The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "DSN"( http://dblp.L3S.de/Venues/DSN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/dsn

Publication years (Num. hits)
2000 (66) 2001 (56) 2002 (99) 2003 (85) 2004 (97) 2005 (96) 2006 (74) 2007 (93) 2008 (70) 2009 (77) 2010 (70) 2011 (60) 2012 (52) 2013 (73) 2014 (83) 2015 (55) 2016 (59) 2017 (56) 2018 (63) 2019 (55) 2020 (49) 2021 (50) 2022 (50) 2023 (49)
Publication types (Num. hits)
inproceedings(1613) proceedings(24)
Venues (Conferences, Journals, ...)
DSN(1637)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 320 occurrences of 239 keywords

Results
Found 1637 publication records. Showing 1637 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1John T. Daly, Nathan DeBardeleben 1st workshop on fault-tolerance for HPC at extreme scale FTXS 2010. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Peng Xie, Jason H. Li, Xinming Ou, Peng Liu 0005, Renato Levy Using Bayesian networks for cyber security analysis. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Miguel Correia 0001, Partha P. Pal 4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhiqiang Lin, Xiangyu Zhang 0001, Dongyan Xu Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Eric Anderson 0003, Xiaozhou Li, Arif Merchant, Mehul A. Shah, Kevin Smathers, Joseph A. Tucek, Mustafa Uysal, Jay J. Wylie Efficient eventual consistency in Pahoehoe, an erasure-coded key-blob archive. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Henrique Moniz, Nuno Ferreira Neves, Miguel Correia 0001 Turquois: Byzantine consensus in wireless ad hoc networks. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Roberto Natella, Domenico Cotroneo, João Durães, Henrique Madeira Representativeness analysis of injected software faults in complex software. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yuanyuan Zeng, Xin Hu 0001, Kang G. Shin Detection of botnets using combined host- and network-level information. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jianqiang Luo, Cheng Huang 0002, Lihao Xu Decoding STAR code for tolerating simultaneous disk failure and silent errors. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael Grottke, Allen P. Nikora, Kishor S. Trivedi An empirical investigation of fault types in space mission system software. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Diogo Mónica, João Leitão 0001, Luís E. T. Rodrigues, Carlos Ribeiro Observable non-Sybil quorums construction in one-hop wireless ad hoc networks. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Pedro Fonseca 0001, Cheng Li 0001, Vishal Singhal, Rodrigo Rodrigues 0001 A study of the internal and external effects of concurrency bugs. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Utpal Paul, Samir R. Das, Ritesh Maheshwari Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Boudewijn R. Haverkort, Matthias Kuntz, Anne Remke, S. Roolvink, Mariëlle Stoelinga Evaluating repair strategies for a water-treatment facility using Arcade. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhen Wang 0001, Mark G. Karpovsky, Ajay Joshi Reliable MLC NAND flash memories based on nonlinear t-error-correcting codes. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yimin Song, Chao Yang 0022, Guofei Gu Who is peeping at your passwords at Starbucks? - To catch an evil twin access point. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xin Fu, Tao Li, José A. B. Fortes Architecting reliable multi-core network-on-chip for small scale processing technology. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Manoj K. Agarwal, Venkateswara Reddy Madduri Correlating failures with asynchronous changes for root cause analysis in enterprise environments. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Weichao Wang, Di Pu, Alexander M. Wyglinski Detecting Sybil nodes in wireless networks with physical layer network coding. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2010, Chicago, IL, USA, June 28 - July 1 2010 Search on Bibsonomy DSN The full citation details ... 2010 DBLP  BibTeX  RDF
1Eric Bisolfati, Paul Dan Marinescu, George Candea Studying application-library interaction and behavior with LibTrac. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Roy A. Maxion, Kevin S. Killourhy Keystroke biometrics with number-pad input. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Elias P. Duarte Jr., Thiago Garrett, Luis C. E. Bona, Renato Carmo, Alexandre Prusch Züge Finding stable cliques of PlanetLab nodes. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sergey Legtchenko, Sébastien Monnet, Gaël Thomas 0001 Blue Banana: resilience to avatar mobility in distributed MMOGs. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Karthik Pattabiraman, Zbigniew Kalbarczyk Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS). Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Maxime Monod, Vivien Quéma Stretching gossip with live streaming. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yao Zhao 0003, Sagar Vemuri, Jiazhen Chen, Yan Chen 0004, Hai Zhou 0001, Zhi Fu Exception triggered DoS attacks on wireless networks. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kevin S. Killourhy, Roy A. Maxion Comparing anomaly-detection algorithms for keystroke dynamics. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zibin Zheng, Michael R. Lyu A QoS-aware fault tolerant middleware for dependable service composition. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Luc Malrait, Sara Bouchenak, Nicolas Marchand Fluid modeling and control for server system performance and availability. