The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for viruses with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-1989 (30) 1990-1992 (17) 1993-1994 (15) 1995-1997 (25) 1998-2001 (31) 2002 (22) 2003 (36) 2004 (69) 2005 (77) 2006 (94) 2007 (79) 2008 (64) 2009 (50) 2010 (23) 2011 (15) 2012 (21) 2013-2014 (32) 2015-2016 (24) 2017 (21) 2018 (27) 2019 (22) 2020 (35) 2021 (40) 2022 (33) 2023 (24) 2024 (2)
Publication types (Num. hits)
article(397) book(6) incollection(11) inproceedings(503) phdthesis(11)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 637 occurrences of 418 keywords

Results
Found 928 publication records. Showing 928 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Alexander J. DeWitt, Jasna Kuljis Aligning usability and security: a usability study of Polaris. Search on Bibsonomy SOUPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF HCI-SEC, Polaris, usable security
10Thomas Moscibroda, Stefan Schmid 0001, Roger Wattenhofer When selfish meets evil: byzantine players in a virus inoculation game. Search on Bibsonomy PODC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF byzantine nash equilibria, price of malice, virus propagation, game theory, price of anarchy, selfishness
10Yan Gao 0003, Zhichun Li, Yan Chen 0004 A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Feng Shi, Qiujian Chen Prediction of MHC Class I Binding Peptides Using Fourier Analysis and Support Vector Machine. Search on Bibsonomy FSKD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Wenqing Zhao, Yongli Zhu Classifying Email Using Variable Precision Rough Set Approach. Search on Bibsonomy RSKT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF junk mail, classification, rough set, Spam, information filtering
10Seung-Jae Yoo, Kuinam J. Kim Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Hangbae Chang, Kyung-kyu Kim, Hosin David Lee, Jungduk Kim The Design and Development of a Secure Keystroke System for u Business. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Marina Gelastou, Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis The Power of the Defender. Search on Bibsonomy ICDCS Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Akira Mori, Tomonori Izumida, Toshimi Sawada, Tadashi Inoue A tool for analyzing and detecting malicious mobile code. Search on Bibsonomy ICSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF OS execution emulation, code simulation, static code analysis, malicious code detection
10Roger Karrer EC: an edge-based architecture against DDoS attacks and malware spread. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im A New Methodology of Analyzing Security Vulnerability for Network Services. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Ana L. Milanova, Sonia Fahmy, David R. Musser, Bülent Yener A Secure Programming Paradigm for Network Virtualization. Search on Bibsonomy BROADNETS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Chonho Lee, Junichi Suzuki Biologically-Inspired Design of Autonomous and Adaptive Grid Services. Search on Bibsonomy ICAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10James F. Ryan, Blair L. Reid Usable Encryption Enabled by AJAX. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Madihah Saudi, Nazean Jomhari Knowledge Structure on Virus for User Education. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF user education, mechanism trigger, operating algorithm, virus type, propagation, virus, severity, symptom, payload
10Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia Normalizing Metamorphic Malware Using Term Rewriting. Search on Bibsonomy SCAM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jedidiah R. Crandall, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong Temporal search: detecting hidden malware timebombs with virtual machines. Search on Bibsonomy ASPLOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virtual machines, malware, worms
10Rainer Böhme, Gaurav Kataria On the Limits of Cyber-Insurance. Search on Bibsonomy TrustBus The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Frank H. Katz Campus-wide spyware and virus removal as a method of teaching information security. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF information security awareness programs, design, information security, information security education
10Jingbo Hao, Jianping Yin, Boyun Zhang Evolvable Viral Agent Modeling and Exploration. Search on Bibsonomy ICONIP (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Viral Agent, Persistent Turing Machine, Evolution
10Marc L. Corliss, E. Christopher Lewis, Amir Roth Using DISE to protect return addresses from attack. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Jayashree Ravi, Weisong Shi, Cheng-Zhong Xu 0001 Personalized Email Management at Network Edges. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic Web content caching, Web-based email filtering and management, network edges, prefetching
10Eli M. Noam Why the Internet is bad for democracy. Search on Bibsonomy Commun. ACM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis Network Game with Attacker and Protector Entities. Search on Bibsonomy ISAAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Marsha Chechik, Arie Gurfinkel Model-Checking Software Using Precise Abstractions. Search on Bibsonomy VSTTE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10David Burstein, Igor Ulitsky, Tamir Tuller, Benny Chor Information Theoretic Approaches to Whole Genome Phylogenies. Search on Bibsonomy RECOMB The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Phylogenomics, whole genome and proteom phylogenetic, tree reconstruction, Kullback-Leibler relative entropy, divergence, distance matrix
