The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attack with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1979 (15) 1980-1984 (18) 1985 (16) 1986-1987 (20) 1988 (19) 1989 (17) 1990 (27) 1991 (28) 1992 (20) 1993 (28) 1994 (50) 1995 (27) 1996 (38) 1997 (59) 1998 (89) 1999 (106) 2000 (150) 2001 (198) 2002 (308) 2003 (427) 2004 (622) 2005 (935) 2006 (1052) 2007 (1092) 2008 (1214) 2009 (940) 2010 (445) 2011 (529) 2012 (502) 2013 (529) 2014 (687) 2015 (718) 2016 (756) 2017 (964) 2018 (1272) 2019 (1607) 2020 (1779) 2021 (2136) 2022 (2366) 2023 (2631) 2024 (644)
Publication types (Num. hits)
article(10248) book(12) data(26) incollection(215) inproceedings(14469) phdthesis(107) proceedings(3)
Venues (Conferences, Journals, ...)
CoRR(2518) IACR Cryptol. ePrint Arch.(797) IEEE Access(430) IEEE Trans. Inf. Forensics Sec...(193) FSE(178) Comput. Secur.(177) CRYPTO(176) EUROCRYPT(172) CCS(152) Sensors(140) ICC(138) Secur. Commun. Networks(133) ACISP(115) GLOBECOM(114) ARES(113) CHES(113) More (+10 of total 3434)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8634 occurrences of 2564 keywords

Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Jae-Chul Park, Bong-Nam Noh SQL Injection Attack Detection: Profiling of Web Application Parameter Using the Sequence Pairwise Alignment. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Web Application Parameter, Web Application Security, SQL Injection Attack, Pairwise Sequence Alignment
19Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Vicious Attack, Early Warining, Routing Information, Intrusion Detection System
19Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF message authentication scheme, cryptography, cryptanalysis, cellular automata, chosen message attack
19Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen Threshold Signature Scheme Resistible for Conspiracy Attack. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF conspiracy attack and group signature, threshold cryptography, Threshold signature
19Klaus Rothbart, Ulrich Neffe, Christian Steger, Reinhold Weiss, Edgar Rieger, Andreas Mühlberger Power consumption profile analysis for security attack simulation in smart cards at high abstraction level. Search on Bibsonomy EMSOFT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF simulation, analysis, smart card, fault injection, attack, SystemC, embedded security, power profile
19Jong Hoon Shin, Dong Jin Park, Pil Joong Lee DPA Attack on the Improved Ha-Moon Algorithm. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Ha-Moon algorithm, randomized exponentiation algorithm, side-channel attack
19Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields The predecessor attack: An analysis of a threat to anonymous communications systems. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF predecessor attack, Privacy, anonymity, anonymous communication
19Yang Yu, Tzi-cker Chiueh Display-only file server: a solution against information theft due to insider attack. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2004 DBLP  DOI  BibTeX  RDF information theft, access, digital rights management, insider attack
19Werner Schindler, Colin D. Walter More Detail for a Combined Timing and Power Attack against Implementations of RSA. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistical decision problem, power analysis, exponentiation, timing attack, RSA cryptosystem, side channel leakage, Montgomery modular multiplication
19Peng Ning, Yun Cui, Douglas S. Reeves Constructing attack scenarios through correlation of intrusion alerts. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF intrusion detection, alert correlation, attack scenarios
19Selçuk Kavut, Melek D. Yücel Slide Attack on Spectr-H64. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Avalanche Weight Distribution (AWD), Slide attack, Spectr-H64
19Katsuyuki Okeya, Kouichi Sakurai Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Montgomery-form, Scalar Multiplication Algorithm, Elliptic Curve Cryptosystem, Power Analysis, Timing Attack, Efficient Implementation
19Kenneth J. Arrow Team Theory and Distributed Processing: Surprise Attack. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 1999 DBLP  DOI  BibTeX  RDF On team theory, surprise attack paradox, distributed processing
18Marc Dacier, Van-Hau Pham, Olivier Thonnard The WOMBAT Attack Attribution Method: Some Results. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta Bit-Free Collision: Application to APOP Attack. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF bit-free collision, APOP, hash function, MD5, MD4
