The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Dongwan Shin, Rodrigo Lopes An empirical study of visual security cues to prevent the SSLstripping attack. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xiaowei Li 0003, Yuan Xue 0001 BLOCK: a black-box approach for detection of state violation attacks towards web applications. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Adam Doupé, Manuel Egele, Benjamin Caillat, Gianluca Stringhini, Gorkem Yakin, Ali Zand, Ludovico Cavedon, Giovanni Vigna Hit 'em where it hurts: a live security exercise on cyber situational awareness. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Riccardo Pelizzi, R. Sekar 0001 A server- and browser-transparent CSRF defense for web 2.0 applications. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tyler K. Bletsch, Xuxian Jiang, Vincent W. Freeh Mitigating code-reuse attacks with control-flow locking. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1W. Brad Moore, Chris Wacek, Micah Sherr Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dhilung Kirat, Giovanni Vigna, Christopher Kruegel BareBox: efficient malware analysis on bare-metal. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tongbo Luo, Hao Hao, Wenliang Du, Yifei Wang, Heng Yin 0001 Attacks on WebView in the Android system. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Terry Benzel The science of cyber security experimentation: the DETER project. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee Understanding the prevalence and use of alternative plans in malware with network games. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chenglong Li 0001, Yibo Xue, Yingfei Dong, Dongsheng Wang 0002 "Super nodes" in Tor: existence and security implication. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Boris Danev, Ramya Jayaram Masti, Ghassan Karame, Srdjan Capkun Enabling secure VM-vTPM migration in private clouds. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kangjie Lu, Dabi Zou, Weiping Wen, Debin Gao deRop: removing return-oriented programming from malware. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xiapu Luo, Peng Zhou 0002, Junjie Zhang 0004, Roberto Perdisci, Wenke Lee, Rocky K. C. Chang Exposing invisible timing-based traffic watermarks with BACKLIT. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jennia Hizver, Tzi-cker Chiueh Tracking payment card data flow using virtual machine state introspection. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matt Blaze Key escrow from a safe distance: looking back at the Clipper Chip. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Omid Fatemieh, Michael LeMay, Carl A. Gunter Reliable telemetry in white spaces using remote attestation. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nilesh Nipane, Italo Dacosta, Patrick Traynor "Mix-in-Place" anonymous networking using secure function evaluation. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xinshu Dong, Minh Tran, Zhenkai Liang, Xuxian Jiang AdSentry: comprehensive and flexible confinement of JavaScript-based advertisements. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jing Xie 0011, Bill Chu, Heather Richter Lipford, John T. Melton ASIDE: IDE support for web application security. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Heqing Huang, Su Zhang, Xinming Ou, Atul Prakash 0001, Karem A. Sakallah Distilling critical attack graph surface iteratively through minimum-cost SAT solving. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Markus Huber 0001, Martin Mulazzani, Manuel Leithner, Sebastian Schrittwieser, Gilbert Wondracek, Edgar R. Weippl Social snapshots: digital forensics for online social networks. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ahmed Awad E. Ahmed, Issa Traoré Dynamic sample size detection in continuous authentication using sequential sampling. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Casey Cipriano, Ali Zand, Amir Houmansadr, Christopher Kruegel, Giovanni Vigna Nexat: a history-based approach to predict attacker actions. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ahren Studer, Timothy Passaro, Lujo Bauer Don't Bump, Shake on It: the exploitation of a popular accelerometer-based smart phone exchange and its secure replacement. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Shardul Vikram, Yinan Fan, Guofei Gu SEMAGE: a new image-based two-factor CAPTCHA. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matthias Neugschwandtner, Paolo Milani Comparetti, Grégoire Jacob, Christopher Kruegel FORECAST: skimming off the malware cream. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matthias Neugschwandtner, Paolo Milani Comparetti, Christian Platzer Detecting malware's failover C&C strategies with squeeze. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Steven Van Acker, Philippe De Ryck, Lieven Desmet, Frank Piessens, Wouter Joosen WebJail: least-privilege integration of third-party components in web mashups. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Max Hlywa, Robert Biddle, Andrew S. Patrick Facing the facts about image type in recognition-based graphical passwords. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jeffrey S. Dwoskin, Mahadevan Gomathisankaran, Yu-Yuan Chen, Ruby B. Lee A framework for testing hardware-software security architectures. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shengzhi Zhang, Xiaoqi Jia, Peng Liu 0005, Jiwu Jing Cross-layer comprehensive intrusion harm analysis for production workload server systems. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jonathan Heusser, Pasquale Malacaria Quantifying information leaks in software. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Chengfang Fang, Ee-Chien Chang Securing interactive sessions using mobile device through visual channel and visual inspection. