The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for attacks with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1984 (15) 1985-1987 (17) 1988-1989 (19) 1990-1991 (26) 1992-1993 (39) 1994 (34) 1995 (26) 1996 (50) 1997 (54) 1998 (92) 1999 (127) 2000 (178) 2001 (306) 2002 (406) 2003 (624) 2004 (899) 2005 (1333) 2006 (1490) 2007 (1528) 2008 (1585) 2009 (1275) 2010 (673) 2011 (702) 2012 (813) 2013 (804) 2014 (989) 2015 (1073) 2016 (1206) 2017 (1461) 2018 (1759) 2019 (2206) 2020 (2727) 2021 (2982) 2022 (3370) 2023 (3864) 2024 (1050)
Publication types (Num. hits)
article(15280) book(15) data(11) incollection(195) inproceedings(19901) phdthesis(378) proceedings(22)
Venues (Conferences, Journals, ...)
CoRR(4079) IACR Cryptol. ePrint Arch.(1244) IEEE Access(507) RAID(446) CCS(308) IEEE Trans. Inf. Forensics Sec...(260) Comput. Secur.(249) USENIX Security Symposium(224) IEEE Trans. Smart Grid(198) GLOBECOM(197) ICC(193) FSE(187) ACSAC(184) CHES(178) Sensors(170) ARES(166) More (+10 of total 3761)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11110 occurrences of 2965 keywords

Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Xiaorui Sun, Xuejia Lai Improved Integral Attacks on MISTY1. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Justin King, Kiran Lakkaraju, Adam J. Slagell A taxonomy and adversarial model for attacks against network log anonymization. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network logs, anonymization, taxonomy, adversarial model
16Wei Wang 0012, Florent Masseglia, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier A general framework for adaptive and online detection of web attacks. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, intrusion detection, anomaly detection
16Meiko Jensen, Jörg Schwenk The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park Signaling-Oriented DoS Attacks in UMTS Networks. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Denial of Service, UMTS, Signaling
16Chong Chen, Jiangqun Ni, Jiwu Huang Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. Search on Bibsonomy IWDW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater Practical Algebraic Attacks on the Hitag2 Stream Cipher. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis
16Lan Wang, Qishi Wu, Yaoqing Liu Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code passing, collusion attack, Mobile agent security, malicious hosts
16Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF malicious script, shellcode, emulation, Drive-by download
16Christophe Petit 0001, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Fatih Özgül, Zeki Erdem, Chris Bowerman Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms. Search on Bibsonomy PAISI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Terrorist groups, crime data mining, matching and predicting crimes, offender networks, group detection, clustering, classification
16Riccardo Focardi, Flaminia L. Luccio, Graham Steel Blunting Differential Attacks on PIN Processing APIs. Search on Bibsonomy NordSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Financial Cryptography, PIN Verification, Security APIs
16Radu Muresan, Stefano Gregori Protection Circuit against Differential Power Analysis Attacks for Smart Cards. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Renaud Feil, Louis Nyffenegger Evolution of cross site request forgery attacks. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Hakem Beitollahi, Geert Deconinck FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Devu Manikantan Shila, Tricha Anjali Defending selective forwarding attacks in WMNs. Search on Bibsonomy EIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Wassim Znaidi, Marine Minier, Jean-Philippe Babau Detecting wormhole attacks in wireless networks using local neighborhood information. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou Deconstructing new cache designs for thwarting software cache-based side channel attacks. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF microarchitectural analysis, cryptanalysis, side-channel analysis, timing attack, cache architecture, cache attack
16Hitesh Ballani, Paul Francis Mitigating DNS DoS attacks. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stale cache, denial of service, DNS
16Philippe Golle Machine learning attacks against the Asirra CAPTCHA. Search on Bibsonomy CCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF reverse turing test, machine learning, support vector machine, classifier, captcha
16Joaquín García-Alfaro, Michael A. Jaeger, Gero Mühl, I. Barrera, Joan Borrell Distributed Exchange of Alerts for the Detection of Coordinated Attacks. Search on Bibsonomy CNSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Attack Prevention System, IDMEF, Network Security, Publish/Subscribe, Message Oriented Middleware
16Bin Zhou 0002, Jian Pei Preserving Privacy in Social Networks Against Neighborhood Attacks. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Fabian Fischer 0001, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel Large-Scale Network Monitoring for Visual Analysis of Attacks. Search on Bibsonomy VizSEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF visual network monitoring, visualization for network security, large-scale netflow analysis
16Azadeh Kushki, Konstantinos N. Plataniotis, Anastasios N. Venetsanopoulos Sensor selection for mitigation of RSS-based attacks in wireless local area network positioning. Search on Bibsonomy ICASSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Anjali Sardana, Ramesh Chandra Joshi Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Routing, DDoS, Honeypot
