The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ACSAC"( http://dblp.L3S.de/Venues/ACSAC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aPcsac

Publication years (Num. hits)
1989 (62) 1990 (46) 1991 (25) 1992 (25) 1993 (29) 1994 (33) 1996 (29) 1997 (30) 1998 (36) 1999 (44) 2000 (43) 2001 (65) 2002 (42) 2003 (44) 2004 (42) 2005 (61) 2006 (45) 2007 (45) 2008 (99) 2009 (49) 2010 (43) 2011 (43) 2012 (47) 2013 (37) 2014 (49) 2015 (48) 2016 (49) 2017 (49) 2018 (61) 2019 (61) 2020 (71) 2021 (81) 2022 (74) 2023 (60)
Publication types (Num. hits)
inproceedings(1631) proceedings(36)
Venues (Conferences, Journals, ...)
ACSAC(1667)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 738 occurrences of 436 keywords

Results
Found 1667 publication records. Showing 1667 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Antonio Grillo, Alessandro Lentini, Gianluigi Me, Giuseppe F. Italiano Transaction Oriented Text Messaging with Trusted-SMS. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xunhua Wang, Philip D. Huff, Brett C. Tjaden Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Terrence O'Connor, Douglas S. Reeves Bluetooth Network-Based Misuse Detection. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mathias Kohler, Andreas Schaad ProActive Access Control for Business Process-Driven Environments. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Erdem Aktas, Kanad Ghose DARE: A Framework for Dynamic Authentication of Remote Executions. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer, Trevor Yann Permission Set Mining: Discovering Practical and Useful Roles. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sean O'Melia, Adam J. Elbirt Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Qi Guo, Jaideep Vaidya, Vijayalakshmi Atluri The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Paul F. Farrell Jr., Simson L. Garfinkel, Douglas White Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Evan Martin, JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu Assessing Quality of Policy Properties in Verification of Access Control Policies. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rattikorn Hewett, Phongphun Kijsanayothin Host-Centric Model Checking for Network Vulnerability Analysis. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Albert Tannous, Jonathan T. Trostle, Mohamed Hassan, Stephen E. McLaughlin, Trent Jaeger New Side Channels Targeted at Passwords. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Xiaole Bai, Wenjun Gu, Sriram Chellappan, Xun Wang, Dong Xuan, Bin Ma 0002 PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Roberto Capizzi, Antonio Longo, V. N. Venkatakrishnan, A. Prasad Sistla Preventing Information Leaks through Shadow Executions. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1O. Sami Saydjari Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yinqian Zhang, Xun Fan, Yijun Wang, Zhi Xue Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mansour Alsaleh, David Barrera 0003, Paul C. van Oorschot Improving Security Visualization with Exposure Map Filtering. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Saman Zarandioon, Danfeng Yao, Vinod Ganapathy OMOS: A Framework for Secure Communication in Mashup Applications. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Amirali Salehi-Abari, Julie Thorpe, Paul C. van Oorschot On Purely Automated Attacks and Click-Based Graphical Passwords. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Vanessa Frías-Martínez, Salvatore J. Stolfo, Angelos D. Keromytis Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Stephanie Forrest, Steven A. Hofmeyr, Anil Somayaji The Evolution of System-Call Monitoring. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Matthew Van Gundy, Hao Chen 0003, Zhendong Su 0001, Giovanni Vigna Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Asia Slowinska, Herbert Bos The Age of Data: Pinpointing Guilty Bytes in Polymorphic Buffer Overflows on Heap or Stack. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack analysis, honeypots, intrusion detection and prevention
1Chongkyung Kil, Emre Can Sezer, Peng Ning, Xiaolan Zhang 0001 Automated Security Debugging Using Program Structural Constraints. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Boniface Hicks, Tim Misiak, Patrick D. McDaniel Channels: Runtime System Infrastructure for Security-Typed Languages. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Luke St. Clair, Joshua Schiffman, Trent Jaeger, Patrick D. McDaniel Establishing and Sustaining System Integrity via Root of Trust Installation. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kevin S. Killourhy, Roy A. Maxion Toward Realistic and Artifact-Free Insider-Threat Data. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Deepak Chandra, Michael Franz Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Michael Meier 0001, Ulrich Flegel, Sebastian Schmerl Efficiency Issues of Rete-Based Expert Systems for Misuse Detection. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Manigandan Radhakrishnan, Jon A. Solworth Quarantining Untrusted Entities: Dynamic Sandboxing Using LEAP. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Phillip L. Hellewell, Kent E. Seamons Extensible Pre-authentication Kerberos. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Iulia Ion, Boris Dragovic, Bruno Crispo Extending the Java Virtual Machine to Enforce Fine-Grained Security Policies in Mobile Devices. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Meng Yu 0001, Wanyu Zang, Peng Liu 0005 Database Isolation and Filtering against Data Corruption Attacks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, Florida, USA Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  BibTeX  RDF
