|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 637 occurrences of 418 keywords
|
|
|
Results
Found 928 publication records. Showing 928 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Marc Lelarge, Jean Bolot |
Network externalities and the deployment of security features and protocols in the internet. |
SIGMETRICS |
2008 |
DBLP DOI BibTeX RDF |
security, game theory, economics, price of anarchy, epidemics, cascading |
10 | Masahiro Kimura, Kazumi Saito, Hiroshi Motoda |
Solving the Contamination Minimization Problem on Networks for the Linear Threshold Model. |
PRICAI |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Pinar Heggernes, Rodica Mihai |
Mixed Search Number of Permutation Graphs. |
FAW |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Masaki Nakanishi |
An FPGA Configuration Scheme for Bitstream Protection. |
ARC |
2008 |
DBLP DOI BibTeX RDF |
FPGA configuration, bitstream protection, bitstream encryption, bitstream authentication |
10 | Tobias Eggendorfer |
Application Level Proxies on Bridges. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Security, Network, Proxy, Bridge, Content Filter |
10 | Yuji Sato, David E. Goldberg, Kumara Sastry |
Improving small population performance under noise with viral infection + tropism. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
deceptive problem, tropism, virus infection, genetic algorithms, multimodality, building block, noisy optimization |
10 | Kelly Westbrooks, Irina Astrovskaya, David S. Campo, Yuri Khudyakov, Piotr Berman, Alexander Zelikovsky |
HCV Quasispecies Assembly Using Network Flows. |
ISBRA |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Sirui Yang, Hai Jin 0001, Xiaofei Liao, Sanmin Liu |
Modeling Modern Social-Network-Based Epidemics: A Case Study of Rose. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
Rose Epidemic, Modeling, Social Network, Portable Device |
10 | Andrew W. Hill, Robert P. Guralnick |
Distributed Systems and Automated Biodiversity Informatics: Genomic Analysis and Geographic Visualization of Disease Evolution. |
BNCOD |
2008 |
DBLP DOI BibTeX RDF |
Geophylogenies, H5N1 Avian Influenza, Human health, HyPhy, Viral evolution, Google Earth, Infectious Diseases, Biodiversity Informatics |
10 | Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Düssel, Pavel Laskov |
Learning and Classification of Malware Behavior. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Najwa Aaraj, Anand Raghunathan, Niraj K. Jha |
Dynamic Binary Instrumentation-Based Framework for Malware Defense. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
control-data flow, execution context, dynamic binary instrumentation, virtualization, Malware |
10 | M. Eric Johnson, Dan McGuire, Nicholas D. Willey |
The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users. |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Rafal Leszczyna, Igor Nai Fovino, Marcelo Masera |
MAISim: mobile agent malware simulator. |
SimuTools |
2008 |
DBLP DOI BibTeX RDF |
computer attacks, security, simulation, mobile agents, malware, critical infrastructures, ACM proceedings |
10 | David Haussler |
Computing how we became human. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
mammalian evolution, transposons, selection, genomes |
10 | Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su |
Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
network intrusion detection, TCAM |
10 | Robert Moskovitch, Clint Feher, Yuval Elovici |
Unknown malcode detection - A chronological evaluation. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Robert Moskovitch, Dima Stopel, Clint Feher, Nir Nissim, Yuval Elovici |
Unknown malcode detection via text categorization and the imbalance problem. |
ISI |
2008 |
DBLP DOI BibTeX RDF |
|
10 | Kostas G. Anagnostakis, Michael B. Greenwald, Sotiris Ioannidis, Angelos D. Keromytis |
COVERAGE: detecting and reacting to worm epidemics using cooperation and validation. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Xinli Huang, Futai Zou, Fan-Yuan Ma |
Targeted Local Immunization in Scale-Free Peer-to-Peer Networks. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
