|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 637 occurrences of 418 keywords
|
|
|
Results
Found 928 publication records. Showing 928 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
10 | Alexander J. DeWitt, Jasna Kuljis |
Aligning usability and security: a usability study of Polaris. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
HCI-SEC, Polaris, usable security |
10 | Thomas Moscibroda, Stefan Schmid 0001, Roger Wattenhofer |
When selfish meets evil: byzantine players in a virus inoculation game. |
PODC |
2006 |
DBLP DOI BibTeX RDF |
byzantine nash equilibria, price of malice, virus propagation, game theory, price of anarchy, selfishness |
10 | Yan Gao 0003, Zhichun Li, Yan Chen 0004 |
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. |
ICDCS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Feng Shi, Qiujian Chen |
Prediction of MHC Class I Binding Peptides Using Fourier Analysis and Support Vector Machine. |
FSKD |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Wenqing Zhao, Yongli Zhu |
Classifying Email Using Variable Precision Rough Set Approach. |
RSKT |
2006 |
DBLP DOI BibTeX RDF |
junk mail, classification, rough set, Spam, information filtering |
10 | Seung-Jae Yoo, Kuinam J. Kim |
Detection Methods for Executive Compressed Malicious Codes in Wire/Wireless Networks. |
ICCSA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Hangbae Chang, Kyung-kyu Kim, Hosin David Lee, Jungduk Kim |
The Design and Development of a Secure Keystroke System for u Business. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Marina Gelastou, Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
The Power of the Defender. |
ICDCS Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Akira Mori, Tomonori Izumida, Toshimi Sawada, Tadashi Inoue |
A tool for analyzing and detecting malicious mobile code. |
ICSE |
2006 |
DBLP DOI BibTeX RDF |
OS execution emulation, code simulation, static code analysis, malicious code detection |
10 | Roger Karrer |
EC: an edge-based architecture against DDoS attacks and malware spread. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Yong Ho Song, Jung Min Park, Yongsu Park, Eul-Gyu Im |
A New Methodology of Analyzing Security Vulnerability for Network Services. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Ana L. Milanova, Sonia Fahmy, David R. Musser, Bülent Yener |
A Secure Programming Paradigm for Network Virtualization. |
BROADNETS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Chonho Lee, Junichi Suzuki |
Biologically-Inspired Design of Autonomous and Adaptive Grid Services. |
ICAS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | James F. Ryan, Blair L. Reid |
Usable Encryption Enabled by AJAX. |
ICNS |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Madihah Saudi, Nazean Jomhari |
Knowledge Structure on Virus for User Education. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
user education, mechanism trigger, operating algorithm, virus type, propagation, virus, severity, symptom, payload |
10 | Andrew Walenstein, Rachit Mathur, Mohamed R. Chouchane, Arun Lakhotia |
Normalizing Metamorphic Malware Using Term Rewriting. |
SCAM |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian |
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Jedidiah R. Crandall, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
Temporal search: detecting hidden malware timebombs with virtual machines. |
ASPLOS |
2006 |
DBLP DOI BibTeX RDF |
virtual machines, malware, worms |
10 | Rainer Böhme, Gaurav Kataria |
On the Limits of Cyber-Insurance. |
TrustBus |
2006 |
DBLP DOI BibTeX RDF |
|
10 | Frank H. Katz |
Campus-wide spyware and virus removal as a method of teaching information security. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
information security awareness programs, design, information security, information security education |
10 | Jingbo Hao, Jianping Yin, Boyun Zhang |
Evolvable Viral Agent Modeling and Exploration. |
ICONIP (3) |
2006 |
DBLP DOI BibTeX RDF |
Viral Agent, Persistent Turing Machine, Evolution |
10 | Marc L. Corliss, E. Christopher Lewis, Amir Roth |
Using DISE to protect return addresses from attack. |
SIGARCH Comput. Archit. News |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jayashree Ravi, Weisong Shi, Cheng-Zhong Xu 0001 |
Personalized Email Management at Network Edges. |
IEEE Internet Comput. |
2005 |
DBLP DOI BibTeX RDF |
dynamic Web content caching, Web-based email filtering and management, network edges, prefetching |
10 | Eli M. Noam |
Why the Internet is bad for democracy. |
