privacy
15Saeed Abu-Nimeh, Thomas M. Chen, Omar A. Alzubi Malicious and Spam Posts in Online Social Networks. Search on Bibsonomy Computer The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Uniform resource locators, Security, Spam, Malware, Facebook, Online social networks, URLs
15Charlie Miller Mobile Attacks and Defense. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF jailbreaking, App Store, Android Market, data execution prevention, DEP, address space layout randomization, ASLR, computer security, malware, SMS, smart phone, Android, iPhone, sandbox, iOS
15Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada, Nur Rohman Rosyid Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF PrefixSpan, Coordinated Attacks, Malware, Botnets, Apriori
15Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF web-based malware, blacklist, drive-by-download
15Bruce Potter My Information, Your Code. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF malware protection, mobile code, security and privacy, file formats
15Blake C. Mason, Dipak Ghosal, Cherita L. Corbett Evaluation of a Massively Parallel Architecture for Network Security Applications. Search on Bibsonomy PDP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Massively Parallelized Processing Architecture (MPPA), Ambric, entropy function, malware detection, experimental analysis, covert timing channel
15Flavio Lombardi, Roberto Di Pietro A Security Management Architecture for the Protection of Kernel Virtual Machines. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Security, Malware, Virtualization technology
15Desmond Lobo, Paul A. Watters, Xin Wen Wu RBACS: Rootkit Behavioral Analysis and Classification System. Search on Bibsonomy WKDD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data mining, classification, malware, behavioral analysis, rootkits
15Akihiro Shimoda, Tatsuya Mori, Shigeki Goto Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. Search on Bibsonomy SAINT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF low-interaction, unused IP address, malware, honeypot
15George Lawton On the Trail of the Conficker Worm. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Conficker, Malware, Worms, Buffer overflow, Security and privacy
15Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information theft detection, Intrusion detection, information theory, malware analysis
15Ahmed Obied, Reda Alhajj Fraudulent and malicious sites on the web. Search on Bibsonomy Appl. Intell. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Fraudulent, Malicious, Web, Search engines, Spam, Malware, Proxy, Phishing, Crawlers, Pharming
15Ilir Gashi, Vladimir Stankovic 0002, Corrado Leita, Olivier Thonnard An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AntiVirus detection engine analyis, cluster analysis, malware detection
15Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi Secure in-VM monitoring using hardware virtualization. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel integrity, virtual machines, malware, secure monitoring
15Markus Jakobsson Captcha-free throttling. Search on Bibsonomy AISec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cookie theft, dns poisoning, usability, access, malware, scripting, cloning, captcha, throttle
15Tzu-Yen Wang, Chin-Hsiung Wu, Chu-Cheng Hsieh Detecting Unknown Malicious Executables Using Portable Executable Headers. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF previously unseen malware, gain ratio, support vector machine, feature selection, information gain
15Pei-Sheng Huang, Chung-Huang Yang, Tae-Nam Ahn Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection system, firewall, malware, worm, honeypot
15Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono On Technical Security Issues in Cloud Computing. Search on Bibsonomy IEEE CLOUD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cloud Malware Injection, attacks, WS-Security, TLS, Cloud Computing security
15Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang 0040, Yu Liu ReconBin: Reconstructing Binary File from Execution for Software Analysis. Search on Bibsonomy SSIRI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software security analysis, binary analysis, execution monitoring, malware analysis
15Ryan D. Riley, Xuxian Jiang, Dongyan Xu Multi-aspect profiling of kernel rootkit behavior. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF kernel rootkit, profiling, malware
15Mosin I. Hasan, Nilesh B. Prajapati An Attack Vector for Deception Through Persuasion Used by Hackers and Crakers. Search on Bibsonomy NetCoM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malware, Psychology, Spyware, Social Engineering
15Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel Noninvasive Methods for Host Certification. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, Certification, malware, assurance
15Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni A data mining approach for analysis of worm activity through automatic signature generation. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF automatic signature generation, malware identification, data mining, intrusion detection, honeypots
15Zonghua Zhang, Ruo Ando, Youki Kadobayashi Hardening Botnet by a Rational Botmaster. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, Network security, malware, botnet
15Sanjam Garg, Huzur Saran Anti-DDoS Virtualized Operating System. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance, Virtualization, Malware, Distributed Denial of Service Attack
