|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 774 occurrences of 392 keywords
|
|
|
Results
Found 7276 publication records. Showing 7276 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
18 | André Ricardo Abed Grégio, Paulo Lício de Geus, Christopher Kruegel, Giovanni Vigna |
Tracking Memory Writes for Malware Classification and Code Reuse Identification. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Grégoire Jacob, Paolo Milani Comparetti, Matthias Neugschwandtner, Christopher Kruegel, Giovanni Vigna |
A Static, Packer-Agnostic Filter to Detect Similar Malware Samples. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Christian Rossow, Christian J. Dietrich, Herbert Bos |
Large-Scale Analysis of Malware Downloaders. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Brian Schulte, Haris Andrianakis, Kun Sun 0001, Angelos Stavrou |
NetGator: Malware Detection Using Program Interactive Challenges. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Yongzheng Wu, Roland H. C. Yap |
Experiments with Malware Visualization. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Patrick Stewin, Iurii Bystrov |
Understanding DMA Malware. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Nikos Karampatziakis, Jack W. Stokes, Anil Thomas, Mady Marinescu |
Using File Relationships in Malware Classification. |
DIMVA |
2012 |
DBLP DOI BibTeX RDF |
|
18 | Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir |
Investigation of bypassing malware defences and malware detections. |
IAS |
2011 |
DBLP DOI BibTeX RDF |
|
18 | Damiano Bolzoni, Christiaan Schade, Sandro Etalle |
A Cuckoo's Egg in the Malware Nest: On-the-fly Signature-less Malware Analysis, Detection, and Containment for Large Networks. |
LISA |
2011 |
DBLP BibTeX RDF |
|
18 | Graham Cluley |
Sizing up the malware threat - key malware trends for 2010. |
Netw. Secur. |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Cory Q. Nguyen, James E. Goldman |
Malware analysis reverse engineering (MARE) methodology & malware defense (M.D.) timeline. |
InfoSecCD |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Daisuke Inoue, Katsunari Yoshioka, Masashi Eto, Yuji Hoshizawa, Koji Nakao |
Automated Malware Analysis System and Its Sandbox for Revealing Malware's Internal and External Activities. |
IEICE Trans. Inf. Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Martin Johns, Justus Winter |
Protecting the Intranet Against "JavaScript Malware" and Related Attacks. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Heiko Fangmeier, Michel Messerschmidt, Fabian Müller, Jan Seedorf |
Risiken der Nichterkennung von Malware in komprimierter Form. |
DIMVA |
2004 |
DBLP BibTeX RDF |
|
15 | Hongyu Gao, Jun Hu, Tuo Huang, Jingnan Wang, Yan Chen 0004 |
Security Issues in Online Social Networks. |
IEEE Internet Comput. |
2011 |
DBLP DOI BibTeX RDF |
structural attacks, malware attacks, survey, online social networks, security & privacy |
15 | Saeed Abu-Nimeh, Thomas M. Chen, Omar A. Alzubi |
Malicious and Spam Posts in Online Social Networks. |
Computer |
2011 |
DBLP DOI BibTeX RDF |
Uniform resource locators, Security, Spam, Malware, Facebook, Online social networks, URLs |
15 | Charlie Miller |
Mobile Attacks and Defense. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
jailbreaking, App Store, Android Market, data execution prevention, DEP, address space layout randomization, ASLR, computer security, malware, SMS, smart phone, Android, iPhone, sandbox, iOS |
15 | Masayuki Ohrui, Hiroaki Kikuchi, Masato Terada, Nur Rohman Rosyid |
Apriori-PrefixSpan Hybrid Approach for Automated Detection of Botnet Coordinated Attacks. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
PrefixSpan, Coordinated Attacks, Malware, Botnets, Apriori |
15 | Mitsuaki Akiyama, Takeshi Yagi, Mitsutaka Itoh |
Searching Structural Neighborhood of Malicious URLs to Improve Blacklisting. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
web-based malware, blacklist, drive-by-download |
15 | Bruce Potter |
My Information, Your Code. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
malware protection, mobile code, security and privacy, file formats |
15 | Blake C. Mason, Dipak Ghosal, Cherita L. Corbett |
Evaluation of a Massively Parallel Architecture for Network Security Applications. |
PDP |
2010 |