targeted local immunization, efficiency, peer-to-peer networks, cost, rate control, scale-free, overlay topology |
10 | Stanley Phillips Gotshall, Kathy Browder, Jessica Sampson, Terence Soule, Richard Wells |
Stochastic optimization of a biologically plausible spino-neuromuscular system model. |
Genet. Program. Evolvable Mach. |
2007 |
DBLP DOI BibTeX RDF |
Biological neural networks, Breeding swarm optimizers, Genetic algorithms, Particle swarm optimizers |
10 | Benjamin Morin, Ludovic Mé |
Intrusion detection and virology: an analysis of differences, similarities and complementariness. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Chonho Lee, Hiroshi Wada, Junichi Suzuki |
Towards a Biologically-inspired Architecture for Self-Regulatory and Evolvable Network Applications. |
Advances in Biologically Inspired Information Systems |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Tyrone Tai-On Kwok, Yu-Kwong Kwok |
Design and Evaluation of Parallel String Matching Algorithms for Network Intrusion Detection Systems. |
NPC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Miroslav Ponec, Paul Giura, Hervé Brönnimann, Joel Wein |
Highly efficient techniques for network forensics. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
payload attribution, bloom filter, network forensics |
10 | Jean-Jacques Quisquater |
The Power of Cryptographic Attacks: Is Your Network Really Secure Against Side Channels Attacks and Malicious Faults? |
SSS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Luke Bellamy, Damien Hutchinson, Jason Wells |
User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Misha L. Rajaram, Vladimir N. Minin, Marc A. Suchard, Karin S. Dorman |
Hot and Cold: Spatial Fluctuation in HIV-1 Recombination Rates. |
BIBE |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Patricia Buendia |
Reconstructing Mutational Pathways from Serial Evolutionary Trees. |
BIBE |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Wojciech Zamojski, Dariusz Caban |
Maintenance Policy of a Network with Traffic Reconfiguration. |
DepCoS-RELCOMEX |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Stefan Dziembowski, Krzysztof Pietrzak |
Intrusion-Resilient Secret Sharing. |
FOCS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Mansoor Ahmed, Amin Andjomshoaa, Tho Manh Nguyen, A Min Tjoa |
Towards an Ontology-based Risk Assessment in Collaborative Environment Using the SemanticLIFE. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Leon Moonen, Spiros Mancoridis |
International Workshop on Code Based Software Security Assessments - CoBaSSA 2007. |
WCRE |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Sangjin Kim, Changyong Lee, Daeyoung Kim 0004, Heekuck Oh |
A Practical Way to Provide Perfect Forward Secrecy for Secure E-Mail Protocols. |
ICDCIT |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Guoning Hu, Deepak Venugopal |
A Malware Signature Extraction and Detection Method Applied to Mobile Networks. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Lansheng Han, Shuxia Han, Bing Peng, Varney Washington |
Fuzzy Tracing the Source of Net-Virus. |
ICFIE |
2007 |
DBLP DOI BibTeX RDF |
Net-virus, fuzzy trace, network security |
10 | Ying-Dar Lin, Po-Ching Lin, Meng-Fu Tsai, Tsao-Jiang Chang, Yuan-Cheng Lai |
kP2PADM: An In-kernel Gateway Architecture for Managing P2P Traffic. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang |
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
Forensics and Evidence, internet attacks, website systems |
10 | Thomas Eisenbarth 0001, Tim Güneysu, Christof Paar, Ahmad-Reza Sadeghi, Marko Wolf, Russell Tessier |
Establishing Chain of Trust in Reconfigurable Hardware. |
FCCM |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Tutomu Murase, Hiroki Fujiwara, Yukinobu Fukushima, Masayoshi Kobayashi, Tokumi Yokohira |
Performance Evaluation of a Multi-Stage Network Event Detection Scheme for Decreasing the False-Positive Rate for a Large Number of Simultaneous, Unknown Events. |
ICN |
2007 |
DBLP DOI BibTeX RDF |
Multi-Stage Network Anomaly Detection, Change-Point Detection, Large-Scale Simultaneous Event, Worm, Virus |