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna Detecting spammers on social networks. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zi Chu, Steven Gianvecchio, Haining Wang, Sushil Jajodia Who is tweeting on Twitter: human, bot, or cyborg? Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christina Pöpper, David A. Basin, Srdjan Capkun, Cas Cremers Keeping data secret under full compromise using porter devices. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhou Li 0001, XiaoFeng Wang 0001 FIRM: capability-based inline mediation of Flash behaviors. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jin Han, Meng Pan, Debin Gao, HweeHwa Pang A multi-user steganographic file system on untrusted shared storage. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ellick Chan, Shivaram Venkataraman, Francis M. David, Amey Chaugule, Roy H. Campbell Forenscope: a framework for live forensics. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Georgios Portokalidis, Philip Homburg, Kostas Anagnostakis, Herbert Bos Paranoid Android: versatile protection for smartphones. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stefan Tillich, Mario Kirschbaum, Alexander Szekely SCA-resistant embedded processors: the next generation. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Roberto Gallo, Henrique Kawakami, Ricardo Dahab, Rafael Azevedo, Saulo Lima, Guido Araujo T-DRE: a hardware trusted computing base for direct recording electronic vote machines. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ang Cui, Salvatore J. Stolfo A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Andrew G. West, Adam J. Aviv, Jian Chang, Insup Lee 0001 Spam mitigation using spatio-temporal reputations from blacklist history. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kaan Onarlioglu, Leyla Bilge, Andrea Lanzi, Davide Balzarotti, Engin Kirda G-Free: defeating return-oriented programming through gadget-less binaries. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tom Longstaff, David M. Balenson, Mark Matties Barriers to science in security. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Konrad Rieck, Tammo Krueger, Andreas Dewald Cujo: efficient detection and prevention of drive-by-download attacks. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Joan Calvet, Carlton R. Davis, José M. Fernandez 0001, Jean-Yves Marion, Pier-Luc St-Onge, Wadie Guizani, Pierre-Marc Bureau, Anil Somayaji The case for in-the-lab botnet experimentation: creating and taking down a 3000-node botnet. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Baris Coskun, Sven Dietrich, Nasir D. Memon Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kevin R. B. Butler, Stephen E. McLaughlin, Patrick D. McDaniel Kells: a protection framework for portable data. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Trajce Dimkov, Wolter Pieters, Pieter H. Hartel Two methodologies for physical penetration testing using social engineering. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michalis Polychronakis, Kostas G. Anagnostakis, Evangelos P. Markatos Comprehensive shellcode detection using runtime heuristics. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Georgios Portokalidis, Angelos D. Keromytis Fast and practical instruction-set randomization for commodity systems. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Seungwon Shin, Guofei Gu Conficker and beyond: a large-scale empirical study. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1William R. Cheswick Back to Berferd. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wei Xu, Fangfang Zhang 0005, Sencun Zhu Toward worm detection in online social networks. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Giovanni Vigna Network intrusion detection: dead or alive? Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shujun Li, S. Amier Haider Shah, M. Asad Usman Khan, Syed Ali Khayam, Ahmad-Reza Sadeghi, Roland Schmitz Breaking e-banking CAPTCHAs. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhaohui Wang, Angelos Stavrou Exploiting smart-phone USB connectivity for fun and profit. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yanjiang Yang, Jianying Zhou 0001, Jun Wen Wong, Feng Bao 0001 Towards practical anonymous password authentication. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wu Zhou 0001, Peng Ning, Xiaolan Zhang 0001, Glenn Ammons, Ruowen Wang, Vasanth Bala Always up-to-date: scalable offline patching of VM images in a compute cloud. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Elizabeth Stobert, Alain Forget, Sonia Chiasson, Paul C. van Oorschot, Robert Biddle Exploring usability effects of increasing security in click-based graphical passwords. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Machigar Ongtang, Kevin R. B. Butler, Patrick D. McDaniel Porscha: policy oriented secure content handling in Android. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sandy Clark, Stefan Frei, Matt Blaze, Jonathan M. Smith Familiarity breeds contempt: the honeymoon effect and the role of legacy code in zero-day vulnerabilities. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1An Liu, Peng Ning, Huaiyu Dai, Yao Liu 0007, Cliff Wang Defending DSSS-based broadcast communication against insider jammers via delayed seed-disclosure. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yu Ding, Tao Wei, Tielei Wang, Zhenkai Liang, Wei Zou Heap Taichi: exploiting memory allocation granularity in heap-spraying attacks. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Siarhei Liakh, Michael C. Grace, Xuxian Jiang Analyzing and improving Linux kernel memory protection: a model checking approach. