The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (26) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (50) 1997 (54) 1998 (92) 1999 (127) 2000 (178) 2001 (306) 2002 (406) 2003 (624) 2004 (899) 2005 (1333) 2006 (1490) 2007 (1528) 2008 (1585) 2009 (1275) 2010 (673) 2011 (702) 2012 (813) 2013 (804) 2014 (989) 2015 (1073) 2016 (1206) 2017 (1461) 2018 (1759) 2019 (2206) 2020 (2727) 2021 (2982) 2022 (3370) 2023 (3864) 2024 (1050)
Publication types (Num. hits)
article(15280) book(15) data(11) incollection(195) inproceedings(19901) phdthesis(378) proceedings(22)
Venues (Conferences, Journals, ...)
CoRR(4079) IACR Cryptol. ePrint Arch.(1244) IEEE Access(507) RAID(446) CCS(308) IEEE Trans. Inf. Forensics Sec...(260) Comput. Secur.(249) USENIX Security Symposium(224) IEEE Trans. Smart Grid(198) GLOBECOM(197) ICC(193) FSE(187) ACSAC(184) CHES(178) Sensors(170) ARES(166) More (+10 of total 3761)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11110 occurrences of 2965 keywords

Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Yee Wei Law, Marimuthu Palaniswami, Lodewijk van Hoesel, Jeroen Doumen, Pieter H. Hartel, Paul J. M. Havinga Energy-efficient link-layer jamming attacks against wireless sensor network MAC protocols. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, MAC protocols, expectation maximization, jamming, denial-of-service attacks
19Mabroka Ali Mayouf, Zarina Shukur Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols. Search on Bibsonomy IVIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF possible attacks, animation, active learning, cryptographic protocols, visual metaphor
19Jean-Sébastien Coron, Avradip Mandal PSS Is Secure against Random Fault Attacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Probabilistic Signature Scheme, Provable Security, Fault Attacks, Bellcore Attack
19Andrea Abrardo, Mauro Barni, Cesare Maria Carretti Watermark Embedding and Recovery in the Presence of C-LPCD De-synchronization Attacks. Search on Bibsonomy IWDW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF de-synchronization attacks, watermarking
19Alexandre Berzati, Cécile Canovas, Jean-Guillaume Dumas, Louis Goubin Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF “Left-To-Right” exponentiation, RSA, fault attacks, number theory
19Aurélien Francillon, Claude Castelluccia Code injection attacks on harvard-architecture devices. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF harvard architecture, return oriented programming, wireless sensor networks, buffer overflow, embedded devices, computer worms, code injection attacks, gadgets
19Sheraz Naseer, Muhammad Younus, Attiq Ahmed Vulnerabilities Exposing IEEE 802.16e Networks to DoS Attacks: A Survey. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IEEE 802.16e security, Multi- and broadcast service shared key vulnerability, WiMAX, DoS Attacks
19Samuel Galice, Marine Minier Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integral attacks, Rijndael-256, cryptanalysis, block cipher
19Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt A framework for diversifying windows native APIs to tolerate code injection attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF windows native API, diversity, code injection attacks
19Debra L. Cook, Moti Yung, Angelos D. Keromytis The Security of Elastic Block Ciphers Against Key-Recovery Attacks. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Variable-length block ciphers, reduction proof, security analysis, key recovery attacks
19Sanjay Burman, Debdeep Mukhopadhyay, Kamakoti Veezhinathan LFSR Based Stream Ciphers Are Vulnerable to Power Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Linear Feed Back Shift Registers, Dynamic Power Dissipation, Side Channel Attacks, Power Analysis, Hamming Distance
19Damas P. Gruska Information-Flow Attacks Based on Limited Observations. Search on Bibsonomy Ershov Memorial Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF process algebras, information flow, timing attacks
19Shahabuddin Muhammad, Zeeshan Furqan, Ratan K. Guha Understanding the intruder through attacks on cryptographic protocols. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF verification, authentication, security protocols, attacks
19Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF overdefined systems of nonlinear equations, state transition matrix, cryptanalysis, stream ciphers, decoding, LFSRs, algebraic attacks, fast correlation attack, decimation, keystream generators
19George Varghese, J. Andrew Fingerhut, Flavio Bonomi Detecting evasion attacks at high speeds without reassembly. Search on Bibsonomy SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF TCP reassembly, normalization, intrusion prevention systems, evasion attacks
19Hyun Sook Rhee, Ik Rae Jeong, Jin Wook Byun, Dong Hoon Lee 0001 Difference Set Attacks on Conjunctive Keyword Search Schemes. Search on Bibsonomy Secure Data Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF difference set attacks, Privacy, keyword search, conjunctive keyword search
19Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood On evolving buffer overflow attacks using genetic programming. Search on Bibsonomy GECCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF intrusion detection systems, linear genetic programming, mimicry attacks
19Greg Goth Phishing Attacks Rising, But Dollar Losses Down. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF phishing attacks, zombie machines
19Michael F. Ringenburg, Dan Grossman Preventing format-string attacks via automatic and efficient dynamic checking. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic checking, format-string attacks, white-lists, static analysis
19Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan New Multiset Attacks on Rijndael with Large Blocks. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF higher-order multiset attacks, cryptanalysis, Rijndael
19Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF nonlinear combination keystream generator, state transition matrix, Stream ciphers, LFSRs, algebraic attacks, fast correlation attack, decimation
19Alireza Hodjat, David Hwang 0001, Ingrid Verbauwhede A Scalable and High Performance Elliptic Curve Processor with Resistance to Timing Attacks. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, Elliptic Curve Cryptography, side-channel attacks, Galois fields, hardware architecture
19Xiaoyun Wang 0001, Hongbo Yu, Yiqun Lisa Yin Efficient Collision Search Attacks on SHA-0. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Collision search attacks, Hash functions, SHA-1, SHA-0
19Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH
19Colin D. Walter Longer Keys May Facilitate Side Channel Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem
19George Danezis, Len Sassaman Heartbeat traffic to counter (n-1) attacks: red-green-black mixes. Search on Bibsonomy WPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF anonymity, mix networks, flooding attacks
19Katsuyuki Okeya, Tsuyoshi Takagi The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF width-w NAF, pre-computation table, smart card, side channel attacks, Elliptic curve cryptosystem, memory constraint
19Ho-Yen Chang, Shyhtsun Felix Wu, Y. Frank Jou Real-time protocol analysis for detecting link-state routing protocol attacks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF OSPF attacks, knowledge-based IDS, link-state routing protocol security, real-time misuse intrusion detection, real-time network protocol analysis, timed finite state machine, event correlation
18Pietro Baroni, Federico Cerutti 0001, Massimiliano Giacomin, Giovanni Guida Encompassing Attacks to Attacks in Abstract Argumentation Frameworks. Search on Bibsonomy ECSQARU The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Andreas Lang 0001, Jana Dittmann, Ryan Spring, Claus Vielhauer Audio watermark attacks: from single to profile attacks. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF smba, digital watermarking, audio, attack, stirmark
17Fernando Sanchez, Zhenhai Duan Region-based BGP announcement filtering for improved BGP security. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF BGP security, network prefix hijacking, BGP
17Alberto Avritzer, Rajanikanth Tanikella, Kiran James, Robert G. Cole, Elaine J. Weyuker Monitoring for security intrusion using performance signatures. Search on Bibsonomy WOSP/SIPEW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF performance signatures, security, measurement, monitoring
17Dmitry G. Korzun, Andrei V. Gurtov A local equilibrium model for P2P resource ranking. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Sipat Triukose, Zhihua Wen, Michael Rabinovich Content delivery networks: how big is big enough? Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Alma Riska, Erik Riedel Evaluation of disk-level workloads at different time scales. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Baruch Awerbuch, Christian Scheideler Towards a Scalable and Robust DHT. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Xianglin Deng, Malcolm Shore Advanced Flooding Attack on a SIP Server. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Panupong Sornkhom, Yongyuth Permpoontanalarp Security analysis of Micali's fair contract signing protocol by using Coloured Petri Nets : Multi-session case. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Frederik Armknecht, Roel Maes, Ahmad-Reza Sadeghi, Berk Sunar, Pim Tuyls Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Wenchao Huang, Yan Xiong, Depin Chen DAAODV: A Secure Ad Hoc Routing Protocol Based on Direct Anonymous Attestation. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Qingshui Xue, Fengying Li, Yuan Zhou 0008, Jiping Zhang 0001, Zhenfu Cao, Haifeng Qian An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Olivier Billet, Duong Hieu Phan Traitors Collaborating in Public: Pirates 2.0. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta Bit-Free Collision: Application to APOP Attack. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit-free collision, APOP, hash function, MD5, MD4