10 | José Carlos Brustoloni, Ricardo Villamarín-Salomón |
Improving security decisions with polymorphic and audited dialogs. |
SOUPS |
2007 |
DBLP DOI BibTeX RDF |
audited dialogs, context-sensitive guidance, e-mail client, polymorphic dialogs, virus propagation, attachment |
10 | Nabil Abdennadher, Régis Boesch |
Deploying PHYLIP phylogenetic package on a Large Scale Distributed System. |
CCGRID |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Helena Handschuh, Elena Trichina |
Securing Flash Technology. |
FDTC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | George S. Oreku, Jianzhong Li 0001, Tamara Pazynyuk |
An application-driven perspective on wireless devises security: the case of distributed denial-of-service (ddos). |
PM2HW2N |
2007 |
DBLP DOI BibTeX RDF |
handheld devices, distributed denial of service attacks (DDoS), wireless sensor nodes |
10 | Shinsuke Miwa, Toshiyuki Miyachi, Masashi Eto, Masashi Yoshizumi, Yoichi Shinoda |
Design Issues of an Isolated Sandbox Used to Analyze Malwares. |
IWSEC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Yudong Sun, Steve McKeever, Kia Balali-Mood, Mark S. P. Sansom |
A Multiscale Model for Efficient Simulation of a Membrane Bound Viral Fusion Peptide. |
BIBM |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Arunabha Mukhopadhyay, Binay Bhushan, Debashis Saha, Ambuj Mahanti |
E-Risk Management through Self Insurance: An Option Model. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
e-risk, option model, self-insurance, e-commerce, security breach |
10 | Barry E. Mullins, Timothy H. Lacey, Robert F. Mills, Joseph M. Trechter, Samuel D. Bass |
The Impact of the NSA Cyber Defense Exercise on the Curriculum at the Air Force Institute of Technology. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Chun Xue, Zili Shao, Meilin Liu, Qingfeng Zhuge, Edwin Hsing-Mean Sha |
Parallel Network Intrusion Detection on Reconfigurable Platforms. |
EUC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Andreas Holzer, Johannes Kinder, Helmut Veith |
Using Verification Technology to Specify and Detect Malware. |
EUROCAST |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Insu Kim, Keecheon Kim |
Secure Session Management Mechanism in VoIP Service. |
ISPA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Lifu Wang, Partha Dasgupta |
Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Nazli Goharian, Alana Platt |
DOTS: Detection of Off-Topic Search via Result Clustering. |
ISI |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Hadas Birin, Zohar Gal-Or, Isaac Elias, Tamir Tuller |
Inferring Models of Rearrangements, Recombinations, and Horizontal Transfers by the Minimum Evolution Criterion. |
WABI |
2007 |
DBLP DOI BibTeX RDF |
minimum evolution, genome rearrangements, recombinations, Phylogenetic network, horizontal gene transfer |
10 | Geon Woo Kim 0001, Deok-Gyu Lee, Jong Wook Han, Sang-Choon Kim, Sang Wook Kim |
Security Framework for Home Network: Authentication, Authorization, and Security Policy. |
PAKDD Workshops |
2007 |
DBLP DOI BibTeX RDF |
Security, Authentication, Access Control, Authorization, Security Policy, Home Network |
10 | Maziar M. Nekovee |
Epidemic Spreading of Computer Worms in Fixed Wireless Networks. |
BIOWIRE |
2007 |
DBLP DOI BibTeX RDF |
Wireless Computer Worms, Epidemic Spreading, Complex Networks, Modelling and Simulations |
10 | Srivaths Ravi 0001, Stefan Mangard |
Tutorial T1: Designing Secure SoCs. |
VLSI Design |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Lien Deboosere, J. De Wachter, Pieter Simoens, Filip De Turck, Bart Dhoedt, Piet Demeester |
Thin Client Computing Solutions in Low- and High-Motion Scenarios. |
ICNS |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Qinghua Zhang, Douglas S. Reeves |
MetaAware: Identifying Metamorphic Malware. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Hailin Feng, Chenxi Shao |
Using Qualitative Technology for Modeling the Process of Virus Infection. |
LSMS (2) |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Mark Thurmond, Andrés Perez, Chunju Tseng, Hsinchun Chen, Daniel Dajun Zeng |
Global Foot-and-Mouth Disease Surveillance Using BioPortal. |
