|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11110 occurrences of 2965 keywords
|
|
|
Results
Found 35802 publication records. Showing 35802 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
16 | Xiaorui Sun, Xuejia Lai |
Improved Integral Attacks on MISTY1. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Justin King, Kiran Lakkaraju, Adam J. Slagell |
A taxonomy and adversarial model for attacks against network log anonymization. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
network logs, anonymization, taxonomy, adversarial model |
16 | Wei Wang 0012, Florent Masseglia, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier |
A general framework for adaptive and online detection of web attacks. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
clustering, intrusion detection, anomaly detection |
16 | Meiko Jensen, Jörg Schwenk |
The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Georgios Kambourakis, Constantinos Kolias, Stefanos Gritzalis, Jong Hyuk Park |
Signaling-Oriented DoS Attacks in UMTS Networks. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Security, Denial of Service, UMTS, Signaling |
16 | Chong Chen, Jiangqun Ni, Jiwu Huang |
Temporal Statistic Based Video Watermarking Scheme Robust against Geometric Attacks and Frame Dropping. |
IWDW |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater |
Practical Algebraic Attacks on the Hitag2 Stream Cipher. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis |
16 | Lan Wang, Qishi Wu, Yaoqing Liu |
Design and Validation of PATRICIA for the Mitigation of Network Flooding Attacks. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Marc Jaimez, Oscar Esparza, Jose L. Muñoz, Juan J. Alins-Delgado, Jorge Mata-Díaz |
A Mechanism to Avoid Collusion Attacks Based on Code Passing in Mobile Agent Systems. |
WISTP |
2009 |
DBLP DOI BibTeX RDF |
code passing, collusion attack, Mobile agent security, malicious hosts |
16 | Manuel Egele, Peter Wurzinger, Christopher Kruegel, Engin Kirda |
Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
malicious script, shellcode, emulation, Drive-by download |
16 | Christophe Petit 0001, Jean-Jacques Quisquater, Jean-Pierre Tillich, Gilles Zémor |
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Fatih Özgül, Zeki Erdem, Chris Bowerman |
Prediction of Unsolved Terrorist Attacks Using Group Detection Algorithms. |
PAISI |
2009 |
DBLP DOI BibTeX RDF |
Terrorist groups, crime data mining, matching and predicting crimes, offender networks, group detection, clustering, classification |
16 | Riccardo Focardi, Flaminia L. Luccio, Graham Steel |
Blunting Differential Attacks on PIN Processing APIs. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
Financial Cryptography, PIN Verification, Security APIs |
16 | Radu Muresan, Stefano Gregori |
Protection Circuit against Differential Power Analysis Attacks for Smart Cards. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Renaud Feil, Louis Nyffenegger |
Evolution of cross site request forgery attacks. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hakem Beitollahi, Geert Deconinck |
FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks. |
NCA |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Devu Manikantan Shila, Tricha Anjali |
Defending selective forwarding attacks in WMNs. |
EIT |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Wassim Znaidi, Marine Minier, Jean-Philippe Babau |
Detecting wormhole attacks in wireless networks using local neighborhood information. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou |
Deconstructing new cache designs for thwarting software cache-based side channel attacks. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
microarchitectural analysis, cryptanalysis, side-channel analysis, timing attack, cache architecture, cache attack |
16 | Hitesh Ballani, Paul Francis |
Mitigating DNS DoS attacks. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
stale cache, denial of service, DNS |
16 | Philippe Golle |
Machine learning attacks against the Asirra CAPTCHA. |
CCS |
2008 |
DBLP DOI BibTeX RDF |
reverse turing test, machine learning, support vector machine, classifier, captcha |
16 | Joaquín García-Alfaro, Michael A. Jaeger, Gero Mühl, I. Barrera, Joan Borrell |
Distributed Exchange of Alerts for the Detection of Coordinated Attacks. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
Attack Prevention System, IDMEF, Network Security, Publish/Subscribe, Message Oriented Middleware |
16 | Bin Zhou 0002, Jian Pei |
Preserving Privacy in Social Networks Against Neighborhood Attacks. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Fabian Fischer 0001, Florian Mansmann, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel |
Large-Scale Network Monitoring for Visual Analysis of Attacks. |
VizSEC |
2008 |
DBLP DOI BibTeX RDF |
visual network monitoring, visualization for network security, large-scale netflow analysis |
16 | Azadeh Kushki, Konstantinos N. Plataniotis, Anastasios N. Venetsanopoulos |
Sensor selection for mitigation of RSS-based attacks in wireless local area network positioning. |
ICASSP |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Anjali Sardana, Ramesh Chandra Joshi |
Honeypot Based Routing to Mitigate DDoS Attacks on Servers at ISP Level. |
ISIP |
2008 |
DBLP DOI BibTeX RDF |
Routing, DDoS, Honeypot |
16 | Kai Bu, Zhixin Sun |