DBLP DOI BibTeX RDF |
Massively Parallelized Processing Architecture (MPPA), Ambric, entropy function, malware detection, experimental analysis, covert timing channel |
15 | Flavio Lombardi, Roberto Di Pietro |
A Security Management Architecture for the Protection of Kernel Virtual Machines. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Security, Malware, Virtualization technology |
15 | Desmond Lobo, Paul A. Watters, Xin Wen Wu |
RBACS: Rootkit Behavioral Analysis and Classification System. |
WKDD |
2010 |
DBLP DOI BibTeX RDF |
data mining, classification, malware, behavioral analysis, rootkits |
15 | Akihiro Shimoda, Tatsuya Mori, Shigeki Goto |
Sensor in the Dark: Building Untraceable Large-Scale Honeypots Using Virtualization Technologies. |
SAINT |
2010 |
DBLP DOI BibTeX RDF |
low-interaction, unused IP address, malware, honeypot |
15 | George Lawton |
On the Trail of the Conficker Worm. |
Computer |
2009 |
DBLP DOI BibTeX RDF |
Conficker, Malware, Worms, Buffer overflow, Security and privacy |
15 | Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
information theft detection, Intrusion detection, information theory, malware analysis |
15 | Ahmed Obied, Reda Alhajj |
Fraudulent and malicious sites on the web. |
Appl. Intell. |
2009 |
DBLP DOI BibTeX RDF |
Fraudulent, Malicious, Web, Search engines, Spam, Malware, Proxy, Phishing, Crawlers, Pharming |
15 | Ilir Gashi, Vladimir Stankovic 0002, Corrado Leita, Olivier Thonnard |
An Experimental Study of Diversity with Off-the-Shelf AntiVirus Engines. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
AntiVirus detection engine analyis, cluster analysis, malware detection |
15 | Monirul Islam Sharif, Wenke Lee, Weidong Cui, Andrea Lanzi |
Secure in-VM monitoring using hardware virtualization. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
kernel integrity, virtual machines, malware, secure monitoring |
15 | Markus Jakobsson |
Captcha-free throttling. |
AISec |
2009 |
DBLP DOI BibTeX RDF |
cookie theft, dns poisoning, usability, access, malware, scripting, cloning, captcha, throttle |
15 | Tzu-Yen Wang, Chin-Hsiung Wu, Chu-Cheng Hsieh |
Detecting Unknown Malicious Executables Using Portable Executable Headers. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
previously unseen malware, gain ratio, support vector machine, feature selection, information gain |
15 | Pei-Sheng Huang, Chung-Huang Yang, Tae-Nam Ahn |
Design and implementation of a distributed early warning system combined with intrusion detection system and honeypot. |
ICHIT |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection system, firewall, malware, worm, honeypot |
15 | Meiko Jensen, Jörg Schwenk, Nils Gruschka, Luigi Lo Iacono |
On Technical Security Issues in Cloud Computing. |
IEEE CLOUD |
2009 |
DBLP DOI BibTeX RDF |
Cloud Malware Injection, attacks, WS-Security, TLS, Cloud Computing security |
15 | Lingyun Ying, Purui Su, Dengguo Feng, Xianggen Wang, Yi Yang 0040, Yu Liu |
ReconBin: Reconstructing Binary File from Execution for Software Analysis. |
SSIRI |
2009 |
DBLP DOI BibTeX RDF |
software security analysis, binary analysis, execution monitoring, malware analysis |
15 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
Multi-aspect profiling of kernel rootkit behavior. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
kernel rootkit, profiling, malware |
15 | Mosin I. Hasan, Nilesh B. Prajapati |
An Attack Vector for Deception Through Persuasion Used by Hackers and Crakers. |
NetCoM |
2009 |
DBLP DOI BibTeX RDF |
Malware, Psychology, Spyware, Social Engineering |
15 | Patrick Traynor, Michael Chien, Scott Weaver, Boniface Hicks, Patrick D. McDaniel |
Noninvasive Methods for Host Certification. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
network security, Certification, malware, assurance |
15 | Urko Zurutuza, Roberto Uribeetxeberria, Diego Zamboni |
A data mining approach for analysis of worm activity through automatic signature generation. |
AISec |
2008 |
DBLP DOI BibTeX RDF |
automatic signature generation, malware identification, data mining, intrusion detection, honeypots |
15 | Zonghua Zhang, Ruo Ando, Youki Kadobayashi |
Hardening Botnet by a Rational Botmaster. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, Network security, malware, botnet |