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Derek Graham, Per Strid, Scott Roy, Fernando Rodriguez A low-tech solution to avoid the severe impact of transient errors on the IP interconnect. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Geist System log pre-processing to improve failure prediction. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gonçalo Quadros Dependability - How does the market value it? Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christopher Szilagyi, Philip Koopman Flexible multicast authentication for time-triggered embedded control network applications. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xiangyu Tang, Seongmoon Wang A self-diagnosis technique using Reed-Solomon codes for self-repairing chips. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marijn R. Jongerden, Boudewijn R. Haverkort, Henrik C. Bohnenkamp, Joost-Pieter Katoen Maximizing system lifetime by battery scheduling. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1José Fonseca 0002, Marco Vieira, Henrique Madeira Vulnerability & attack injection for web applications. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Matthias Sand, Stefan Potyra, Volkmar Sieh Deterministic high-speed simulation of complex systems including fault-injection. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Giuliano Casale, Evgenia Smirni MAP-AMVA: Approximate mean value analysis of bursty systems. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Julia L. Lawall, Julien Brunel, Nicolas Palix, René Rydhof Hansen, Henrik Stuart, Gilles Muller WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhen Wang 0001, Mark G. Karpovsky, Konrad J. Kulikowski Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jennifer Black, Philip Koopman System safety as an emergent property in composite systems. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Zhihong Zhang, Jianfeng Zhan, Yong Li 0007, Lei Wang 0004, Dan Meng, Bo Sang Precise request tracing and performance debugging for multi-tier services of black boxes. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1António Casimiro, Rogério de Lemos, Cristina Gacek Workshop on Architecting Dependable Systems (WADS 2009). Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marco Vieira, Nuno Antunes, Henrique Madeira Using web security scanners to detect vulnerabilities in web services. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis Third workshop on dependable and secure nanocomputing. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Galen Lyle, Shelley Cheny, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer An end-to-end approach for the automatic derivation of application-aware error detectors. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Guanhua Yan, Leticia Cuellar, Stephan J. Eidenbenz, Nicolas W. Hengartner Blue-Watchdog: Detecting Bluetooth worm propagation in public areas. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christof Fetzer, Rodrigo Rodrigues 0001 Fifth Workshop on Hot Topics in System Dependability (HotDep 2009). Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jianqiang Luo, Lihao Xu, James S. Plank An efficient XOR-scheduling algorithm for erasure codes encoding. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Luis Marques, António Casimiro, Mario Calha Design and development of a proof-of-concept platooning application using the HIDENETS architecture. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nicholas Weaver, John H. Kelm, Matthew I. Frank Emµcode: Masking hard faults in complex functional units. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Gabriela Jacques-Silva, Bugra Gedik, Henrique Andrade, Kun-Lung Wu Language level checkpointing support for stream processing applications. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hari Kannan, Michael Dalton, Christos Kozyrakis Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Luiz Eduardo Buzato, Gustavo M. D. Vieira, Willy Zwaenepoel Dynamic content web applications: Crash, failover, and recovery analysis. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Luigi Romano Fast Abstracts. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yu-Sung Wu, Saurabh Bagchi, Navjot Singh 0001, Ratsameetip Wita Spam detection in voice-over-IP calls through semi-supervised clustering. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Miao Jiang 0002, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward Automatic fault detection and diagnosis in complex software systems by information-theoretic monitoring. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley RRE: A game-theoretic intrusion Response and Recovery Engine. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Henrique Madeira, István Majzik From assessment to standardised benchmarking: Will it happen? What could we do about it? Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum Fault isolation for device drivers. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Paulo Sousa 0001, Alysson Neves Bessani, Wagner Saback Dantas, Fabio Souto, Miguel Correia 0001, Nuno Ferreira Neves Intrusion-tolerant self-healing devices for critical infrastructure protection. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009 Search on Bibsonomy DSN The full citation details ... 2009 DBLP  BibTeX  RDF