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Benjamin Rodes, Xunhua Wang Security analysis of a fingerprint-protected USB drive. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Liang Gu, Yao Guo 0001, Anbang Ruan, Qingni Shen, Hong Mei 0001 SCOBA: source code based attestation on custom software. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Carrie Gates, Michael Franz, John P. McDermott (eds.) Twenty-Sixth Annual Computer Security Applications Conference, ACSAC 2010, Austin, Texas, USA, 6-10 December 2010 Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jonathan Valamehr, Mohit Tiwari, Timothy Sherwood, Ryan Kastner, Ted Huffmire, Cynthia E. Irvine, Timothy E. Levin Hardware assistance for trustworthy systems through 3-D integration. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Stephen E. McLaughlin, Dmitry Podkuiko, Sergei Miadzvezhanka, Adam Delozier, Patrick D. McDaniel Multi-vendor penetration testing in the advanced metering infrastructure. Search on Bibsonomy ACSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ana Ferreira 0001, David W. Chadwick, Pedro Farinha, Ricardo João Cruz Correia, Gansen Zhao, Rui Chilro, Luis Filipe Coelho Antunes How to Securely Break into RBAC: The BTG-RBAC Model. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mehmud Abliz, Taieb Znati A Guided Tour Puzzle for Denial of Service Prevention. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mario Kirschbaum, Thomas Popp Evaluation of a DPA-Resistant Prototype Chip. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anmin Xie, Zhuhua Cai, Cong Tang, Jian-bin Hu, Zhong Chen 0001 Evaluating Network Security With Two-Layer Attack Graphs. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Attila Altay Yavuz, Peng Ning BAF: An Efficient Publicly Verifiable Secure Audit Logging Scheme for Distributed Systems. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov Secure Web 2.0 Content Sharing Beyond Walled Gardens. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Erik Kline, Matt Beaumont-Gay, Jelena Mirkovic, Peter L. Reiher RAD: Reflector Attack Defense Using Message Authentication Codes. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alf Zugenmaier, Sven Lachmund, Dileesh Jostin Transparent Encryption for External Storage Media with Key Management Adapted to Mobile Use. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Lixin Li, James E. Just, R. Sekar 0001 Online Signature Generation for Windows Systems. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hongxia Jin, Jeffrey B. Lotspiech Unifying Broadcast Encryption and Traitor Tracing for Content Protection. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Dana Zhang, Kotagiri Ramamohanarao, Steven Versteeg, Rui Zhang 0003 RoleVAT: Visual Assessment of Practical Need for Role Based Access Control. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Emily Stark 0001, Michael Hamburg, Dan Boneh Symmetric Cryptography in Javascript. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wei Wei, Juan Du 0006, Ting Yu 0001, Xiaohui Gu SecureMR: A Service Integrity Assurance Framework for MapReduce. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E. Webster, Stephen W. Boyer Modeling Modern Network Attacks and Countermeasures Using Attack Graphs. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hsu-Chun Hsiao, Yue-Hsun Lin, Ahren Studer, Cassandra Studer, King-Hang Wang, Hiroaki Kikuchi, Adrian Perrig, Hung-Min Sun, Bo-Yin Yang A Study of User-Friendly Hash Comparison Schemes. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Vanessa Frías-Martínez, Joseph Sherrick, Salvatore J. Stolfo, Angelos D. Keromytis A Network Access Control Mechanism Based on Behavior Profiles. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hamed Okhravi, David M. Nicol TrustGraph: Trusted Graphics Subsystem for High Assurance Systems. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Giampaolo Fresi Roglia, Lorenzo Martignoni, Roberto Paleari, Danilo Bruschi Surgically Returning to Randomized lib(c). Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shujun Li, Hassan Jameel Asghar, Josef Pieprzyk, Ahmad-Reza Sadeghi, Roland Schmitz, Huaxiong Wang On the Security of PAS (Predicate-Based Authentication Service). Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sean Ford, Marco Cova, Christopher Kruegel, Giovanni Vigna Analyzing and Detecting Malicious Flash Advertisements. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan An Empirical Approach to Modeling Uncertainty in Intrusion Analysis. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thomas Moyer, Kevin R. B. Butler, Joshua Schiffman, Patrick D. McDaniel, Trent Jaeger Scalable Web Content Attestation. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Daniela Alvim Seabra de Oliveira, Shyhtsun Felix Wu Protecting Kernel Code and Data with a Virtualization-Aware Collaborative Operating System. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joshua Schiffman, Thomas Moyer, Christopher Shal, Trent Jaeger, Patrick D. McDaniel Justifying Integrity Using a Virtual Machine Verifier. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mary Ann Davidson The Good, the Bad, And the Ugly: Stepping on the Security Scale. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Frank S. Park, Chinmay Gangakhedkar, Patrick Traynor Leveraging Cellular Infrastructure to Improve Fraud Prevention. Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1 Twenty-Fifth Annual Computer Security Applications Conference, ACSAC 2009, Honolulu, Hawaii, USA, 7-11 December 2009 Search on Bibsonomy ACSAC The full citation details ... 2009 DBLP  BibTeX  RDF
Displaying result #701 - #800 of 1667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license