15 | Sanjam Garg, Huzur Saran |
Anti-DDoS Virtualized Operating System. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Performance, Virtualization, Malware, Distributed Denial of Service Attack |
15 | Dawn Xiaodong Song, David Brumley, Heng Yin 0001, Juan Caballero, Ivan Jager, Min Gyung Kang, Zhenkai Liang, James Newsome, Pongsin Poosankam, Prateek Saxena |
BitBlaze: A New Approach to Computer Security via Binary Analysis. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
malware analysis and defense, vulnerability analysis and defense, reverse engineering, Binary analysis |
15 | Jun-Hyung Park, Minsoo Kim 0002, Bong-Nam Noh |
A Visualization Technique for Installation Evidences Containing Malicious Executable Files Using Machine Language Sequence. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Anti-Forensic, Machine language, Malicious executables, opcode visualization, Similarity, Malware, Digital Forensic |
15 | Sébastien Josse |
Secure and advanced unpacking using computer emulation. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
Anti-virus testing, Human driven analysis, Fault injection, Forensics, Software protection, Malware analysis |
15 | Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén |
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. |
Secure Data Management |
2007 |
DBLP DOI BibTeX RDF |
malware prevention, Information security, reputation systems |
15 | Bradley K. Jensen, Melinda Cline, Carl Stephen Guynes |
Teaching the undergraduate CS Information Security Course. |
ACM SIGCSE Bull. |
2006 |
DBLP DOI BibTeX RDF |
teaching information security, intrusion detection, malware, information assurance |
15 | Jing Su, Kelvin K. W. Chan, Andrew G. Miklas, Kenneth Po, Ali Akhavan, Stefan Saroiu, Eyal de Lara, Ashvin Goel |
A preliminary investigation of worm infections in a bluetooth environment. |
WORM |
2006 |
DBLP DOI BibTeX RDF |
Bluetooth, malware, worms |
15 | Johnathon A. Mohr |
The [216: 1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
adaptive support, network access standardization, personal computer security, preventative computing, network security, updates, malware, virus, spyware, remediation, antivirus, adaptive networking |
15 | Ari Juels, Markus Jakobsson, Tom N. Jagatic |
Cache Cookies for Browser Authentication (Extended Abstract). |
S&P |
2006 |
DBLP DOI BibTeX RDF |
cache cookies, privacy, personalization, malware, Web browser, phishing, pharming |
15 | Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis |
A multifaceted approach to understanding the botnet phenomenon. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
network security, computer security, malware, botnets |
15 | Justin Ma, John Dunagan, Helen J. Wang, Stefan Savage, Geoffrey M. Voelker |
Finding diversity in remote code injection exploits. |
Internet Measurement Conference |
2006 |
DBLP DOI BibTeX RDF |
binary emulation, malware classification, worms, phylogeny, bots |
15 | Linda Dailey Paulson |
News Briefs. |
Computer |
2005 |
DBLP DOI BibTeX RDF |
media distribution, swarmcasting technology, security, malware, worms, entertainment computing, wireless technology, power-aware computing, hackers, communications technology |
15 | Justin Ma, Geoffrey M. Voelker, Stefan Savage |
Self-stopping worms. |
WORM |
2005 |
DBLP DOI BibTeX RDF |
self-stop, malware, worms, distributed protocols |
15 | David Dagon, Tom L. Martin, Thad Starner |
Mobile Phones as Computing Devices: The Viruses are Coming! |
IEEE Pervasive Comput. |
2004 |
DBLP DOI BibTeX RDF |
bluebugging, mobile phones, malware |
15 | Iván Arce, Gary McGraw |
Guest Editors' Introduction: Why Attacking Systems Is a Good Idea. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
attacking systems, patterns, toolkits, malware, worms, viruses |
15 | Elinor M. Madigan, Corey Petrulich, Kelly Motuk |
The cost of non-compliance: when policies fail. |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
administrative staff, network policy, network, network security, tools, malware, viruses, backup |
10 | Nathan E. Rosenblum, Barton P. Miller, Xiaojin Zhu 0001 |
Extracting compiler provenance from program binaries. |
PASTE |
2010 |
DBLP DOI BibTeX RDF |
program provenance, static binary analysis, forensics |
10 | Si-Yu Huang, Ching-Hao Mao, Hahn-Ming Lee |
