The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Malicious with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1990 (17) 1991-1994 (15) 1995-1996 (19) 1997 (16) 1998 (34) 1999 (27) 2000 (47) 2001 (76) 2002 (100) 2003 (164) 2004 (264) 2005 (382) 2006 (463) 2007 (508) 2008 (584) 2009 (410) 2010 (169) 2011 (158) 2012 (173) 2013 (182) 2014 (208) 2015 (229) 2016 (261) 2017 (276) 2018 (369) 2019 (348) 2020 (394) 2021 (441) 2022 (395) 2023 (443) 2024 (125)
Publication types (Num. hits)
article(2248) book(8) data(5) incollection(29) inproceedings(4933) phdthesis(62) proceedings(12)
Venues (Conferences, Journals, ...)
CoRR(363) MALWARE(192) IACR Cryptol. ePrint Arch.(98) IEEE Access(90) ACSAC(85) CCS(70) Comput. Secur.(61) ICC(58) ARES(55) SAC(50) RAID(43) DSN(39) GLOBECOM(37) Sensors(37) ICDCS(35) Wirel. Pers. Commun.(35) More (+10 of total 1903)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3452 occurrences of 1510 keywords

Results
Found 7297 publication records. Showing 7297 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Hui Li, Yanfei Zheng, Mi Wen, Kefei Chen A Secure Time Synchronization Protocol for Sensor Network. Search on Bibsonomy PAKDD Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, sensor network, Synchronization
11Jason J. Jung, GeunSik Jo Risk Discovery Based on Recommendation Flow Analysis on Social Networks. Search on Bibsonomy IEA/AIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Risk discovery, Social network, Recommendation
11Chin-Chen Chang 0001, Chih-Chiang Tsou, Yung-Chen Chou A Remediable Image Authentication Scheme Based on Feature Extraction and Clustered VQ. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF quad-tree segmentation, Image authentication, tampering detection
11Yufeng Wang 0001, Yoshiaki Hori, Kouichi Sakurai On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Sid Stamm, Zulfikar Ramzan, Markus Jakobsson Drive-By Pharming. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Andreas Moser, Christopher Kruegel, Engin Kirda Limits of Static Analysis for Malware Detection. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Azzedine Boukerche, Yonglin Ren, Zhenxia Zhang Performance Evaluation of an Anonymous Routing Protocol using Mobile Agents for Wireless Ad hoc Networks. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Cynthia E. Irvine, Karl N. Levitt Trusted Hardware: Can It Be Trustworthy? Search on Bibsonomy DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Asad Amir Pirzada, Chris McDonald, Amitava Datta Performance Comparison of Trust-Based Reactive Routing Protocols. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, network, Trust, protocol, ad hoc
11Naouel Ben Salem, Levente Buttyán, Jean-Pierre Hubaux, Markus Jakobsson Node Cooperation in Hybrid Ad Hoc Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authentication security, payment schemes, wireless communication, Network-level security and protection
11Panagiotis Papadimitratos, Zygmunt J. Haas Secure data communication in mobile ad hoc networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Yan Lindsay Sun, Wei Yu 0003, Zhu Han 0001, K. J. Ray Liu Information theoretic framework of trust modeling and evaluation for ad hoc networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Hao Yang 0004, James Shu, Xiaoqiao Meng, Songwu Lu SCAN: self-organized network-layer security in mobile ad hoc networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Krishna Sandeep Reddy Dubba, Arun K. Pujari N-gram analysis for computer virus detection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Hua Yuan, Xiao-Ping (Steven) Zhang Multiscale Fragile Watermarking Based on the Gaussian Mixture Model. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, Ravi K. Iyer An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Michel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan A Statistical Analysis of Attack Data to Separate Attacks. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Arjun Nambiar, Matthew K. Wright Salsa: a structured approach to large-scale anonymity. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, networks, peer-to-peer networks, anonymous communications
11Wei Jiang, Chris Clifton Transforming Semi-Honest Protocols to Ensure Accountability. Search on Bibsonomy ICDM Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Luc Beaudoin, P. Eng Asset Valuation Technique for Network Management and Security. Search on Bibsonomy ICDM Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Yong Tang, Hua-Ping Hu, Xicheng Lu, Jie Wang HonIDS: Enhancing Honeypot System with Intrusion Detection Models. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Huei-Wen Ferng, Chien-Liang Liu Design of a Joint Defense System for Mobile Ad Hoc Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Uwe Roth, Volker Fusenig Trust-decisions on the base of maximal information of recommended direct-trust. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF recommended trust, trust-decision, trust, certainty