10Peter J. Bentley, Gordana Novakovic, Anthony Ruto Fugue: An Interactive Immersive Audiovisualisation and Artwork Using an Artificial Immune System. Search on Bibsonomy ICARIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Michael Attig, John W. Lockwood A framework for rule processing in reconfigurable network systems (abstract only). Search on Bibsonomy FPGA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Xin Wang 0002, Ji Zheng, Kun Xiao, Xiangyang Xue, Chai-Keong Toh A Mobile Agent-based P2P Model for Autonomous Security Hole Discovery. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Xin Xu, Weihua Song, Vir V. Phoha Early detection and propagation mitigation of worm programs. Search on Bibsonomy ACM Southeast Regional Conference (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Yvo Desmedt Understanding Why Some Network Protocols Are User-Unfriendly. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis A Graph-Theoretic Network Security Game. Search on Bibsonomy WINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Jerry Ringel, Andrea L. Mox, Jason Musselman Desktop management: reeling in the great white whale. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF LANDesk, SUS, centralized management, windows, active directory, desktop support, desktop computing
10Joseph M. Murphy The water is wide: network security at Kenyon College, 1995-2005. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF student computing, resNet, antivirus
10Brien G. Muller, Mark A. Bauer Is your resNet support boat sinking?: try outsourcing! Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF outsource, support, students, resNet
10Michael Vedders, Paul Boyum Helping students help themselves: malware removal. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF malware, worms, virus, spyware, kiosk, black hole, VLAN
10Amir Herzberg Securing the Net: Challenges, Failures and Directions. Search on Bibsonomy DISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Erol Gelenbe, Michael Gellman, George Loukas An Autonomic Approach to Denial of Service Defence. Search on Bibsonomy WOWMOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Teck Sung Yap, Hong Tat Ewe A Mobile Phone Malicious Software Detection Model with Behavior Checker. Search on Bibsonomy Human.Society@Internet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Michael Attig, John W. Lockwood A Framework for Rule Processing in Reconfigurable Network Systems. Search on Bibsonomy FCCM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Ji Zheng, Xin Wang 0002, Xiangyang Xue, Chai-Keong Toh A Mobile Agent-Based P2P Autonomous Security Hole Discovery System. Search on Bibsonomy ICNC (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Dadi Ármannsson, Gísli Hjálmtýsson, Paul D. Smith, Laurent Mathy Controlling the effects of anomalous ARP behaviour on ethernet networks. Search on Bibsonomy CoNEXT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF address resolution protocol, ethernet performance, rate limiting
10Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage Scalability, fidelity, and containment in the potemkin virtual honeyfarm. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write
10Ayalvadi J. Ganesh, Laurent Massoulié, Donald F. Towsley The effect of network topology on the spread of epidemics. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre K. Mulligan, Joseph A. Konstan Stopping spyware at the gate: a user study of privacy, notice and spyware. Search on Bibsonomy SOUPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF EULA, ToS, end user license agreement, notice, security and usability, terms of service, privacy, spyware
10Hui Shang, Gabriel A. Wainer A Model of Virus Spreading Using Cell-DEVS. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Yanga Byun, Sanghoon Moon, Kyungsook Han Prediction of Ribosomal Frameshift Signals of User-Defined Models. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo An Email Worm Vaccine Architecture. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Boyun Zhang, Jianping Yin, Jingbo Hao Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. Search on Bibsonomy FSKD (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Heather J. Ruskin, John Burns 0001 Network Emergence in Immune System Shape Space. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Seung-Jae Yoo Core Technology Analysis and Development for the Virus and Hacking Prevention. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Mohamed G. Gouda Zmail: Zero-Sum Free Market Control of Spam. Search on Bibsonomy ICDCS Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Roberto Aringhieri Assessing Efficiency of Trust Management in Peer-to-Peer Systems. Search on Bibsonomy WETICE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Jiangchun Ren, Kui Dai, Zhiying Wang 0003 Trust-Enhanced Alteration Scenario for Universal Computer. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo A Multi-Faceted Approach towards Spam-Resistible Mail. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anti-spam, unsolicited bulk e-mail (UBE), e-mail dependability, Spam, denial of service attacks
10Antti Tikkanen, Teemupekka Virtanen Early Warning for Network Worms. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Jeanna Neefe Matthews Hands-on approach to teaching computer networking using packet traces. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF network protocol analysis
10Chonho Lee, Paskorn Champrasert, Junichi Suzuki A Biologically-inspired Adaptation Mechanism for Autonomic Grid Networks. Search on Bibsonomy CLUSTER The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Kanghee Lee, Zhefan Jiang, Sangok Kim, Sangwook Kim, Sunkyung Kim Access Control List Mediation System for Large-Scale Network. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Xingchun Chen, Ron Roeber Monitoring soybean disease and insect infection patterns in Nebraska. Search on Bibsonomy GrC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Yu-Chi Ho, David L. Pepyne, Qianchuan Zhao, Hong Liu 0019, Qin Yu, Brent Dukes ProgramID. Search on Bibsonomy Discret. Event Dyn. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Peder Jungck, Simon S. Y. Shim Issues in High-Speed Internet Security. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Thomas M. Chen, Jean-Marc Robert 0001 Worm Epidemics in High-Speed Networks. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Brian Whitworth, Elizabeth Whitworth Spam and the Social-Technical Gap. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Avishai Wool A Quantitative Study of Firewall Configuration Errors. Search on Bibsonomy Computer The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Jeffery E. Payne Regulation and Information Security: Can Y2K Lessons Help Us? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Sarbannes Oxley, software regulation, Y2K lessons, software security