18Chen Chen 0112, Xin Wang 0002, Weili Han, Binyu Zang A Robust Detection of the Sybil Attack in Urban VANETs. Search on Bibsonomy ICDCS Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda On the Comparison of Network Attack Datasets: An Empirical Analysis. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Hung-Min Sun, King-Hang Wang Defending Secret-Key Based Authentication Protocols against the Stolen-Secret Attack. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Aleksandar Kircanski, Amr M. Youssef A Related-Key Attack on TREYFER. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Sarosh Hashmi, John Brooke Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Qutaibah Althebyan, Brajendra Panda A Knowledge-Based Bayesian Model for Analyzing a System after an Insider Attack. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Melissa Danforth Scalable Patch Management Using Evolutionary Analysis of Attack Graphs. Search on Bibsonomy ICMLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Bosheng Zhou, Alan Marshall 0001, Wenzhe Zhou, Kun Yang A Random Packet Destruction DoS Attack for Wireless Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Seung-Hee Oh, Deok-Gyu Lee, Jong Wook Han The Mechanism and Requirements for Detecting the Cross-Service Attack. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Marek Klonowski, Miroslaw Kutylowski, Anna Lauks Repelling Detour Attack Against Onions with Re-encryption. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Wentao Zhao, Jianping Yin, Jun Long A Prediction Model of DoS Attack's Distribution Discrete Probability. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Mike Phillips, Manuela M. Veloso Robust Supporting Role in Coordinated Two-Robot Soccer Attack. Search on Bibsonomy RoboCup The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Orr Dunkelman, Nathan Keller A New Attack on the LEX Stream Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream cipher design, AES, LEX
18Lingyu Wang 0001, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia An Attack Graph-Based Probabilistic Security Metric. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Hans Georg Schaathun A key-recovery attack on authentication watermarking by li and yuan. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF watermarking, image authentication, mac
18Jintai Ding, Dieter Schmidt, Fabian Werner Algebraic Attack on HFE Revisited. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Gröbner basis, multivariate public key cryptosystem, HFE
18Gaeil An, Kiyoung Kim Real-Time IP Checking and Packet Marking for Preventing ND-DoS Attack Employing Fake Source IP in IPv6 LAN. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Sunghyun Kim, Heejo Lee Reducing Payload Scans for Attack Signature Matching Using Rule Classification. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Ju Wang 0001, Jonathan C. L. Liu Video Authentication against Correlation Analysis Attack in Wireless Network. Search on Bibsonomy ISM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Wei He, Chunhe Xia, Haiquan Wang, Cheng Zhang, Yi Ji A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. Search on Bibsonomy CSSE (6) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18He Wei, Chunhe Xia, Haiquan Wang, Zhang Cheng, Ji Yi A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Xin-jie Zhao 0001, Tao Wang 0008, Dong Mi, Yuanyuan Zheng, Zhaoyang Lun Robust First Two Rounds Access Driven Cache Timing Attack on AES. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Ashish Dhane, Sanjeev Kumar Sharma Modeling and analysis of Sequence Number Attack and its detection in AODV. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Kamil Reddy, H. S. Venter, Martin S. Olivier, Iain Currie Towards Privacy Taxonomy-Based Attack Tree Analysis for the Protection of Consumer Information Privacy. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Timo Gendrullis, Martin Novotný, Andy Rupp A Real-World Attack Breaking A5/1 within Hours. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF A5/1, COPACOBANA, GSM, special-purpose hardware
18Marc P. C. Fossorier, Kazukuni Kobara, Hideki Imai Modeling Bit Flipping Decoding Based on Nonorthogonal Check Sums With Application to Iterative Decoding Attack of McEliece Cryptosystem. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Darko Kirovski, Fabien A. P. Petitcolas, Zeph Landau The Replacement Attack. Search on Bibsonomy IEEE Trans. Speech Audio Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Virginia N. L. Franqueira, Raul H. C. Lopes Vulnerability Assessment by Learning Attack Specifications in Graphs. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network Security, DoS, Intrusion Prevention
18Xin Jiang, Jintai Ding, Lei Hu Kipnis-Shamir Attack on HFE Revisited. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MinRank, relinearization, Gröbner basis, multivariate public key cryptosystem, XL algorithm, HFE
18Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama Analysis on Bleichenbacher's Forgery Attack. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Jens Rüdinger, Adolf Finger Algorithm Design and Side Channel Vulnerability on the Example of DPA Attack. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Sandhya Khurana, Neelima Gupta, Nagender Aneja Minimum Exposed Path to the Attack (MEPA) in Mobile Ad Hoc Network (MANET). Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem
18Yufeng Wang 0001, Yoshiaki Hori, Kouichi Sakurai An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18George Danezis, Claudia Díaz, Carmela Troncoso Two-Sided Statistical Disclosure Attack. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Kenneth S. Edge, Richard A. Raines, Michael R. Grimaila, Rusty O. Baldwin, Robert W. Bennington, Christopher E. Reuter The Use of Attack and Protection Trees to Analyze Security for an Online Banking System. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Hongxia Jin, Jeffery Lotspiech Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anti-piracy, broadcast encryption, traitor tracing, Content protection
18Keisuke Takemori, Yutaka Miyake, Chie Ishida, Iwao Sasase A SOC Framework for ISP Federation and Attack Forecast by Learning Propagation Patterns. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Ellen Jochemsz, Alexander May 0001 A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT
18Andrey Bogdanov, Thomas Eisenbarth 0001, Andy Rupp A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF A5/2, SMITH, cryptanalysis, GSM, Gaussian elimination, special-purpose hardware, linear systems of equations
18Fumiaki Sato Estimation of Trustworthiness for P2P System in Collusive Attack. Search on Bibsonomy CISIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Alfred Menezes, Edlyn Teske Cryptographic implications of Hess' generalized GHS attack. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (1991) 94A60
18Yongdong Wu Nonlinear collusion attack on a watermarking scheme for buyer authentication. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Ashish Arora, Anand Nandkumar, Rahul Telang Does information security attack frequency increase with vulnerability disclosure? An empirical analysis. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disclosure policy, Risk management, Economics, Patching, Software vulnerability
18Vasileios Karyotis, Symeon Papavassiliou, Mary Grammatikou, Basil S. Maglaris On the Characterization and Evaluation of Mobile Attack Strategies in Wireless Ad Hoc Networks. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Byung Ryong Kim, Ki-Chang Kim Improved Technique of IP Address Fragmentation Strategies for DoS Attack Traceback. Search on Bibsonomy CSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Low Rate DoS Attack to Monoprocess Servers. Search on Bibsonomy SPC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Ellen Jochemsz, Benne de Weger A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF partial key exposure, inhomogeneous diophantine approximation, cryptanalysis, RSA, lattice basis reduction
18Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng Key Replacement Attack Against a Generic Construction of Certificateless Signature. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Luca Breveglieri, Israel Koren, Paolo Maistri A Fault Attack Against the FOX Cipher Family. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Jiejun Kong, Xiaoyan Hong, Mario Gerla Modeling Ad-hoc rushing attack in a negligibility-based security framework. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF asymptotic invariant, neg-ligibility, randomized network algorithms, randomized turing machine, sub-polynomial, scalability
18Jakob Eriksson, Srikanth V. Krishnamurthy, Michalis Faloutsos TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Dongeun Lee 0002, Taekyung Kim, Seongwon Lee 0001, Joon Ki Paik A Robust Watermarking Algorithm Using Attack Pattern Analysis. Search on Bibsonomy ACIVS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Xiaojian Tian, Duncan S. Wong Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MT-authenticator, BCK-model, CK-model, Verifiable Encryption
18Zhichun Li, Manan Sanghi, Yan Chen 0004, Ming-Yang Kao, Brian Chavez Hamsa: Fast Signature Generation for Zero-day PolymorphicWorms with Provable Attack Resilience. Search on Bibsonomy S&P The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Mathematical Foundations for the Design of a Low-Rate DoS Attack to Iterative Servers (Short Paper). Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18 Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks. Search on Bibsonomy PDCAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç Improving Brumley and Boneh timing attack on unprotected SSL implementations. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA, timing attacks, side-channel cryptanalysis