11Khadija Houerbi Ramah, Hichem Ayari, Farouk Kamoun Traffic Anomaly Detection and Characterization in the Tunisian National University Network. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Temporal Characteristics, Principal Component Analysis, Anomaly Detection
11Seong-Pyo Hong, Jong-An Park, Seung Jo Han, Jae-Young Pyun, Joon Lee Design of WLAN Secure System Against Weaknesses of the IEEE 802.1x. Search on Bibsonomy ICHIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IEEE 802.1x, Privacy, Authentication, Wireless LAN Security
11Feng Cao, Cullen Jennings Providing Response Identity and Authentication in IP Telephony. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secure Enterprise Architecture, Voice Spam, Spam in IP Telephony (SPIT), IP Telephony, VoIP Security
11Donghong Yang, Ke Xu 0002, Yong Cui 0001 An improved Wu-Manber multiple patterns matching algorithm. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11José M. Fernandez 0001, Pierre-Marc Bureau Optimising malware. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Jian Yin 0006, Sanjay Kumar Madria A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Black hole attack, Sensor networks
11Tony Abou-Assaleh, Tapajyoti Das Combating Spamdexing: Incorporating Heuristics in Link-Based Ranking. Search on Bibsonomy WAW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Rajwinder Singh, Navdeep Kaur, Anil Kumar Sarje Secure Itineraries Framework for Mobile Agent Systems. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF serial itinerary, parallel itinerary, mobile agent security, Itineraries
11Jeffrey Gerard, Hailong Cai, Jun Wang 0001 Alliatrust: A Trustable Reputation Management Scheme for Unstructured P2P Systems. Search on Bibsonomy GPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Wei Wu, Phu Dung Le An Efficient and Secure Code Sharing for Peer-to-Peer Communications. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Bernhard Fechner, Jörg Keller 0001, Andreas Wohlfeld Web server protection by customized instruction set encoding. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Huabing Yang, Xingyuan Zhang, Yuanyuan Wang A correctness proof of the SRP protocol. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Peter Langendörfer, Martin Lehmann 0001, Krzysztof Piotrowski Efficient Protection of Mobile Devices by Cross Layer Interaction of Firewall Approaches. Search on Bibsonomy WWIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Giannakis Antoniou, Campbell Wilson, Dimitris Geneiatakis PPINA - A Forensic Investigation Protocol for Privacy Enhancing Technologies. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Privacy Enhancing Technologies, Network Forensics
11In Koo Kang, Dong-Hyuck Im, Heung-Kyu Lee, Young-Ho Suh Implementation of real-time watermarking scheme for high-quality video. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fast HVS, real-time, watermark embedding
11Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer An artificial immune system and its integration into an organic middleware for self-protection. Search on Bibsonomy GECCO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11James Newsome, Brad Karp, Dawn Xiaodong Song Paragraph: Thwarting Signature Learning by Training Maliciously. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Victor Page, Robin C. Laney, Maurice Dixon, Charles B. Haley Trust Obstacle Mitigation for Database Systems. Search on Bibsonomy BNCOD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Mike Burmester, Tri Van Le, Breno de Medeiros Towards Provable Security for Ubiquitous Applications. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Theodor Richardson Preventing Attacks on Back-End Servers using Masquerading/Honeypots. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Munirul M. Haque, Sheikh Iqbal Ahamed m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications. Search on Bibsonomy ICPP Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Gaeil An, Jaehoon Nah Effective Control of Abnormal Neighbor Discovery Congestion on IPv6 Local Area Network. Search on Bibsonomy UIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Sk. Md. Mizanur Rahman, Atsuo Inomata, Takeshi Okamoto, Masahiro Mambo, Eiji Okamoto Anonymous Secure Communication in Wireless Mobile Ad-Hoc Networks. Search on Bibsonomy ICUCT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Routing, Ad-hoc network, Anonymity, Pairing-Based Cryptography
