The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NDSS"( http://dblp.L3S.de/Venues/NDSS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/ndss

Publication years (Num. hits)
1995 (18) 1996 (18) 1997 (15) 1998 (22) 1999 (24) 2000 (16) 2001 (19) 2002 (16) 2003 (18) 2004 (17) 2005 (17) 2006 (18) 2007 (18) 2008 (22) 2009 (21) 2010 (25) 2011 (29) 2012 (55) 2013 (65) 2014 (56) 2015 (51) 2016 (62) 2017 (69) 2018 (72) 2019 (91) 2020 (90) 2021 (88) 2022 (84) 2023 (95)
Publication types (Num. hits)
inproceedings(1182) proceedings(29)
Venues (Conferences, Journals, ...)
NDSS(1211)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 1211 publication records. Showing 1211 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1David Dewey, Patrick Traynor No Loitering: Exploiting Lingering Vulnerabilities in Default COM Objects. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Leyla Bilge, Engin Kirda, Christopher Kruegel, Marco Balduzzi EXPOSURE: Finding Malicious Domains Using Passive DNS Analysis. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Xi Xiong, Donghai Tian, Peng Liu 0005 Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Roman Schlegel, Kehuan Zhang, Xiao-yong Zhou, Mehool Intwala, Apu Kapadia, XiaoFeng Wang 0001 Soundcomber: A Stealthy and Context-Aware Sound Trojan for Smartphones. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Asia Slowinska, Traian Stancescu, Herbert Bos Howard: A Dynamic Excavator for Reverse Engineering Data Structures. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Min Gyung Kang, Stephen McCamant, Pongsin Poosankam, Dawn Song DTA++: Dynamic Taint Analysis with Targeted Control-Flow Propagation. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Abhinav Srivastava, Jonathon T. Giffin Efficient Monitoring of Untrusted Kernel-Mode Execution. Search on Bibsonomy NDSS The full citation details ... 2011 DBLP  BibTeX  RDF
1Colin Whittaker, Brian Ryner, Marria Nazif Large-Scale Automatic Classification of Phishing Pages. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Edward J. Schwartz, David Brumley, Jonathan M. McCune Contractual Anonymity. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Sushant Sinha, Michael D. Bailey, Farnam Jahanian Improving Spam Blacklisting Through Dynamic Thresholding and Speculative Aggregation. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Suresh Chari, Shai Halevi, Wietse Z. Venema Where Do You Want to Go Today? Escalating Privileges by Pathname Manipulation. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Vincent Toubiana, Arvind Narayanan, Dan Boneh, Helen Nissenbaum, Solon Barocas Adnostic: Privacy Preserving Targeted Advertising. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Davide Balzarotti, Marco Cova, Christoph Karlberger, Engin Kirda, Christopher Kruegel, Giovanni Vigna Efficient Detection of Split Personalities in Malware. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Juan Caballero, Noah M. Johnson, Stephen McCamant, Dawn Song Binary Code Extraction and Interface Identification for Security Applications. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Adam Barth, Adrienne Porter Felt, Prateek Saxena, Aaron Boodman Protecting Browsers from Extension Vulnerabilities. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Micah Sherr, Andrew Mao, William R. Marczak, Wenchao Zhou, Boon Thau Loo, Matt Blaze A3: An Extensible Platform for Application-Aware Anonymity. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Andreas Pitsillidis, Kirill Levchenko, Christian Kreibich, Chris Kanich, Geoffrey M. Voelker, Vern Paxson, Nicholas Weaver, Stefan Savage Botnet Judo: Fighting Spam with Itself. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Zhiyun Qian, Zhuoqing Morley Mao, Yinglian Xie, Fang Yu 0002 On Network-level Clusters for Spam Detection. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Matthew Finifter, Joel Weinberger, Adam Barth Preventing Capability Leaks in Secure JavaScript Subsets. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Jiwon Seo 0002, Monica S. Lam InvisiType: Object-Oriented Security Policies. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Thomas Ristenpart, Scott Yilek When Good Randomness Goes Bad: Virtual Machine Reset Vulnerabilities and Hedging Deployed Cryptography. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Adrian Mettler, David A. Wagner 0001, Tyler Close Joe-E: A Security-Oriented Subset of Java. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Iasonas Polakis, Thanasis Petsas, Evangelos P. Markatos, Spyros Antonatos A Systematic Characterization of IM Threats using Honeypots. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Prateek Saxena, Steve Hanna, Pongsin Poosankam, Dawn Song FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Yudong Gao, Ni Pan, Xu Chen, Zhuoqing Morley Mao On the Safety of Enterprise Policy Deployment. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Zhiqiang Lin, Xiangyu Zhang 0001, Dongyan Xu Automatic Reverse Engineering of Data Structures from Binary Execution. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Darrell Bethea, Robert A. Cochran, Michael K. Reiter Server-side Verification of Client Behavior in Online Games. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Amir Herzberg, Haya Schulmann Stealth DoS Attacks on Secure Channels. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Scott Wolchok, Owen S. Hofmann, Nadia Heninger, Edward W. Felten, J. Alex Halderman, Christopher J. Rossbach, Brent Waters, Emmett Witchel Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1William K. Robertson, Federico Maggi, Christopher Kruegel, Giovanni Vigna Effective Anomaly Detection with Scarce Training Data. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Jason Bau, John C. Mitchell A Security Evaluation of DNSSEC with NSEC3. Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1 Proceedings of the Network and Distributed System Security Symposium, NDSS 2010, San Diego, California, USA, 28th February - 3rd March 2010 Search on Bibsonomy NDSS The full citation details ... 2010 DBLP  BibTeX  RDF