Commun. ACM |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
Network Game with Attacker and Protector Entities. |
ISAAC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Marsha Chechik, Arie Gurfinkel |
Model-Checking Software Using Precise Abstractions. |
VSTTE |
2005 |
DBLP DOI BibTeX RDF |
|
10 | David Burstein, Igor Ulitsky, Tamir Tuller, Benny Chor |
Information Theoretic Approaches to Whole Genome Phylogenies. |
RECOMB |
2005 |
DBLP DOI BibTeX RDF |
Phylogenomics, whole genome and proteom phylogenetic, tree reconstruction, Kullback-Leibler relative entropy, divergence, distance matrix |
10 | Peter J. Bentley, Gordana Novakovic, Anthony Ruto |
Fugue: An Interactive Immersive Audiovisualisation and Artwork Using an Artificial Immune System. |
ICARIS |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Michael Attig, John W. Lockwood |
A framework for rule processing in reconfigurable network systems (abstract only). |
FPGA |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Xin Wang 0002, Ji Zheng, Kun Xiao, Xiangyang Xue, Chai-Keong Toh |
A Mobile Agent-based P2P Model for Autonomous Security Hole Discovery. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Xin Xu, Weihua Song, Vir V. Phoha |
Early detection and propagation mitigation of worm programs. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Yvo Desmedt |
Understanding Why Some Network Protocols Are User-Unfriendly. |
Security Protocols Workshop |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
A Graph-Theoretic Network Security Game. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jerry Ringel, Andrea L. Mox, Jason Musselman |
Desktop management: reeling in the great white whale. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
LANDesk, SUS, centralized management, windows, active directory, desktop support, desktop computing |
10 | Joseph M. Murphy |
The water is wide: network security at Kenyon College, 1995-2005. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
student computing, resNet, antivirus |
10 | Brien G. Muller, Mark A. Bauer |
Is your resNet support boat sinking?: try outsourcing! |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
outsource, support, students, resNet |
10 | Michael Vedders, Paul Boyum |
Helping students help themselves: malware removal. |
SIGUCCS |
2005 |
DBLP DOI BibTeX RDF |
malware, worms, virus, spyware, kiosk, black hole, VLAN |
10 | Amir Herzberg |
Securing the Net: Challenges, Failures and Directions. |
DISC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Erol Gelenbe, Michael Gellman, George Loukas |
An Autonomic Approach to Denial of Service Defence. |
WOWMOM |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Teck Sung Yap, Hong Tat Ewe |
A Mobile Phone Malicious Software Detection Model with Behavior Checker. |
Human.Society@Internet |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Michael Attig, John W. Lockwood |
A Framework for Rule Processing in Reconfigurable Network Systems. |
FCCM |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Ji Zheng, Xin Wang 0002, Xiangyang Xue, Chai-Keong Toh |
A Mobile Agent-Based P2P Autonomous Security Hole Discovery System. |
ICNC (3) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Dadi Ármannsson, Gísli Hjálmtýsson, Paul D. Smith, Laurent Mathy |
Controlling the effects of anomalous ARP behaviour on ethernet networks. |
CoNEXT |
2005 |
DBLP DOI BibTeX RDF |
address resolution protocol, ethernet performance, rate limiting |
10 | Michael Vrable, Justin Ma, Jay Chen, David Moore 0001, Erik Vandekieft, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage |
Scalability, fidelity, and containment in the potemkin virtual honeyfarm. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
honeyfarm, malware, honeypot, virtual machine monitor, copy-on-write |
10 | Ayalvadi J. Ganesh, Laurent Massoulié, Donald F. Towsley |
The effect of network topology on the spread of epidemics. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Nathaniel Good, Rachna Dhamija, Jens Grossklags, David Thaw, Steven Aronowitz, Deirdre K. Mulligan, Joseph A. Konstan |
Stopping spyware at the gate: a user study of privacy, notice and spyware. |
SOUPS |
2005 |
DBLP DOI BibTeX RDF |
EULA, ToS, end user license agreement, notice, security and usability, terms of service, privacy, spyware |
10 | Hui Shang, Gabriel A. Wainer |
A Model of Virus Spreading Using Cell-DEVS. |
International Conference on Computational Science (2) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Yanga Byun, Sanghoon Moon, Kyungsook Han |