16Kai Bu, Zhixin Sun A Method Based on AMHI for DDoS Attacks Detection and Defense. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Lei Zhang 0012, Wenling Wu, Je Hong Park, Bonwook Koo, Yongjin Yeom Improved Impossible Differential Attacks on Large-Block Rijndael. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Impossible differential distinguisher, Impossible differential attack, Block cipher, Rijndael
16Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Guan An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data
16Somitra Kumar Sanadhya, Palash Sarkar 0001 Non-linear Reduced Round Attacks against SHA-2 Hash Family. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet Silicon-level Solutions to Counteract Passive and Active Attacks. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Muniz Bandeira Duarte, Guy Pujolle A Trust Model Robust to Slander Attacks in Ad Hoc Networks. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Massimo Alioto, Massimo Poli, Santina Rocchi A general model for differential power analysis attacks to static logic circuits. Search on Bibsonomy ISCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Li Zhu, Huaibei Zhou Two Types of Attacks against Cognitive Radio Network MAC Protocols. Search on Bibsonomy CSSE (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Anjali Sardana, Ramesh Chandra Joshi Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Brij B. Gupta, Manoj Misra, Ramesh Chandra Joshi FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Michael Backes 0001, Boris Köpf Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Korporn Panyim, Prashant Krishnamurthy A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Hilmi Günes Kayacik, Nur Zincir-Heywood Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16François-Xavier Standaert, Cédric Archambeau Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Deniz Toz, Orr Dunkelman Analysis of Two Attacks on Reduced-Round Versions of the SMS4. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Chong Hee Kim, Jean-Jacques Quisquater Method for Detecting Vulnerability to Doubling Attacks. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Doubling attack, relative doubling attack, smart card, simple power analysis (SPA), modular exponentiation
16Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Radwane Saad, Farid Naït-Abdesselam, Ahmed Serhrouchni A collaborative peer-to-peer architecture to defend against DDoS attacks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Zhang Fu, Marina Papatriantafilou, Philippas Tsigas Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts. Search on Bibsonomy SRDS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Chad Williams, Bamshad Mobasher, Robin D. Burke Defending recommender systems: detection of profile injection attacks. Search on Bibsonomy Serv. Oriented Comput. Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bias profile injection, Support vector machines, Recommender systems, Collaborative filtering, Attack detection, Attack models
16Poorvi L. Vora An Information-Theoretic Approach to Inference Attacks on Random Data Perturbation and a Related Privacy Measure. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Luiz Felipe Perrone Could a Caveman Do It? The Surprising Potential of Simple Attacks. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Konrad Rieck, Pavel Laskov Language models for detection of unknown attacks in network traffic. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Maha El Choubassi, Pierre Moulin Noniterative Algorithms for Sensitivity Analysis Attacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Zhijun Wu 0001, Dong Zhang Scheme of Defending Against DDoS Attacks in Large-Scale ISP Networks. Search on Bibsonomy NPC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distribution-based Secure Overlay Nodes (DSON), China Education & Research Network (CERNET), Large-scale ISP Network, Router, Distributed Denial of Service (DDoS)
16Monia Loulou, Mohamed Tounsi 0001, Ahmed Hadj Kacem, Mohamed Jmaiel A Formal Approach to prevent Attacks on Mobile Agent Systems. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz, Atta Badii Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ryan D. Riley, Xuxian Jiang, Dongyan Xu An Architectural Approach to Preventing Code Injection Attacks. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure Memory Architecture, Code Injection
16Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang 0001, Lixia Zhang 0001 Understanding Resiliency of Internet Topology against Prefix Hijack Attacks. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Traian Avram, Seungchan Oh, Salim Hariri Analyzing Attacks in Wireless Ad Hoc Network with Self-Organizing Maps. Search on Bibsonomy CNSR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Muhammad Sher, Thomas Magedanz Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion Detection and Prevention system, IP Multimedia Subsystem, Services Delivery Platform, Security Threats
16Ronghua Wang, Wenliang Du, Peng Ning Containing denial-of-service attacks in broadcast authentication in sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2007 DBLP  DOI  BibTeX  RDF broadcast delay, security, wireless sensor networks, energy saving, denial of service attack
16Shahram Khazaei, Simon Fischer 0002, Willi Meier Reduced Complexity Attacks on the Alternating Step Generator. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Alternating Step Generator, Stream Cipher, Clock-Controlled Generator
16Yacine Djemaiel, Noureddine Boudriga A global marking scheme for tracing cyber attacks. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF global marking, malicious activity, digital investigation, security attack