1Lorenzo Martignoni, Mihai Christodorescu, Somesh Jha OmniUnpack: Fast, Generic, and Safe Unpacking of Malware. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Paolina Centonze, Robert J. Flynn, Marco Pistoia Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Bryan D. Payne, Wenke Lee Secure and Flexible Monitoring of Virtual Machines. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Bo Zhu, Venkata Gopala Krishna Addada, Sanjeev Setia, Sushil Jajodia, Sankardas Roy Efficient Distributed Detection of Node Replication Attacks in Sensor Networks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Martin Szydlowski, Christopher Kruegel, Engin Kirda Secure Input for Web Applications. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1David Dagon, Guofei Gu, Christopher P. Lee 0001, Wenke Lee A Taxonomy of Botnet Structures. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sherri Sparks, Shawn Embleton, Ryan Cunningham, Cliff Changchun Zou Automated Vulnerability Analysis: Leveraging Control Flow for Evolutionary Input Crafting. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Daniel J. Weitzner Personal Privacy without Computational Obscurity: Rethinking Privacy Protection Strategies for Open Information Networks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Qinghua Zhang, Douglas S. Reeves MetaAware: Identifying Metamorphic Malware. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Ashish Gehani, Ulf Lindqvist Bonsai: Balanced Lineage Authentication. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jeff Yan, Ahmad Salah El Ahmad Breaking Visual CAPTCHAs with Naive Pattern Recognition Algorithms. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Duncan A. Grove, Toby C. Murray, Chris A. Owen, Chris J. North, J. A. Jones, Mark R. Beaumont, Bradley D. Hopkins An Overview of the Annex System. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Nathan S. Evans, Chris GauthierDickey, Christian Grothoff Routing in the Dark: Pitch Black. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Enriquillo Valdez, Reiner Sailer, Ronald Perez Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Baris Coskun, Nasir D. Memon Efficient Detection of Delay-Constrained Relay Nodes. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine, Timothy E. Levin Toward a Medium-Robustness Separation Kernel Protection Profile. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Nathalie Tsybulnik, Kevin W. Hamlen, Bhavani Thuraisingham Centralized Security Labels in Decentralized P2P Networks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Brian Rivera, Kelvin Marcus, Peter Kruus Countering False Accusations and Collusion in the Detection of In-Band Wormholes. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha K. Shashidhar, Andrew See, Alexander A. Shvartsman, Seda Davtyan Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Audun Jøsang, Bander AlFayyadh, Tyrone Grandison, Mohammed Al Zomai, Judith McNamara Security Usability Principles for Vulnerability Analysis and Risk Assessment. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Adam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis SSARES: Secure Searchable Automated Remote Email Storage. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Carlos Aguilar Melchor, Yves Deswarte, Julien Iguchi-Cartigny Closed-Circuit Unobservable Voice over IP. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mengjun Xie, Zhenyu Wu, Haining Wang HoneyIM: Fast Detection and Suppression of Instant Messaging Malware in Enterprise-Like Networks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yuji Kosuga, Kenji Kono, Miyuki Hanaoka, Miho Hishiyama, Yu Takahama Sania: Syntactic and Semantic Analysis for Automated Testing against SQL Injection. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1David Whyte, Paul C. van Oorschot, Evangelos Kranakis Tracking Darkports for Network Defense. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Wei Li 0020, Tzi-cker Chiueh Automated Format String Attack Prevention for Win32/X86 Binaries. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kevin Borders, Atul Prakash 0001, Mark Zielinski Spector: Automatically Analyzing Shell Code. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Richard A. Kemmerer So You Think You Can Dance? Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Christopher Kruegel, Davide Balzarotti, William K. Robertson, Giovanni Vigna Improving Signature Testing through Dynamic Data Flow Analysis. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Brian Randell, John M. Rushby Distributed Secure Systems: Then and Now. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo Kermes, Wayne Liu, Shahank Sahai, Zhenghui Zhu The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask). Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Andreas Moser, Christopher Kruegel, Engin Kirda Limits of Static Analysis for Malware Detection. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Brian Witten Engineering Sufficiently Secure Computing. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Collin Mulliner, Giovanni Vigna Vulnerability Analysis of MMS User Agents. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multimedia Messaging Service, Mobile devices, Mobile phones, Vulnerability Analysis, Fuzzing
1Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana Using Attribute-Based Access Control to Enable Attribute-Based Messaging. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ying Pan, Xuhua Ding Anomaly Based Web Phishing Page Detection. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shiping Chen 0003, Dongyu Liu, Songqing Chen, Sushil Jajodia V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jeffrey Horton, Reihaneh Safavi-Naini Detecting Policy Violations through Traffic Analysis. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jeremy Epstein Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu 0003, Peng Ning Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kyle Ingols, Richard Lippmann, Keith Piwowarski Practical Attack Graph Generation for Network Defense. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kun Sun 0001, Pai Peng, Peng Ning, Cliff Wang Secure Distributed Cluster Formation in Wireless Sensor Networks. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1David Whyte, Paul C. van Oorschot, Evangelos Kranakis Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Frédéric Massicotte, François Gagnon, Yvan Labiche, Lionel C. Briand, Mathieu Couture Automatic Evaluation of Intrusion Detection Systems. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan Data Sandboxing: A Technique for Enforcing Confidentiality Policies. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna Static Detection of Vulnerabilities in x86 Executables. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF binary static analysis, symbolic execution, Vulnerability analysis, taint analysis
1Yinglian Xie, Michael K. Reiter, David R. O'Hallaron Protecting Privacy in Key-Value Search Systems. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nigel Jacob, Carla E. Brodley Offloading IDS Computation to the GPU. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Lap-Chung Lam, Tzi-cker Chiueh A General Dynamic Information Flow Tracking Framework for Security Applications. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Lillian Røstad, Ole Edsberg A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Philip W. L. Fong, Simon A. Orr A Module System for Isolating Untrusted Software Extensions. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Guillaume Duc, Ronan Keryell CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen Extended Protection against Stack Smashing Attacks without Performance Loss. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh How to Automatically and Accurately Sandbox Microsoft IIS. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Rupinder Gill, Jason Smith 0001, Andrew J. Clark Specification-Based Intrusion Detection in WLANs. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer Shamon: A System for Distributed Mandatory Access Control. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Lixin Li, James E. Just, R. Sekar 0001 Address-Space Randomization for Windows Systems. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hao Wang, Somesh Jha, Vinod Ganapathy NetSpy: Automatic Generation of Spyware Signatures for NIDS. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Francis Hsu, Hao Chen 0003, Thomas Ristenpart, Jason Li 0003, Zhendong Su 0001 Back to the Future: A Framework for Automatic Malware Removal and System Repair. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhenghong Wang, Ruby B. Lee Covert and Side Channels Due to Processor Architecture. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yoav Weiss, Elena Gabriela Barrantes Known/Chosen Key Attacks against Software Instruction Set Randomization. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh Foreign Code Detection on the Windows/X86 Platform. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  BibTeX  RDF
1Randy Smith, Cristian Estan, Somesh Jha Backtracking Algorithmic Complexity Attacks against a NIDS. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 1667 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license