17Orr Dunkelman, Nathan Keller Cryptanalysis of CTC2. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Thomas Plos Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Deta-ched Power Supply, Parasitic Backscatter, RFID, Differential Power Analysis, Side-Channel Analysis, UHF
17Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer 0001 Model-Checking DoS Amplification for VoIP Session Initiation. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Hung-Min Sun, Wen-Hsuan Chang, Shih-Ying Chang, Yue-Hsun Lin DepenDNS: Dependable Mechanism against DNS Cache Poisoning. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Moni Naor, Gil Segev 0001 Public-Key Cryptosystems Resilient to Key Leakage. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Asia Slowinska, Herbert Bos Pointless tainting?: evaluating the practicality of pointer tainting. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic taint analysis, pointer tainting
17Xu Guo 0001, Junfeng Fan, Patrick Schaumont, Ingrid Verbauwhede Programmable and Parallel ECC Coprocessor Architecture: Tradeoffs between Area, Speed and Security. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Umit Topaloglu, Coskun Bayrak Secure mobile agent execution in virtual environment. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Agent and host protection, Security, Mobile agents, Virtualization, Encryption, Decryption
17Alfred Menezes, Berkant Ustaoglu Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NIST SP 800-56A, provable security, security models, key agreement protocols
17Kun Peng, Feng Bao 0001 Correction, Optimisation and Secure and Efficient Application of PBD Shuffling. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PBD shuffling, AAAP attack, optimisation, correction
17Bosheng Zhou, Alan Marshall 0001, Wenzhe Zhou, Kun Yang A Random Packet Destruction DoS Attack for Wireless Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Alain Durand, Marc Joye, Mohamed Karroumi Laundering and Repackaging of Multimedia Content in Content Distribution Systems. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Dongbin Wang, Mingzeng Hu, Hui Zhi A Survey of Secure Routing in Ad Hoc Networks. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Chwan-Hwa John Wu, Tong Liu Simulation for intrusion-resilient, DDoS-resistant authentication system (IDAS). Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer network defense, authentication, network security, discrete event simulation, DDoS, intrusion
17Jing Dong 0006, Reza Curtmola, Cristina Nita-Rotaru On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks. Search on Bibsonomy SECON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Zonglin Li, Guangmin Hu, Dan Yang Global abnormal correlation analysis for DDoS attack detection. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Tanya G. Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shankar Sastry 0001 Testbed Implementation of a Secure Flooding Time Synchronization Protocol. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Parag Agarwal, Balakrishnan Prabhakaran 0001 Tamper proofing mechanisms for motion capture data. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF watermarking, encoding, decoding, blind, spatial
17Xin Hu 0001, Taejoon Park, Kang G. Shin Attack-Tolerant Time-Synchronization in Wireless Sensor Networks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson Bit-Pattern Based Integral Attack. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integral cryptanalysis, Noekeon, Block ciphers, present, Serpent
17Ayesha Altaf, M. Younus Javed, Attiq Ahmed Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privcy and Key Management, security
17Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi On Establishing and Fixing a Parallel Session Attack in a Security Protocol. Search on Bibsonomy IDC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF protocol flaws, parallel session attack, Security protocols
17Ivan P. L. Png, Chen-Yu Wang, Qiu-Hong Wang The Deterrent and Displacement Effects of Information Security Enforcement: International Evidence. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Fengying Li, Qingshui Xue, Jiping Zhang 0001, Zhenfu Cao A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Christophe De Cannière, Christian Rechberger Preimages for Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0
17Xiao-Li Huang, Chuan-Kun Wu Cryptanalysis of Achterbahn-Version 1 and -Version 2. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, distinguishing attack, cryptology, eSTREAM
17Tao Peng 0002, Christopher Leckie, Kotagiri Ramamohanarao Survey of network-based defense mechanisms countering the DoS and DDoS problems. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DNS reflector attack, bandwidth attack, resource management, DoS, DDoS, Botnet, Internet security, IP traceback, IRC, IP spoofing, SYN flood, VoIP security