BioSurveillance |
2007 |
DBLP DOI BibTeX RDF |
Foot-and-mouth disease, BioPortal, surveillance |
10 | Sailesh Kumar, Balakrishnan Chandrasekaran 0002, Jonathan S. Turner, George Varghese |
Curing regular expressions matching algorithms from insomnia, amnesia, and acalculia. |
ANCS |
2007 |
DBLP DOI BibTeX RDF |
regular expressions, DFA, deep packet inspection |
10 | Christopher L. Hayes, Yan Luo |
DPICO: a high speed deep packet inspection engine using compact finite automata. |
ANCS |
2007 |
DBLP DOI BibTeX RDF |
FPGA, intrusion detection, finite automata, content addressable memory |
10 | Yu-Chin Cheng, Chien-Hung Chen, Chung-Chih Chiang, Jun-Wei Wang 0002, Chi-Sung Laih |
Generating Attack Scenarios with Causal Relationship. |
GrC |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Ying-Dar Lin, Chih-Wei Jan, Po-Ching Lin, Yuan-Cheng Lai |
Designing an Integrated Architecture for Network Content Security Gateways. |
Computer |
2006 |
DBLP DOI BibTeX RDF |
Security, Network security, Spam |
10 | Bradley K. Jensen, Melinda Cline, Carl Stephen Guynes |
Teaching the undergraduate CS Information Security Course. |
ACM SIGCSE Bull. |
2006 |
DBLP DOI BibTeX RDF |
teaching information security, intrusion detection, malware, information assurance |
10 | Christopher Griffin 0001, Richard R. Brooks |
A note on the spread of worms in scale-free networks. |
IEEE Trans. Syst. Man Cybern. Part B |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jill Slay, Benjamin P. Turnbull |
Computer Security Education and Research in Australia. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Phillip A. Porras |
Privacy-Enabled Global Threat Monitoring. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Hong Yan 0002, Hui Zhang 0001, Kunwadee Sripanidkulchai, Zon-Yin Shae, Debanjan Saha |
Information leak vulnerabilities in SIP implementations. |
IEEE Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Krishna Sandeep Reddy Dubba, Arun K. Pujari |
N-gram analysis for computer virus detection. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
10 | John Aycock, Rennie deGraaf, Michael J. Jacobson Jr. |
Anti-disassembly using Cryptographic Hash Functions. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
Code armoring, Reverse-engineering, Hash function, Virus, Disassembly |
10 | Wing Wong, Mark Stamp 0001 |
Hunting for metamorphic engines. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang 0009 |
Behavior-based modeling and its application to Email analysis. |
ACM Trans. Internet Techn. |
2006 |
DBLP DOI BibTeX RDF |
Email virus propagations, anomaly detection, behavior profiling |
10 | Jan Camenisch |
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. |
SEC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Yoonsun Lim, Myung Kim, Kwang Hee Seo, Ho-Kun Moon, Jin Gi Choe, Yu Kang |
An Enterprise Security Management System as a Web-Based Application Service for Small/Medium Businesses. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Christian Jacob 0001, Scott Steil, Karel P. Bergmann |
The Swarming Body: Simulating the Decentralized Defenses of Immunity. |
ICARIS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | David Déharbe, Pascal Fontaine, Silvio Ranise, Christophe Ringeissen |
Decision Procedures for the Formal Analysis of Software. |
ICTAC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Akira Uchiyama, Takaaki Umedu, Keiichi Yasumoto, Teruo Higashino |
Efficient and Robust Distributed Network Monitoring using Dynamic Group Formation. |
NOMS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Md. Enamul Karim, Laxmi Parida, Arun Lakhotia |
Using Permutation Patterns for Content-Based Phylogeny. |
PRIB |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Alessandro Sette, Huynh-Hoa Bui, John Sidney, Philip E. Bourne, Søren Buus, Ward Fleri, R. Kubo, Ole Lund, D. Nemazee, Julia V. Ponomarenko, Muthu Sathiamurthy, Scott Stewart, Scott Way, Stephen S. Wilson, Björn Peters |
The Immune Epitope Database and Analysis Resource. |
PRIB |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Wojciech Zamojski, Dariusz Caban |
Introduction to the Dependability Modeling of Computer Systems. |