10Ashton Applewhite, Alan Davis In the News. Search on Bibsonomy IEEE Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Stephen Lau The Spinning Cube of Potential Doom. Search on Bibsonomy Commun. ACM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Ka-Ping Yee Secure Interaction Design. Search on Bibsonomy Financial Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Dynamic Coalitions, Communities, Peer-to-Peer, Trust
10Andrew Fire RNAi, genome ultrastructure, and other unexpected tales from the analysis of genetic silencing. Search on Bibsonomy RECOMB The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Arun Lakhotia, Moinuddin Mohammed Imposing Order on Program Statements to Assist Anti-Virus Scanners. Search on Bibsonomy WCRE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Alan R. Peslak Improving software quality: an ethics based approach. Search on Bibsonomy CPR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF business ethics, code of conduct, software ethics, software quality, code of ethics
10Kim Todd, Jon Rickman, Tabatha Verbick Implementing a network improvement action plan. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF communication, network management, customer service, network stability
10Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan N-Gram-Based Detection of New Malicious Code. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Robert S. Gray Mobile Agents: Overcoming Early Hype and a Bad Name. Search on Bibsonomy Mobile Data Management The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Andrew H. Sung, Srinivas Mukkamala The Feature Selection and Intrusion Detection Problems. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Patricia Buendia, Giri Narasimhan MinPD: Distance-Based Phylogenetic Analysis and Recombination Detection of Serially-Sampled HIV Quasispecies. Search on Bibsonomy CSB The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum Symmetric Key Authentication Services Revisited. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Sanghoon Moon, Yanga Byun, Kyungsook Han Computational Identification of -1 Frameshift Signals. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Mihai Christodorescu, Somesh Jha Testing malware detectors. Search on Bibsonomy ISSTA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF malware, obfuscation, adaptive testing, anti-virus
10A. Murat Fiskiran, Ruby B. Lee Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. Search on Bibsonomy ICCD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Yu Fang, Randy H. Katz, T. V. Lakshman Gigabit Rate Packet Pattern-Matching Using TCAM. Search on Bibsonomy ICNP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya, Partha Khot, Sumit Manocha, Saumitra Ganguly Functionality Defense by Heterogeneity: A new paradigm for Securing Systems. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Masaki Aida, Keisuke Ishibashi, Hiroyoshi Miwa, Chisa Takano Structures of Human Relations and User-Dynamics Revealed by Traffic Data. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla SWATT: SoftWare-based ATTestation for Embedded Devices. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Vivek Singh, Yongchang Ji, Dan C. Marinescu A Parallel Algorithm for Automatic Particle Identification in Electron Micrographs. Search on Bibsonomy VECPAR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Marius-Calin Silaghi Meeting Scheduling Guaranteeing n/2-Privacy and Resistant to Statistical Analysis (Applicable to any DisCSP). Search on Bibsonomy Web Intelligence The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Gordon W. Romney, Brady R. Stevenson An isolated, multi-platform network sandbox for teaching IT security system engineers. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF collaborative student teaching, security best practices, security laboratory, security system engineer, information technology, information assurance, data privacy, curricula
10Sandra Ring, David Esler, Eric Cole Self-healing mechanisms for kernel system compromises. Search on Bibsonomy WOSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF fault tolerance, operating systems, kernel, self-healing systems
10Jacob W. Kallman, Pedrum Minaie, Jason Truppi, Sergiu Dascalu, Frederick C. Harris Jr. Software Modeling for Open Distributed Network Monitoring Systems. Search on Bibsonomy SAPIR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala Static Analyzer of Vicious Executables (SAVE). Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
10Wu-chang Feng The case for TCP/IP puzzles. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati Managing and Sharing Servents' Reputations in P2P Systems. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF polling protocol, reputation, credibility, P2P network
10Claus O. Wilke Does the Red Queen Reign in the Kingdom of Digital Organisms? Search on Bibsonomy ECAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
10Stuart E. Schechter, Michael D. Smith 0001 Access for sale: a new class of worm. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF security, cryptography, economics, incentives, worm, virus, threat modelling
10Linda Briesemeister, Patrick Lincoln, Phillip A. Porras Epidemic profiles and defense of scale-free networks. Search on Bibsonomy WORM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF computer epidemics, self-propagating malicious code, scale-free networks
10Richard L. Rollason-Reese Incident handling: an orderly response to unexpected events. Search on Bibsonomy SIGUCCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF incident handling, response team, attack, recovery, emergency, incident response
Displaying result #801 - #900 of 928 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license