Fast-flux service network detection based on spatial snapshot mechanism for delay-free detection. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
fast-flux service network (FFSN), content distribution network (CDN), Botnet, Bayesian network classifier |
10 | Marco Cova, Christopher Krügel, Giovanni Vigna |
Detection and analysis of drive-by-download attacks and malicious JavaScript code. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
drive-by-download attacks, web client exploits, anomaly detection |
10 | Sid Stamm, Brandon Sterne, Gervase Markham |
Reining in the web with content security policy. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
content restrictions, security policy, http, web security |
10 | Omer Demir, Bilal Khan 0002, Ala I. Al-Fuqaha |
Reconstruction of malicious internet flows. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
flow reconstruction, distributed denial of service |
10 | D. J. Capelis, Darrell D. E. Long |
Fived: a service-based architecture implementation to innovate at the endpoints. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
fived, session layer, network design, network architecture, sessions |
10 | Arijit Khan 0001, Xifeng Yan, Kun-Lung Wu |
Towards proximity pattern mining in large graphs. |
SIGMOD Conference |
2010 |
DBLP DOI BibTeX RDF |
graph, pattern, association, mining |
10 | Virgil D. Gligor |
Architectures for practical security. |
SACMAT |
2010 |
DBLP DOI BibTeX RDF |
architectures |
10 | Sara Motiee, Kirstie Hawkey, Konstantin Beznosov |
Investigating user account control practices. |
CHI Extended Abstracts |
2010 |
DBLP DOI BibTeX RDF |
user account control, usable security, least privilege |
10 | Rick Wash |
Folk models of home computer security. |
SOUPS |
2010 |
DBLP DOI BibTeX RDF |
folk models, home security, mental models |
10 | Kyumin Lee, James Caverlee, Steve Webb |
Uncovering social spammers: social honeypots + machine learning. |
SIGIR |
2010 |
DBLP DOI BibTeX RDF |
social honeypots, social media, spam |
10 | Susmit Jha, Sumit Gulwani, Sanjit A. Seshia, Ashish Tiwari 0001 |
Oracle-guided component-based program synthesis. |
ICSE (1) |
2010 |
DBLP DOI BibTeX RDF |
oracle-based learning, SAT, program synthesis, SMT |
10 | Sung-Min Lee 0004, Sang-Bum Suh, Jong-Deok Choi |
Fine-grained I/O access control based on Xen virtualization for 3G/4G mobile devices. |
DAC |
2010 |
DBLP DOI BibTeX RDF |
I/O access control, smart phone security, virtual machine, virtual machine monitor |
10 | Guanhua Yan, Stephan J. Eidenbenz |
Modeling Propagation Dynamics of Bluetooth Worms (Extended Version). |
IEEE Trans. Mob. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Linda Dailey Paulson |
News Briefs. |
Computer |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis |
Cybercrime 2.0: when the cloud turns dark. |
Commun. ACM |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Grégoire Jacob, Eric Filiol, Hervé Debar |
Functional polymorphic engines: formalisation, implementation and use cases. |
J. Comput. Virol. |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Niels Provos, Moheeb Abu Rajab, Panayiotis Mavrommatis |
Cybercrime 2.0: When the Cloud Turns Dark. |
ACM Queue |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Richard A. DeMillo |
Blighted Virtual Neighborhoods and Other Threats to Online Social Experiences. |
WISE |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Peishun Liu, Xuefang Wang |
Identification of Malicious Web Pages by Inductive Learning. |
WISM |
2009 |
DBLP DOI BibTeX RDF |
Malicious detection, generalization, specialization, inductive learning, drive-by downloads |
10 | Peter Likarish, Eunjin Jung |
A targeted web crawling for building malicious javascript collection. |
CIKM-DSMM |
2009 |
DBLP DOI BibTeX RDF |
malicious javascript, security, web crawling |
10 | Joshua Mason, Sam Small, Fabian Monrose, Greg MacManus |
English shellcode. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
shellcode, natural language, network emulation |
10 | Brent ByungHoon Kang, Eric Chan-Tin, Christopher P. Lee 0001, James Tyra, Hun Jeong Kang, Chris Nunnery, Zachariah Wadler, Greg Sinclair, Nicholas Hopper, David Dagon, Yongdae Kim |
Towards complete node enumeration in a peer-to-peer botnet. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