DepCoS-RELCOMEX |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Donghyun Lim, Jin-Wook Chung, Seong-Jin Ahn 0001 |
Using Genetic Algorithm for Network Status Learning and Worm Virus Detection Scheme. |
IDEAL |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Leon Moonen, Spiros Mancoridis |
Code Based Software Security Assessments. |
WCRE |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Kenichi Yoshida |
Sampling-Based Stream Mining for Network Risk Management. |
JSAI |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Paola Flocchini, Nicola Santoro |
Distributed Security Algorithms by Mobile Agents. |
ICDCN |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Krishna Sandeep Reddy Dubba, Subrat Kumar Dash, Arun K. Pujari |
New Malicious Code Detection Using Variable Length n-grams. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
Episodes, Data Mining, n-grams, Malicious code detection |
10 | Johnathon A. Mohr |
The [216: 1 Ratio]: bridging the growing support gap through proactive deployment of emerging technologies. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
adaptive support, network access standardization, personal computer security, preventative computing, network security, updates, malware, virus, spyware, remediation, antivirus, adaptive networking |
10 | Karen McDowell |
Now that we are all so well-educated about spyware, can we put the bad guys out of business? |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
antispyware, greyware, malware, spyware, bots, adware |
10 | Michael Blanco, Kay White |
Reactive to proactive support: a corn dance. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
cross-training, support desk, work-study, security, performance, project management, malware, virus, staffing |
10 | Kenneth Janz, Emily Gruenert |
Creating a positive first impression of information technology support at the start of school. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
communications assessment, start of school, technology planning, collaboration, communications, documentation, marketing, technology training, communication strategies, support services, technology needs assessment |
10 | Sean P. Phalen |
Residential installations for network access on Rollins College campus. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
Rollins College, networking, installations, ResNet |
10 | Amit Vasudevan, Ramesh Yerraballi |
SPiKE: engineering malware analysis tools using unobtrusive binary-instrumentation. |
ACSC |
2006 |
DBLP BibTeX RDF |
security, instrumentation, malware |
10 | Tarek El Kiki, Elaine Lawrence |
Government as a Mobile Enterprise: Real-time, Ubiquitous Government. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Moez Draief, Ayalvadi J. Ganesh, Laurent Massoulié |
Thresholds for virus spread on networks. |
VALUETOOLS |
2006 |
DBLP DOI BibTeX RDF |
SIR epidemic, largest connected component, random graphs, spectral radius |
10 | Bernhard Fechner, Jörg Keller 0001, Andreas Wohlfeld |
Web server protection by customized instruction set encoding. |
IPDPS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Pradip De, Yonghe Liu, Sajal K. Das 0001 |
Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
Random Key Predistribution, Sensor Networks, Random Graph, Epidemiology |
10 | Kostas G. Anagnostakis, Sotiris Ioannidis, Angelos D. Keromytis, Michael B. Greenwald |
Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Yoshiteru Ishida |
Asymmetric Wars Between Immune Agents and Virus Agents: Approaches of Generalists Versus Specialists. |
KES (2) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jingbo Hao, Jianping Yin, Boyun Zhang |
Modeling Viral Agents and Their Dynamics with Persistent Turing Machines and Cellular Automata. |
PRIMA |
2006 |
DBLP DOI BibTeX RDF |
Viral Agent, Persistent Turing Machine, Dynamics, Cellular Automaton |
10 | Collin Mulliner, Giovanni Vigna, David Dagon, Wenke Lee |
Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. |
DIMVA |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #701 - #800 of 928 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|