16Qi Duan, Mohit Virendra, Shambhu J. Upadhyaya On the Hardness of Minimum Cost Blocking Attacks on Multi-Path Wireless Routing Protocols. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Yanlan Ding, Guiping Su Intrusion detection system for signal based SIP attacks through timed HCPN. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ettore Merlo, Dominic Letarte, Giuliano Antoniol Automated Protection of PHP Applications Against SQL-injection Attacks. Search on Bibsonomy CSMR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker Low-resource routing attacks against tor. Search on Bibsonomy WPES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF load balancing, anonymity, traffic analysis, tor
16Tran Van Phuong, Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee, Heejo Lee Transmission Time-Based Mechanism to Detect Wormhole Attacks. Search on Bibsonomy APSCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Sondre Rønjom, Guang Gong, Tor Helleseth A Survey of Recent Attacks on the Filter Generator. Search on Bibsonomy AAECC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF nonlinear combiner generator, Boolean function, stream ciphers, m-sequences, filter generator
16Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16E. Ramirez-Silva, Marc Dacier Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood Evolving Buffer Overflow Attacks with Detector Feedback. Search on Bibsonomy EvoWorkshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Husrev T. Sencar, Qiming Li, Nasir D. Memon A new approach to countering ambiguity attacks. Search on Bibsonomy MM&Sec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ambiguity attack, security, watermarking
16Jorge Nakahara Jr., Ivan Carlos Pavão Impossible-Differential Attacks on Large-Block Rijndael. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information security, Impossible differential cryptanalysis
16Min-Sung Koh, Esteban Rodriguez-Marek, Claudio Talarico A Novel Data Dependent Multimedia Encryption Algorithm Secure Against Chosen-Plaintext Attacks. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Jongsung Kim, Seokhie Hong, Bart Preneel Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack
16Håkan Englund, Martin Hell, Thomas Johansson 0001 Two General Attacks on Pomaranch-Like Keystream Generators. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF resynchronization attack, Stream ciphers, distinguishing attack, eSTREAM, Pomaranch
16Amey Shevtekar, Nirwan Ansari A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Chuan-Wen Loe, Khoongming Khoo Side Channel Attacks on Irregularly Decimated Generators. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Irregularly Decimated Generators, ABSG, Timing Analysis, Fault Attack, DECIM
16Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli Mixed Techniques to Protect Precharged Busses against Differential Power Analysis Attacks. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Orr Dunkelman, Gautham Sekar, Bart Preneel Improved Meet-in-the-Middle Attacks on Reduced-Round DES. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Wentao Zhang, Lei Zhang 0012, Wenling Wu, Dengguo Feng Related-Key Differential-Linear Attacks on Reduced AES-192. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF related-key, differential-linear attack, cryptanalysis, AES
16Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita Pongpaibool Lightweight Detection of DoS Attacks. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Daniel Peter Dallas, Christopher Leckie, Kotagiri Ramamohanarao Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ming Hu, Minghua Jiang Simulation of Attacks on Network-based Error Detection. Search on Bibsonomy IITA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Fareed Zaffar, Gershon Kedem A Service Architecture for Countering Distributed Denial of Service Attacks. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Úlfar Erlingsson Low-Level Software Security: Attacks and Defenses. Search on Bibsonomy FOSAD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Qingtao Wu, Haichao Zhang, Jiexin Pu Mitigating distributed denial-of-service attacks using network connection control charts. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Shewhart's control charts, automated response model, network security, distributed denial-of-service
16Javed I. Khan, Sajid S. Shaikh A Multi-scenario Reputation Estimation Framework and its Resilience Study against Various forms of Attacks. Search on Bibsonomy Web Intelligence The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent. Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Carmela Troncoso, Claudia Díaz, Orr Dunkelman, Bart Preneel Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Mohsen Sharifi, Mohammad Zoroufi, Alireza Saberi How to Counter Control Flow Tampering Attacks. Search on Bibsonomy AICCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Meng Yu 0001, Wanyu Zang, Peng Liu 0005 Database Isolation and Filtering against Data Corruption Attacks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Mark E. Snyder, Ravi Sundaram, Mayur Thakur A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee 0002, Jongin Lim 0001, Jaechul Sung, Okyeon Yi Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Zili Shao, Chun Xue, Qingfeng Zhuge, Mei Kang Qiu, Bin Xiao 0001, Edwin Hsing-Mean Sha Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hardware/software, Security, embedded system, protection, buffer overflow attack
16Amit B. Kulkarni, Stephen F. Bush Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF complexity probes, entropy, active network, Kolmogorov Complexity, denial-of-service attack
16Martin Hell, Thomas Johansson 0001 Two New Attacks on the Self-Shrinking Generator. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 35802 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license