infected hosts enumeration, storm, P2P, botnet |
10 | Sebastian Gajek, Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy |
TruWallet: trustworthy and migratable wallet-based web authentication. |
STC |
2009 |
DBLP DOI BibTeX RDF |
password wallet, secure migration, trusted computing, phishing, identity theft |
10 | Tyler Moore 0001, Richard Clayton 0001 |
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Shay Gueron, Jean-Pierre Seifert |
On the Impossibility of Detecting Virtual Machine Monitors. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Felix Leder, Peter Martini |
NGBPA Next Generation BotNet Protocol Analysis. |
SEC |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Iván Sánchez Milara, Erno Kuusela, Sebastian Turpeinen, Juha Röning, Jukka Riekki |
Botnet-inspired architecture for interactive spaces. |
MUM |
2009 |
DBLP DOI BibTeX RDF |
architecture comparison, HCI, remote control, botnets, multimedia services, interactive spaces, IRC |
10 | Wayne Liu, Sudhir Aggarwal, Zhenhai Duan |
Incorporating accountability into internet email. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
email misuse, trust management, accountability |
10 | Jasmina Omic, Robert E. Kooij, Piet Van Mieghem |
Heterogeneous Protection in Regular and Complete Bi-partite Networks. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
Virus spread, heterogeneous networks, epidemic threshold |
10 | Haibo Chen 0001, Liwei Yuan, Xi Wu 0001, Binyu Zang, Bo Huang 0002, Pen-Chung Yew |
Control flow obfuscation with information flow tracking. |
MICRO |
2009 |
DBLP DOI BibTeX RDF |
control flow obfuscation, opaque predicate, information flow tracking, control speculation |
10 | Stephen Smaldone, Vinod Ganapathy, Liviu Iftode |
Working set-based access control for network file systems. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
access control, network file system |
10 | Andreas Stamminger, Christopher Kruegel, Giovanni Vigna, Engin Kirda |
Automated Spyware Collection and Analysis. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
|
10 | David Zage, Carl Livadas, Eve M. Schooler |
A Network-Aware Distributed Membership Protocol for Collaborative Defense. |
CSE (4) |
2009 |
DBLP DOI BibTeX RDF |
|
10 | Martin Serrano, Sven van der Meer, John Strassner, Stefano De Paoli, Aphra Kerr, Cristiano Storni |
Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications. |
ATC |
2009 |
DBLP DOI BibTeX RDF |
Pervasive Services, Social Networks, Pervasive Computing, Information Systems, Trust Management, Systems Management, Policy-Based Management, Autonomic Communications, Reputation Mechanisms |
10 | Lorenzo Martignoni, Roberto Paleari, Giampaolo Fresi Roglia, Danilo Bruschi |
Testing CPU emulators. |
ISSTA |
2009 |
DBLP DOI BibTeX RDF |
software testing, emulation, automatic test generation, fuzzing |
10 | Michael LeMay, Carl A. Gunter |
Cumulative Attestation Kernels for Embedded Systems. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
10 | XiaoFeng Wang 0001, Michael K. Reiter |
A multi-layer framework for puzzle-based denial-of-service defense. |
Int. J. Inf. Sec. |
2008 |
DBLP DOI BibTeX RDF |
Denial of service, Network protocols, Client puzzles |
10 | Steven J. Vaughan-Nichols |
Virtualization Sparks Security Concerns. |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Martim Carbone, Wenke Lee, Diego Zamboni |
Taming Virtualization. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Thomas E. Dube, Bobby D. Birrer, Richard A. Raines, Rusty O. Baldwin, Barry E. Mullins, Robert W. Bennington, Christopher E. Reuter |
Hindering Reverse Engineering: Thinking Outside the Box. |
IEEE Secur. Priv. |
2008 |
DBLP DOI BibTeX RDF |
|
10 | David M. Nicol |
Efficient simulation of Internet worms. |
ACM Trans. Model. Comput. Simul. |
2008 |
DBLP DOI BibTeX RDF |
simulation, modeling, denial-of-service, Worms |
10 | Philippe Lagadec |
OpenDocument and Open XML security (OpenOffice.org and MS Office 2007). |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Nicolas Ruff |
Windows memory forensics. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Éric Lacombe, Frédéric Raynal, Vincent Nicomette |
Rootkit modeling and experiments under Linux. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 7276 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|