17Chenfeng Vincent Zhou, Shanika Karunasekera, Christopher Leckie Evaluation of a Decentralized Architecture for Large Scale Collaborative Intrusion Detection. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Francesco Regazzoni 0001, Stéphane Badel, Thomas Eisenbarth 0001, Johann Großschädl, Axel Poschmann, Zeynep Toprak Deniz, Marco Macchetti, Laura Pozzi, Christof Paar, Yusuf Leblebici, Paolo Ienne A Simulation-Based Methodology for Evaluating the DPA-Resistance of Cryptographic Functional Units with Application to CMOS and MCML Technologies. Search on Bibsonomy ICSAMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Virgil D. Gligor On the evolution of adversary models in security protocols: from the beginning to sensor networks. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Kun Wang, Meng Wu, Pengrui Xia, Subin Shen An Incentive-Based Secure Charging Scheme for Integrating Networks. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MANET (Ad Hoc), security, cellular network, incentive, charging, Integrating networks
17Yoo-Jin Baek, Ihor Vasyltsov How to Prevent DPA and Fault Attack in a Unified Way for ECC Scalar Multiplication - Ring Extension Method. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Hengfu Yang, Xingming Sun, Bin Wang, Zheng Qin 0001 An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
17Yunhao Liu 0001, Xiaomei Liu, Chen Wang 0010, Li Xiao 0001 Defending P2Ps from Overlay Flooding-based DDoS. Search on Bibsonomy ICPP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Chen Yang, Wenping Ma, Benxiong Huang, Xinmei Wang Password-Based Access Control Scheme with Remote User Authentication Using Smart Cards. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen 0001 Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17James J. Treinen, Ramakrishna Thurimella Application of the PageRank Algorithm to Alarm Graphs. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Watch Lists, Alarm Graphs, Intrusion Detection, PageRank, Security Visualization
17José Fonseca 0002, Marco Vieira, Henrique Madeira Detecting Malicious SQL. Search on Bibsonomy TrustBus The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Intrusion Detection, Web applications
17Pin Ren, Yan Gao 0003, Zhichun Li, Yan Chen 0004, Benjamin Watson 0001 IDGraphs: Intrusion Detection and Analysis Using Stream Compositing. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Brushing and Linking, Intrusion Detection, Interactive System, Dynamic Query, Security Visualization, Correlation Matrix
17Wei Chen, Dit-Yan Yeung Throttling spoofed SYN flooding traffic at the source. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash-based detection, CUSUM, Bloom filter, DDoS, IP spoofing, SYN flooding
17Krerk Piromsopa, Richard J. Enbody Secure Bit: Transparent, Hardware Buffer-Overflow Protection. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Buffer overflow, security and protection, security kernels, invasive software
17Hongmei Liu 0001, Ling Zhu, Jiwu Huang A Hybrid Watermarking Scheme for Video Authentication. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Young-Yoon Lee, Chang-Su Kim 0001, Sang-Uk Lee Video Fingerprinting Based on Frame Skipping. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jakub Botwicz, Piotr Buciak, Piotr Sapiecha Building Dependable Intrusion Prevention Systems. Search on Bibsonomy DepCoS-RELCOMEX The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Fernando C. Colón Osorio, Zachi Klopman And you though you were safe after SLAMMER, not so, swarms not Zombies present the greatest risk to our national Internet infrastructure. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17John C. McEachen, Cheng Kah Wai, Vonda L. Olsavsky Aggregating Distributed Sensor Data for Network Intrusion Detection. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Byung Ryong Kim, Ki-Chang Kim Improved Technique of IP Address Fragmentation Strategies for DoS Attack Traceback. Search on Bibsonomy CSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Udaya Kiran Tupakula, Vijay Varadharajan Analysis of traceback techniques. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF DoS, denial of service, DDoS, traceback
17Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF client-to-client, cryptanalysis, provable security, security model, Password-authenticated key exchange, cross realm
17Gil-Jong Mun, Yongmin Kim 0005, DongKook Kim, BongNam Noh Network Intrusion Detection Using Statistical Probability Distribution. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Dong Phil Kim, Seok Joo Koh, Sang Wook Kim An Integrated Scheme for Intrusion Detection in WLAN. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Girija Chetty, Michael Wagner 0004 Face-Voice Authentication Based on 3D Face Models. Search on Bibsonomy ACCV (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Sandeep Bhatkar, Abhishek Chaturvedi, R. Sekar 0001 Dataflow Anomaly Detection. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Baruch Awerbuch, Christian Scheideler Towards a scalable and robust DHT. Search on Bibsonomy SPAA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF robustness, overlay networks, peer-to-peer systems
17Ying Xu, Roch Guérin On the robustness of router-based denial-of-service (DoS) defense systems. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF router-based defense, denial-of-service
Displaying result #701 - #800 of 35802 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license