1Tao Xie 0001, Nikolai Tillmann, Jonathan de Halleux, Wolfram Schulte Fitness-guided path exploration in dynamic symbolic execution. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kaustubh R. Joshi, Guy Bunker, Farnam Jahanian, Aad P. A. van Moorsel, Joseph Weinman Dependability in the cloud: Challenges and opportunities. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marco Beccuti, Giuliana Franceschinis, Daniele Codetta Raiteri, Serge Haddad Parametric NdRFT for the derivation of optimal repair strategies. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jacques Bus Future prospects of research on security and dependability. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Paul Dan Marinescu, George Candea LFI: A practical and general library-level fault injector. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Tummeltshammer, Andreas Steininger Power supply induced common cause faults-experimental assessment of potential countermeasures. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tod Courtney, Shravan Gaonkar, Ken Keefe, Eric Rozier, William H. Sanders Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz, Hung Q. Ngo 0001 On the effectiveness of structural detection and defense against P2P-based botnets. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Robin Berthier, Jorge Arjona, Michel Cukier Analyzing the process of installing rogue software. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Peter Kemper Report generation for simulation traces with Traviando. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Robert E. Strom, Chitra Dorai Providing transactional quality of service in event stream processing middleware. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Filipe Freitas, Edgar Marques, Rodrigo Rodrigues 0001, Carlos Ribeiro, Paulo Ferreira 0001, Luís E. T. Rodrigues Verme: Worm containment in overlay networks. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ossama Hamouda, Mohamed Kaâniche, Karama Kanoun Safety modeling and evaluation of Automated Highway Systems. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Naga Durga Prasad Avirneni, Viswanathan Subramanian, Arun K. Somani Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Miroslaw Malek, Felix Salfner, Kishor S. Trivedi Workshop on proactive failure avoidance, recovery and maintenance (PFARM). Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ardalan Kangarlou, Patrick Eugster, Dongyan Xu VNsnap: Taking snapshots of virtual networked environments with minimal downtime. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chengmo Yang, Alex Orailoglu Processor reliability enhancement through compiler-directed register file peak temperature reduction. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Avik Sinha, Amit M. Paradkar, Palani Kumanan, Branimir Boguraev A linguistic analysis engine for natural language use case description and its application to dependability analysis in industrial use cases. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Saurabh Bagchi, Miguel Correia 0001, Partha P. Pal 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Maohua Lu, Tzi-cker Chiueh Fast memory state synchronization for virtualization-based fault tolerance. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang, Sy-Yen Kuo Xprobe2++: Low volume remote network information gathering tool. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Marco Vieira Student Forum. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eli Courtwright, Chuan Yue, Haining Wang Efficient resource management on template-based web servers. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Christian Cachin, Idit Keidar, Alexander Shraer Fail-Aware Untrusted Storage. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang 0001 Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jon G. Elerath A simple equation for estimating reliability of an N+1 redundant array of independent disks (RAID). Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Justin Ray, Philip Koopman Data management mechanisms for embedded system gateways. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ying Zhang 0022, Zheng Zhang 0009, Zhuoqing Morley Mao, Y. Charlie Hu HC-BGP: A light-weight and flexible scheme for securing prefix ownership. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nicolas Geoffray, Gaël Thomas 0001, Gilles Muller, Pierre Parrend, Stéphane Frénot, Bertil Folliot I-JVM: a Java Virtual Machine for component isolation in OSGi. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Giovanna Dondossola, Fabrizio Garrone, Judit Szanto, Geert Deconinck, T. Loix, Hakem Beitollahi ICT resilience of power control systems: experimental results from the CRUTIAL testbeds. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yongning Tang, Ehab Al-Shaer Sharing end-user negative symptoms for improving overlay network dependability. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jing Jin, Xinyuan Wang On the effectiveness of low latency anonymous network in the presence of timing attack. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mahdi Fazeli, Alireza Namazi, Seyed Ghassem Miremadi An energy efficient circuit level technique to protect register file from MBUs and SETs in embedded processors. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eric Rozier, Wendy Belluomini, Veera Deenadhayalan, Jim Hafner, K. K. Rao, Pin Zhou Evaluating the impact of Undetected Disk Errors in RAID systems. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Hemant Sengar Overloading vulnerability of VoIP networks. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Nikhil Pandit, Zbigniew Kalbarczyk, Ravishankar K. Iyer Effectiveness of machine checks for error diagnostics. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 1637 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license