11Heung-Nam Kim, Ae-Ttie Ji, GeunSik Jo Enhanced Prediction Algorithm for Item-Based Collaborative Filtering Recommendation. Search on Bibsonomy EC-Web The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Yoon-Ho Choi, Jong-Ho Park, Sang-Kon Kim, Seung-Woo Seo, Yu Kang, Jin Gi Choe, Ho-Kun Moon, Myung-Soo Rhee An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11In Koo Kang, Dong-Hyuck Im, Young-Ho Suh, Heung-Kyu Lee Real-Time Watermark Embedding for High Resolution Video Watermarking. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Venkata Nishanth Lolla, Lap Kong Law, Srikanth V. Krishnamurthy, Chinya V. Ravishankar, Dharmaiah Manjunath Detecting MAC Layer Back-off Timer Violations in Mobile Ad Hoc Networks. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Patrick E. Lanigan, Rajeev Gandhi, Priya Narasimhan Sluice: Secure Dissemination of Code Updates in Sensor Networks. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Byung Ryong Kim, Ki-Chang Kim A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Yong Cui 0001, Lingjian Song, Ke Xu 0002 RCS: A Distributed Mechanism Against Link Flooding DDoS Attacks. Search on Bibsonomy ICOIN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Junsheng Chang, Huaimin Wang, Gang Yin A Dynamic Trust Metric for P2P Systems. Search on Bibsonomy GCC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Sangho Lee, Dong Hwi Lee, Kuinam J. Kim A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cyber-threat, TMS, Early-Warning, ESM
11Shaoquan Jiang, Guang Gong A Round and Communication Efficient Secure Ranking Protocol. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Amit Vasudevan, Ramesh Yerraballi Cobra: Fine-grained Malware Analysis using Stealth Localized-executions. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Xiuqun Wang, Honglun Hou, Yueting Zhuang Secure Byzantine Fault Tolerant LDAP System. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Spyridon Antonakopoulos Fast leader-election protocols with bounded cheaters' edge. Search on Bibsonomy STOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF distributed computing, leader election, coin-flipping
11Girish Suryanarayana, Mamadou H. Diallo, Justin R. Erenkrantz, Richard N. Taylor Architectural support for trust models in decentralized applications. Search on Bibsonomy ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software architecture, reputation, trust management, architectural style, peer-to-peer (P2P), decentralization
11Abhinav Srivastava, Shamik Sural, Arun K. Majumdar Weighted Intra-transactional Rule Mining for Database Intrusion Detection. Search on Bibsonomy PAKDD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Weighted rule mining, Read-Write sequence, Intrusion detection, Data dependency
11Lan Yu, Willy Susilo, Reihaneh Safavi-Naini X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF XRep, X2Rep and X2BTRep, P2P, Reputation System
11Maya Haridasan, Robbert van Renesse Defense against Intrusion in a Live Streaming Multicast System. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11José Fonseca 0002, Marco Vieira, Henrique Madeira Monitoring Database Application Behavior for Intrusion Detection. Search on Bibsonomy PRDC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11QingYuan Huang, Yongjun Wang, Jinshu Su, YingZhi Zeng Personalized Fair Reputation Based Resource Allocation in Grid. Search on Bibsonomy ADVIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Chunqi Tian, Shihong Zou, Wendong Wang, Shiduan Cheng A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. Search on Bibsonomy Formal Aspects in Security and Trust The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Moheeb Abu Rajab, Jay Zarfoss, Fabian Monrose, Andreas Terzis A multifaceted approach to understanding the botnet phenomenon. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF network security, computer security, malware, botnets
11Wei Hu, Jason Hiser, Daniel W. Williams, Adrian Filipi, Jack W. Davidson, David Evans 0001, John C. Knight, Anh Nguyen-Tuong, Jonathan C. Rowanhill Secure and practical defense against code-injection attacks using software dynamic translation. Search on Bibsonomy VEE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software dynamic translation, virtual execution
11Il-Gon Kim, Debmalya Biswas Application of Model Checking to AXML System's Security: A Case Study. Search on Bibsonomy WS-FM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
11Zishuang (Eileen) Ye, Sean W. Smith, Denise L. Anthony Trusted paths for browsers. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF HCISEC, Web browser security, Trust path
11Bharath Madhusudan, John W. Lockwood A Hardware-Accelerated System for Real-Time Worm Detection. Search on Bibsonomy IEEE Micro The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Wei Yu 0003, K. J. Ray Liu Attack-resistant cooperation stimulation in autonomous ad hoc networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Hsueh-Yi Sean Lin, Hong-Yuan Mark Liao, Chun-Shien Lu, Ja-Chen Lin Fragile watermarking for authenticating 3-D polygonal meshes. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Godmar Back, Wilson C. Hsieh The KaffeOS Java runtime system. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF language runtimes, Robustness, virtual machines, resource management, garbage collection, termination, isolation