15Dawn Xiaodong Song, David Brumley, Heng Yin 0001, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena BitBlaze: A New Approach to Computer Security via Binary Analysis. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF malware analysis and defense, vulnerability analysis and defense, reverse engineering, Binary analysis
15Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic
15Sébastien Josse Secure and advanced unpacking using computer emulation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis
15Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. Search on Bibsonomy Secure Data Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF malware prevention, Information security, reputation systems
15Bradley K. Jensen, Melinda Cline, Carl Stephen Guynes Teaching the undergraduate CS Information Security Course. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF teaching information security, intrusion detection, malware, information assurance
15Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel A preliminary investigation of worm infections in a bluetooth environment. Search on Bibsonomy WORM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bluetooth, malware, worms
15Johnathon A. Mohr The [216: 1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF adaptive support, network access standardization, personal computer security, preventative computing, network security, updates, malware, virus, spyware, remediation, antivirus, adaptive networking
15Ari Juels, Markus Jakobsson, Tom N. Jagatic Cache Cookies for Browser Authentication (Extended Abstract). Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache cookies, privacy, personalization, malware, Web browser, phishing, pharming
15Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis A multifaceted approach to understanding the botnet phenomenon. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network security, computer security, malware, botnets
15Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker Finding diversity in remote code injection exploits. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF binary emulation, malware classification, worms, phylogeny, bots
15Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF media distribution, swarmcasting technology, security, malware, worms, entertainment computing, wireless technology, power-aware computing, hackers, communications technology
15Justin Ma, Geoffrey M. Voelker, Stefan Savage Self-stopping worms. Search on Bibsonomy WORM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-stop, malware, worms, distributed protocols
15David Dagon, Tom L. Martin, Thad Starner Mobile Phones as Computing Devices: The Viruses are Coming! Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF bluebugging, mobile phones, malware
15Iván Arce, Gary McGraw Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF attacking systems, patterns, toolkits, malware, worms, viruses
15Elinor M. Madigan, Corey Petrulich, Kelly Motuk The cost of non-compliance: when policies fail. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF administrative staff, network policy, network, network security, tools, malware, viruses, backup
10Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu 0001 Extracting compiler provenance from program binaries. Search on Bibsonomy PASTE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF program provenance, static binary analysis, forensics
10Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF fast-flux service network (FFSN), content distribution network (CDN), Botnet, Bayesian network classifier
10Marco Cova, Christopher Krügel, Giovanni Vigna Detection and analysis of drive-by-download attacks and malicious JavaScript code. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF drive-by-download attacks, web client exploits, anomaly detection
10Sid Stamm, Brandon Sterne, Gervase Markham Reining in the web with content security policy. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF content restrictions, security policy, http, web security
10Omer Demir, Bilal Khan 0002, Ala I. Al-Fuqaha Reconstruction of malicious internet flows. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF flow reconstruction, distributed denial of service
10D. J. Capelis, Darrell D. E. Long Fived: a service-based architecture implementation to innovate at the endpoints. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF fived, session layer, network design, network architecture, sessions
10Arijit Khan 0001, Xifeng Yan, Kun-Lung Wu Towards proximity pattern mining in large graphs. Search on Bibsonomy SIGMOD Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF graph, pattern, association, mining
10Virgil D. Gligor Architectures for practical security. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF architectures
10Sara Motiee, Kirstie Hawkey, Konstantin Beznosov Investigating user account control practices. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2010 DBLP  DOI  BibTeX  RDF user account control, usable security, least privilege
10Rick Wash Folk models of home computer security. Search on Bibsonomy SOUPS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF folk models, home security, mental models
10Kyumin Lee, James Caverlee, Steve Webb Uncovering social spammers: social honeypots + machine learning. Search on Bibsonomy SIGIR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF social honeypots, social media, spam
10Susmit Jha, Sumit Gulwani, Sanjit A. Seshia, Ashish Tiwari 0001 Oracle-guided component-based program synthesis. Search on Bibsonomy ICSE (1) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF oracle-based learning, SAT, program synthesis, SMT
10Sung-Min Lee 0004, Sang-Bum Suh, Jong-Deok Choi Fine-grained I/O access control based on Xen virtualization for 3G/4G mobile devices. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF I/O access control, smart phone security, virtual machine, virtual machine monitor