1Tielei Wang, Tao Wei, Zhiqiang Lin, Wei Zou IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Andrea Lanzi, Monirul Islam Sharif, Wenke Lee K-Tracer: A System for Extracting Kernel Malware Behavior. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Ulrich Bayer, Paolo Milani Comparetti, Clemens Hlauschek, Christopher Krügel, Engin Kirda Scalable, Behavior-Based Malware Clustering. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Hong Chen, Ninghui Li, Ziqing Mao Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Yingbo Song, Angelos D. Keromytis, Salvatore J. Stolfo Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Yacin Nadji, Prateek Saxena, Dawn Song Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Chris Karlof, J. Doug Tygar, David A. Wagner 0001 Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Michael Backes 0001, Peter Druschel, Andreas Haeberlen, Dominique Unruh CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Matthew Van Gundy, Hao Chen 0003 Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Charles V. Wright, Scott E. Coull, Fabian Monrose Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Jonathan M. McCune, Adrian Perrig, Michael K. Reiter Safe Passage for Passwords and Other Sensitive Data. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan Subramanian Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1George Danezis, Prateek Mittal SybilInfer: Detecting Sybil Nodes using Social Networks. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Carrie Gates Coordinated Scan Detection. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1R. Sekar 0001 An Efficient Black-box Technique for Defeating Web Application Attacks. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1 Proceedings of the Network and Distributed System Security Symposium, NDSS 2009, San Diego, California, USA, 8th February - 11th February 2009 Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Peter Williams, Radu Sion, Dennis E. Shasha The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Nicholas Weaver, Robin Sommer, Vern Paxson Detecting Forged TCP Reset Packets. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1David Dagon, Manos Antonakakis, Kevin Day, Xiapu Luo, Christopher P. Lee 0001, Wenke Lee Recursive DNS Architectures and Vulnerability Implications. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Xin Hu 0001, Matthew Knysz, Kang G. Shin RB-Seeker: Auto-detection of Redirection Botnets. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Amir Houmansadr, Negar Kiyavash, Nikita Borisov RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. Search on Bibsonomy NDSS The full citation details ... 2009 DBLP  BibTeX  RDF
1Patrick Traynor, Kevin R. B. Butler, William Enck, Patrick D. McDaniel Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Patrice Godefroid, Michael Y. Levin, David A. Molnar Automated Whitebox Fuzz Testing. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Gilbert Wondracek, Paolo Milani Comparetti, Christopher Krügel, Engin Kirda Automatic Network Protocol Analysis. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Scott E. Coull, Charles V. Wright, Angelos D. Keromytis, Fabian Monrose, Michael K. Reiter Taming the Devil: Techniques for Evaluating Anonymized Network Data. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Zhiqiang Lin, Xuxian Jiang, Dongyan Xu, Xiangyu Zhang 0001 Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Thorsten Holz, Christian Gorecki, Konrad Rieck, Felix C. Freiling Measuring and Detecting Fast-Flux Service Networks. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Peter Williams, Radu Sion Usable PIR. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1XiaoFeng Wang 0001, Zhuowei Li 0001, Ninghui Li, Jong Youl Choi PRECIP: Towards Practical and Retrofittable Confidential Information Protection. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Sherman S. M. Chow, Joseph K. Liu, Duncan S. Wong Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1 Proceedings of the Network and Distributed System Security Symposium, NDSS 2008, San Diego, California, USA, 10th February - 13th February 2008 Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Ji Sun Shin, Virgil D. Gligor A New Privacy-Enhanced Matchmaking Protocol. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Apu Kapadia, Nikos Triandopoulos Halo: High-Assurance Locate for Distributed Hash Tables. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Guofei Gu, Junjie Zhang 0004, Wenke Lee BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Monirul Islam Sharif, Andrea Lanzi, Jonathon T. Giffin, Wenke Lee Impeding Malware Analysis Using Conditional Code Obfuscation. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Robin Snader, Nikita Borisov A Tune-up for Tor: Improving Security and Performance in the Tor Network. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1David Dagon, Niels Provos, Christopher P. Lee 0001, Wenke Lee Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Radmilo Racic, Denys Ma, Hao Chen 0003, Xin Liu 0002 Exploiting Opportunistic Scheduling in Cellular Data Networks. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Heng Yin 0001, Zhenkai Liang, Dawn Song HookFinder: Identifying and Understanding Malware Hooking Behaviors. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1John Bethencourt, Dawn Song, Brent Waters Analysis-Resistant Malware. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Juan Caballero, Theocharis Kampouris, Dawn Song, Jia Wang Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Shobha Venkataraman, Avrim Blum, Dawn Song Limits of Learning-based Signature Generation with Adversaries. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Bruno F. Ribeiro, Weifeng Chen 0001, Gerome Miklau, Donald F. Towsley Analyzing Privacy in Enterprise Packet Trace Anonymization. Search on Bibsonomy NDSS The full citation details ... 2008 DBLP  BibTeX  RDF
1Shobha Venkataraman, Juan Caballero, Pongsin Poosankam, Min Gyung Kang, Dawn Xiaodong Song Fig: Automatic Fingerprint Generation. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Philipp Vogt, Florian Nentwich, Nenad Jovanovic, Engin Kirda, Christopher Krügel, Giovanni Vigna Cross Site Scripting Prevention with Dynamic Data Tainting and Static Analysis. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Sushant Sinha, Michael D. Bailey, Farnam Jahanian Shedding Light on the Configuration of Dark Addresses. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Subrata Acharya, Bryan N. Mills, Mehmud Abliz, Taieb Znati, Jia Wang 0001, Zihui Ge, Albert G. Greenberg OPTWALL: A Hierarchical Traffic-Aware Firewall. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Lorrie Faith Cranor, Serge Egelman, Jason I. Hong, Yue Zhang 0002 Phinding Phish: An Evaluation of Anti-Phishing Toolbars. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1 Proceedings of the Network and Distributed System Security Symposium, NDSS 2007, San Diego, California, USA, 28th February - 2nd March 2007 Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Radia J. Perlman File System Design with Assured Delete. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Nikita Borisov, David Brumley, Helen J. Wang, John Dunagan, Pallavi Joshi, Chuanxiong Guo Generic Application-Level Protocol Analyzer and its Language. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Radu Sion, Bogdan Carbunar On the Practicality of Private Information Retrieval. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Kevin D. Bowers, Lujo Bauer, Deepak Garg 0001, Frank Pfenning, Michael K. Reiter Consumable Credentials in Linear-Logic-Based Access-Control Systems. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Yuan Niu, Hao Chen 0003, Francis Hsu, Yi-Min Wang, Ming Ma A Quantitative Study of Forum Spamming Using Context-based Analysis. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Giuseppe Ateniese, Jonathan Kirsch, Marina Blanton Secret Handshakes with Dynamic and Fuzzy Matching. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1David Brumley, Dawn Xiaodong Song, Tzi-cker Chiueh, Rob Johnson, Huijia Lin RICH: Automatically Protecting Against Integer-Based Vulnerabilities. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Scott E. Coull, Charles V. Wright, Fabian Monrose, Michael P. Collins, Michael K. Reiter Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1John Bethencourt, Dan Boneh, Brent Waters Cryptographic Methods for Storing Ballots on a Voting Machine. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Ying Zhang 0022, Zhuoqing Morley Mao, Jia Wang Low-Rate TCP-Targeted DoS Attack Disrupts Internet Routing. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Ryan Vogt, John Aycock, Michael J. Jacobson Jr. Army of Botnets. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1Apu Kapadia, Patrick P. Tsang, Sean W. Smith Attribute-Based Publishing with Hidden Credentials and Hidden Policies. Search on Bibsonomy NDSS The full citation details ... 2007 DBLP  BibTeX  RDF
1William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. Search on Bibsonomy NDSS The full citation details ... 2006 DBLP  BibTeX  RDF
1Keith B. Frikken, Jiangtao Li 0001, Mikhail J. Atallah Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. Search on Bibsonomy NDSS The full citation details ... 2006 DBLP  BibTeX  RDF
1David Dagon, Cliff Changchun Zou, Wenke Lee Modeling Botnet Propagation Using Time Zones. Search on Bibsonomy NDSS The full citation details ... 2006 DBLP  BibTeX  RDF
1Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain Inoculating SSH Against Address Harvesting. Search on Bibsonomy NDSS The full citation details ... 2006 DBLP  BibTeX  RDF
1James Newsome, David Brumley, Dawn Xiaodong Song Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. Search on Bibsonomy NDSS The full citation details ... 2006 DBLP  BibTeX  RDF
1Patrick D. McDaniel, Subhabrata Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek Enterprise Security: A Community of Interest Based Approach. Search on Bibsonomy NDSS The full citation details ... 2006 DBLP  BibTeX  RDF
1Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. Search on Bibsonomy NDSS The full citation details ... 2006 DBLP  BibTeX  RDF
Displaying result #901 - #1000 of 1211 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license