11Kun Sun 0001, Peng Ning, Cliff Wang Fault-Tolerant Cluster-Wise Clock Synchronization for Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF wireless sensor networks, fault tolerance, Clock synchronization
11Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Aggelos Kiayias, Antonina Mitrofanova Testing Disjointness of Private Datasets. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Paul-Alexandru Chirita, Wolfgang Nejdl, Cristian Zamfir Preventing shilling attacks in online recommender systems. Search on Bibsonomy WIDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF shilling attacks, recommender systems, collaborative filtering, web applications
11Mircea Gh. Negoita Artificial Immune Systems-An Emergent Technology for Autonomous Intelligent Systems and Data Mining. Search on Bibsonomy AIS-ADM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11V. Natarajan, Aruna Balasubramanian, Sumita Mishra, Ramalingam Sridhar Security for Energy Constrained RFID System. Search on Bibsonomy AutoID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Haidong Xia, Jayashree Kanchana, José Carlos Brustoloni Using Secure Coprocessors to Protect Access to Enterprise Networks. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jakob Eriksson, Michalis Faloutsos, Srikanth V. Krishnamurthy Justice: Flexible and Enforceable Per-Source Bandwidth Allocation. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Panayiotis Kotzanikolaou, Rosa Mavropodi, Christos Douligeris Secure Multipath Routing for Mobile Ad Hoc Networks. Search on Bibsonomy WONS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Xin Xu, Weihua Song, Vir V. Phoha Early detection and propagation mitigation of worm programs. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Ben Laurie Safer Scripting Through Precompilation. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Shi-Jinn Horng, Ming-Yang Su, Chao-Yi Wu An E-Mail Client Implementation with Spam Filtering and Security Mechanisms. Search on Bibsonomy ICWS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel Denial-of-service resilience in peer-to-peer file sharing systems. Search on Bibsonomy SIGMETRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF file pollution, network-targeted attacks, peer-to-peer, denial of service
11Weidong Shi, Hsien-Hsin S. Lee, Guofei Gu, Laura Falk, Trevor N. Mudge, Mrinmoy Ghosh An Intrusion-Tolerant and Self-Recoverable Network Service System Using A Security Enhanced Chip Multiprocessor. Search on Bibsonomy ICAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Intrusion-tolerant computing, survivable service, buffer overflow, self-healing, rootkits, chip multi processor
11Ning Song, Lijun Qian, Xiangfang Li Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Anand Patwardhan, Jim Parker 0002, Anupam Joshi, Michaela Iorga, Tom Karygiannis Secure Routing and Intrusion Detection in Ad Hoc Networks. Search on Bibsonomy PerCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Anurag Garg, Roberto G. Cascella Reputation Management for Collaborative Content Distribution. Search on Bibsonomy WOWMOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Reputation based trust management, end-user collaboration, content distribution networks, collaborative networks
11Yacine Rebahi, Vicente E. Mujica V, Dorgham Sisalem A Reputation-Based Trust Mechanism for Ad Hoc Networks. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Suphithat Songsiri A New Approach for Computation Result Protection in the Mobile Agent Paradigm. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jong-Phil Yang, Kyung Hyune Rhee Generating authentication data without keeping a private key for Mobility. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Pars Mutaf, Claude Castelluccia Compact neighbor discovery: a bandwidth defense through bandwidth optimization. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Guomin Yang, Duncan S. Wong, Xiaotie Deng Deposit-Case Attack Against Secure Roaming. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Jörg Platte, Edwin Naroska A combined hardware and software architecture for secure computing. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF encrypted programs, secure processors, certified execution
11Baruch Awerbuch, Boaz Patt-Shamir, David Peleg, Mark R. Tuttle Adaptive Collaboration in Peer-to-Peer Systems. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
11Charikleia Zouridaki, Brian L. Mark, Marek Hejmo, Roshan K. Thomas A quantitative trust establishment framework for reliable data packet delivery in MANETs. Search on Bibsonomy SASN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF routing, mobile ad hoc networks, trust establishment
Displaying result #701 - #800 of 7297 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license