10Guanhua Yan, Stephan J. Eidenbenz Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Linda Dailey Paulson News Briefs. Search on Bibsonomy Computer The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis Cybercrime 2.0: when the cloud turns dark. Search on Bibsonomy Commun. ACM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Grégoire Jacob, Eric Filiol, Hervé Debar Functional polymorphic engines: formalisation, implementation and use cases. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis Cybercrime 2.0: When the Cloud Turns Dark. Search on Bibsonomy ACM Queue The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Richard A. DeMillo Blighted Virtual Neighborhoods and Other Threats to Online Social Experiences. Search on Bibsonomy WISE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Peishun Liu, Xuefang Wang Identification of Malicious Web Pages by Inductive Learning. Search on Bibsonomy WISM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Malicious detection, generalization, specialization, inductive learning, drive-by downloads
10Peter Likarish, Eunjin Jung A targeted web crawling for building malicious javascript collection. Search on Bibsonomy CIKM-DSMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious javascript, security, web crawling
10Joshua Mason, Sam Small, Fabian Monrose, Greg MacManus English shellcode. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF shellcode, natural language, network emulation
10Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim Towards complete node enumeration in a peer-to-peer botnet. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF infected hosts enumeration, storm, P2P, botnet
10Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy TruWallet: trustworthy and migratable wallet-based web authentication. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF password wallet, secure migration, trusted computing, phishing, identity theft
10Tyler Moore 0001, Richard Clayton 0001 Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Shay Gueron, Jean-Pierre Seifert On the Impossibility of Detecting Virtual Machine Monitors. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Felix Leder, Peter Martini NGBPA Next Generation BotNet Protocol Analysis. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Iván Sánchez Milara, Erno Kuusela, Sebastian Turpeinen, Juha Röning, Jukka Riekki Botnet-inspired architecture for interactive spaces. Search on Bibsonomy MUM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF architecture comparison, HCI, remote control, botnets, multimedia services, interactive spaces, IRC
10Wayne Liu, Sudhir Aggarwal, Zhenhai Duan Incorporating accountability into internet email. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF email misuse, trust management, accountability
10Jasmina Omic, Robert E. Kooij, Piet Van Mieghem Heterogeneous Protection in Regular and Complete Bi-partite Networks. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Virus spread, heterogeneous networks, epidemic threshold
10Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew Control flow obfuscation with information flow tracking. Search on Bibsonomy MICRO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF control flow obfuscation, opaque predicate, information flow tracking, control speculation
10Stephen Smaldone, Vinod Ganapathy, Liviu Iftode Working set-based access control for network file systems. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, network file system
10Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda Automated Spyware Collection and Analysis. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10David Zage, Carl Livadas, Eve M. Schooler A Network-Aware Distributed Membership Protocol for Collaborative Defense. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. Search on Bibsonomy ATC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms
10Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi Testing CPU emulators. Search on Bibsonomy ISSTA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software testing, emulation, automatic test generation, fuzzing
10Michael LeMay, Carl A. Gunter Cumulative Attestation Kernels for Embedded Systems. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
10XiaoFeng Wang 0001, Michael K. Reiter A multi-layer framework for puzzle-based denial-of-service defense. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of service, Network protocols, Client puzzles
10Steven J. Vaughan-Nichols Virtualization Sparks Security Concerns. Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Martim Carbone, Wenke Lee, Diego Zamboni Taming Virtualization. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Thomas E. Dube, Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington, Christopher E. Reuter Hindering Reverse Engineering: Thinking Outside the Box. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10David M. Nicol Efficient simulation of Internet worms. Search on Bibsonomy ACM Trans. Model. Comput. Simul. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF simulation, modeling, denial-of-service, Worms
10Philippe Lagadec OpenDocument and Open XML security (OpenOffice.org and MS Office 2007). Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Nicolas Ruff Windows memory forensics. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
10Éric Lacombe, Frédéric Raynal, Vincent Nicomette Rootkit modeling and experiments under Linux. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 7276 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license