Prediction of Ribosomal Frameshift Signals of User-Defined Models. |
International Conference on Computational Science (1) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Stephan Riebach, Erwin P. Rathgeb, Birger Tödtmann |
Risk Assessment of Production Networks Using Honeynets - Some Practical Experience. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo |
An Email Worm Vaccine Architecture. |
ISPEC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Boyun Zhang, Jianping Yin, Jingbo Hao |
Using Fuzzy Pattern Recognition to Detect Unknown Malicious Executables Code. |
FSKD (1) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Heather J. Ruskin, John Burns 0001 |
Network Emergence in Immune System Shape Space. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Seung-Jae Yoo |
Core Technology Analysis and Development for the Virus and Hacking Prevention. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Benjamin Kuipers, Alex X. Liu, Aashin Gautam, Mohamed G. Gouda |
Zmail: Zero-Sum Free Market Control of Spam. |
ICDCS Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Roberto Aringhieri |
Assessing Efficiency of Trust Management in Peer-to-Peer Systems. |
WETICE |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jiangchun Ren, Kui Dai, Zhiying Wang 0003 |
Trust-Enhanced Alteration Scenario for Universal Computer. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo |
A Multi-Faceted Approach towards Spam-Resistible Mail. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
anti-spam, unsolicited bulk e-mail (UBE), e-mail dependability, Spam, denial of service attacks |
10 | Antti Tikkanen, Teemupekka Virtanen |
Early Warning for Network Worms. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Jeanna Neefe Matthews |
Hands-on approach to teaching computer networking using packet traces. |
SIGITE Conference |
2005 |
DBLP DOI BibTeX RDF |
network protocol analysis |
10 | Chonho Lee, Paskorn Champrasert, Junichi Suzuki |
A Biologically-inspired Adaptation Mechanism for Autonomic Grid Networks. |
CLUSTER |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Kanghee Lee, Zhefan Jiang, Sangok Kim, Sangwook Kim, Sunkyung Kim |
Access Control List Mediation System for Large-Scale Network. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Xingchun Chen, Ron Roeber |
Monitoring soybean disease and insect infection patterns in Nebraska. |
GrC |
2005 |
DBLP DOI BibTeX RDF |
|
10 | Yu-Chi Ho, David L. Pepyne, Qianchuan Zhao, Hong Liu 0019, Qin Yu, Brent Dukes |
ProgramID. |
Discret. Event Dyn. Syst. |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Peder Jungck, Simon S. Y. Shim |
Issues in High-Speed Internet Security. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Thomas M. Chen, Jean-Marc Robert 0001 |
Worm Epidemics in High-Speed Networks. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Brian Whitworth, Elizabeth Whitworth |
Spam and the Social-Technical Gap. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Avishai Wool |
A Quantitative Study of Firewall Configuration Errors. |
Computer |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Jeffery E. Payne |
Regulation and Information Security: Can Y2K Lessons Help Us? |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Sarbannes Oxley, software regulation, Y2K lessons, software security |
10 | Ashton Applewhite, Alan Davis |
In the News. |
IEEE Softw. |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Stephen Lau |
The Spinning Cube of Potential Doom. |
Commun. ACM |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Ka-Ping Yee |
Secure Interaction Design. |
Financial Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Mujtaba Khambatti, Partha Dasgupta, Kyung Dong Ryu |
A Role-Based Trust Model for Peer-to-Peer Communities and Dynamic Coalitions. |
IWIA |
2004 |
DBLP DOI BibTeX RDF |
Dynamic Coalitions, Communities, Peer-to-Peer, Trust |
10 | Andrew Fire |
RNAi, genome ultrastructure, and other unexpected tales from the analysis of genetic silencing. |
RECOMB |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Arun Lakhotia, Moinuddin Mohammed |
Imposing Order on Program Statements to Assist Anti-Virus Scanners. |
WCRE |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Alan R. Peslak |
Improving software quality: an ethics based approach. |
CPR |
2004 |
DBLP DOI BibTeX RDF |
business ethics, code of conduct, software ethics, software quality, code of ethics |
10 | Kim Todd, Jon Rickman, Tabatha Verbick |
Implementing a network improvement action plan. |
SIGUCCS |
2004 |
DBLP DOI BibTeX RDF |