18Jerzy Konorski Solvability of a Markovian Model of an IEEE 802.11 LAN under a Backoff Attack. Search on Bibsonomy MASCOTS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Pino Caballero-Gil, Amparo Fúster-Sabater Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers. Search on Bibsonomy EUROCAST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Indrajit Ray, Nayot Poolsapassit Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Hongbo Yu, Gaoli Wang, Guoyan Zhang, Xiaoyun Wang 0001 The Second-Preimage Attack on MD4. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF collision differential path, weak message, Hash function, second-preimage
18Steve Webb, Subramanyam Chitti, Calton Pu An experimental evaluation of spam filter performance and robustness against attack. Search on Bibsonomy CollaborateCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Linru Ma, Lin Yang, Jianxin Wang Attack Scenario Construction Based on Rule and Fuzzy Clustering. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Xiangyang Wang 0001, Hong Zhao A Blind Audio Watermarking Algorithm Robust Against Synchronization Attack. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Hyunsang Choi, Heejo Lee PCAV: Internet Attack Visualization on Parallel Coordinates. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Xinli Huang, Yin Li, Ruijun Yang, Fanyuan Ma Enhancing Attack Survivability of Gnutella-like P2P Networks by Targeted Immunization Scheme. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Nong Ye, Yebin Zhang, Connie M. Borror Robustness of the Markov-chain model for cyber-attack detection. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Simon D. Byers, Aviel D. Rubin, David P. Kormann Defending against an Internet-based attack on the physical world. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Internet threats, automated attacks, cybercrime
18Wenling Wu, Dengguo Feng, Hua Chen 0011 Collision Attack and Pseudorandomness of Reduced-Round Camellia. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Block cipher, Time complexity, Pseudorandomness, Data complexity, Camellia
18Jang-Se Lee, Jung-Rae Jung, Jong Sou Park, Sung-Do Chi Linux-Based System Modelling for Cyber-attack Simulation. Search on Bibsonomy AIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Jin-Ho Hwang, Ju-Dong Shin, Mi-Ra Yun, Jeong-Nyeo Kim, Sang-Su Lee, Sung Un Kim Fault/Attack Tolerant Recovery Mechanism Under SRLG Constraint in the Next Generation Optical VPN. Search on Bibsonomy ECUMN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Oleksiy J. Koval, Sviatoslav Voloshynovskiy, Fernando Pérez-González, Frédéric Deguillaume, Thierry Pun Quantization-based watermarking performance improvement using host statistics: AWGN attack case. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF known-host-state watermarking, data hiding
18Jian Li, Guoyin Zhang, Guo-Chang Gu Research and experiments of network attack defence system. Search on Bibsonomy SMC (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Michael Meier 0001 A Model for the Semantics of Attack Signatures in Misuse Detection Systems. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Byeong-Hee Roh, Seung W. Yoo A Novel Detection Methodology of Network Attack Symptoms at Aggregate Traffic Level on Highspeed Internet Backbone Links. Search on Bibsonomy ICT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Ram Dantu, Kall Loper, Prakash Kolan Risk Management using Behavior based Attack Graphs. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Artemios G. Voyiatzis, Dimitrios N. Serpanos A Fault-Injection Attack on Fiat-Shamir Cryptosystems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Chin-Chen Chang 0001, Ya-Fen Chang Yet Another Attack on a QR-based Password Authentication System. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF password authentication, QR, quadratic residues
18Ludger Hemme A Differential Fault Attack Against Early Rounds of (Triple-)DES. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
18Willi Geiselmann, Willi Meier, Rainer Steinwandt An attack on the isomorphisms of polynomials problem with one secret. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, Public key cryptography, Multivariate polynomials
18Ki Hyun Kim, Yong Man Ro Enhancement Methods of Image Quality in Screen Mark Attack. Search on Bibsonomy IWDW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Florian Hess The GHS Attack Revisited. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Attack on 30-Round SHACAL-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 25080 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license