communication, network management, customer service, network stability |
10 | Tony Abou-Assaleh, Nick Cercone, Vlado Keselj, Ray Sweidan |
N-Gram-Based Detection of New Malicious Code. |
COMPSAC Workshops |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Robert S. Gray |
Mobile Agents: Overcoming Early Hype and a Bad Name. |
Mobile Data Management |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Andrew H. Sung, Srinivas Mukkamala |
The Feature Selection and Intrusion Detection Problems. |
ASIAN |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Patricia Buendia, Giri Narasimhan |
MinPD: Distance-Based Phylogenetic Analysis and Recombination Detection of Serially-Sampled HIV Quasispecies. |
CSB |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum |
Symmetric Key Authentication Services Revisited. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Sanghoon Moon, Yanga Byun, Kyungsook Han |
Computational Identification of -1 Frameshift Signals. |
International Conference on Computational Science |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Mihai Christodorescu, Somesh Jha |
Testing malware detectors. |
ISSTA |
2004 |
DBLP DOI BibTeX RDF |
malware, obfuscation, adaptive testing, anti-virus |
10 | A. Murat Fiskiran, Ruby B. Lee |
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution. |
ICCD |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Yu Fang, Randy H. Katz, T. V. Lakshman |
Gigabit Rate Packet Pattern-Matching Using TCAM. |
ICNP |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya, Partha Khot, Sumit Manocha, Saumitra Ganguly |
Functionality Defense by Heterogeneity: A new paradigm for Securing Systems. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Masaki Aida, Keisuke Ishibashi, Hiroyoshi Miwa, Chisa Takano |
Structures of Human Relations and User-Dynamics Revealed by Traffic Data. |
ICOIN |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Arvind Seshadri, Adrian Perrig, Leendert van Doorn, Pradeep K. Khosla |
SWATT: SoftWare-based ATTestation for Embedded Devices. |
S&P |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Vivek Singh, Yongchang Ji, Dan C. Marinescu |
A Parallel Algorithm for Automatic Particle Identification in Electron Micrographs. |
VECPAR |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Marius-Calin Silaghi |
Meeting Scheduling Guaranteeing n/2-Privacy and Resistant to Statistical Analysis (Applicable to any DisCSP). |
Web Intelligence |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Gordon W. Romney, Brady R. Stevenson |
An isolated, multi-platform network sandbox for teaching IT security system engineers. |
SIGITE Conference |
2004 |
DBLP DOI BibTeX RDF |
collaborative student teaching, security best practices, security laboratory, security system engineer, information technology, information assurance, data privacy, curricula |
10 | Sandra Ring, David Esler, Eric Cole |
Self-healing mechanisms for kernel system compromises. |
WOSS |
2004 |
DBLP DOI BibTeX RDF |
fault tolerance, operating systems, kernel, self-healing systems |
10 | Jacob W. Kallman, Pedrum Minaie, Jason Truppi, Sergiu Dascalu, Frederick C. Harris Jr. |
Software Modeling for Open Distributed Network Monitoring Systems. |
SAPIR |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala |
Static Analyzer of Vicious Executables (SAVE). |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
10 | Wu-chang Feng |
The case for TCP/IP puzzles. |
Comput. Commun. Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |
Managing and Sharing Servents' Reputations in P2P Systems. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
polling protocol, reputation, credibility, P2P network |
10 | Claus O. Wilke |
Does the Red Queen Reign in the Kingdom of Digital Organisms? |
ECAL |
2003 |
DBLP DOI BibTeX RDF |
|
10 | Stuart E. Schechter, Michael D. Smith 0001 |
Access for sale: a new class of worm. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
security, cryptography, economics, incentives, worm, virus, threat modelling |
10 | Linda Briesemeister, Patrick Lincoln, Phillip A. Porras |
Epidemic profiles and defense of scale-free networks. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
computer epidemics, self-propagating malicious code, scale-free networks |
10 | Richard L. Rollason-Reese |
Incident handling: an orderly response to unexpected events. |
SIGUCCS |
2003 |
DBLP DOI BibTeX RDF |
incident handling, response team, attack, recovery, emergency, incident response |
Displaying result #801 - #900 of 928 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|