A Method Based on AMHI for DDoS Attacks Detection and Defense. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Lei Zhang 0012, Wenling Wu, Je Hong Park, Bonwook Koo, Yongjin Yeom |
Improved Impossible Differential Attacks on Large-Block Rijndael. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Impossible differential distinguisher, Impossible differential attack, Block cipher, Rijndael |
16 | Ayesha Binte Ashfaq, Maria Joseph Robert, Asma Mumtaz, Muhammad Qasim Ali, Ali Sajjad, Syed Ali Khayam |
A Comparative Evaluation of Anomaly Detectors under Portscan Attacks. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Zhen Yu, Yawen Wei, Bhuvaneswari Ramkumar, Yong Guan |
An Efficient Signature-Based Scheme for Securing Network Coding Against Pollution Attacks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Udi Ben-Porat, Anat Bremler-Barr, Hanoch Levy |
Evaluating the Vulnerability of Network Mechanisms to Sophisticated DDoS Attacks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Wei-Chuen Yau, Swee-Huay Heng, Bok-Min Goi |
Off-Line Keyword Guessing Attacks on Recent Public Key Encryption with Keyword Search Schemes. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
off-line keyword guessing attack, privacy, public key encryption, database security, Searching on encrypted data |
16 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Non-linear Reduced Round Attacks against SHA-2 Hash Family. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet |
Silicon-level Solutions to Counteract Passive and Active Attacks. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Pedro B. Velloso, Rafael P. Laufer, Otto Carlos Muniz Bandeira Duarte, Guy Pujolle |
A Trust Model Robust to Slander Attacks in Ad Hoc Networks. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Massimo Alioto, Massimo Poli, Santina Rocchi |
A general model for differential power analysis attacks to static logic circuits. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Keun Park, Dongwon Seo, Jaewon Yoo, Heejo Lee, Hyogon Kim |
Unified Rate Limiting in Broadband Access Networks for Defeating Internet Worms and DDoS Attacks. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Li Zhu, Huaibei Zhou |
Two Types of Attacks against Cognitive Radio Network MAC Protocols. |
CSSE (4) |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Anjali Sardana, Ramesh Chandra Joshi |
Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Brij B. Gupta, Manoj Misra, Ramesh Chandra Joshi |
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Michael Backes 0001, Boris Köpf |
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Korporn Panyim, Prashant Krishnamurthy |
A Hybrid Key Predistribution Scheme for Sensor Networks Employing Spatial Retreats to Cope with Jamming Attacks. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Hilmi Günes Kayacik, Nur Zincir-Heywood |
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
16 | François-Xavier Standaert, Cédric Archambeau |
Using Subspace-Based Template Attacks to Compare and Combine Power and Electromagnetic Information Leakages. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Deniz Toz, Orr Dunkelman |
Analysis of Two Attacks on Reduced-Round Versions of the SMS4. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Chong Hee Kim, Jean-Jacques Quisquater |
Method for Detecting Vulnerability to Doubling Attacks. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
Doubling attack, relative doubling attack, smart card, simple power analysis (SPA), modular exponentiation |
16 | Jinpeng Wei, Bryan D. Payne, Jonathon Giffin, Calton Pu |
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Radwane Saad, Farid Naït-Abdesselam, Ahmed Serhrouchni |
A collaborative peer-to-peer architecture to defend against DDoS attacks. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Zhang Fu, Marina Papatriantafilou, Philippas Tsigas |
Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts. |
SRDS |
2008 |
DBLP DOI BibTeX RDF |
|
16 | Chad Williams, Bamshad Mobasher, Robin D. Burke |
Defending recommender systems: detection of profile injection attacks. |
Serv. Oriented Comput. Appl. |
2007 |
DBLP DOI BibTeX RDF |
Bias profile injection, Support vector machines, Recommender systems, Collaborative filtering, Attack detection, Attack models |
16 | Poorvi L. Vora |
An Information-Theoretic Approach to Inference Attacks on Random Data Perturbation and a Related Privacy Measure. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Luiz Felipe Perrone |
Could a Caveman Do It? The Surprising Potential of Simple Attacks. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Konrad Rieck, Pavel Laskov |
Language models for detection of unknown attacks in network traffic. |
J. Comput. Virol. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Maha El Choubassi, Pierre Moulin |
Noniterative Algorithms for Sensitivity Analysis Attacks. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Zhijun Wu 0001, Dong Zhang |
Scheme of Defending Against DDoS Attacks in Large-Scale ISP Networks. |
NPC |
2007 |
DBLP DOI BibTeX RDF |
Distribution-based Secure Overlay Nodes (DSON), China Education & Research Network (CERNET), Large-scale ISP Network, Router, Distributed Denial of Service (DDoS) |
16 | Monia Loulou, Mohamed Tounsi 0001, Ahmed Hadj Kacem, Mohamed Jmaiel |
A Formal Approach to prevent Attacks on Mobile Agent Systems. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Zorana Bankovic, Slobodan Bojanic, Octavio Nieto-Taladriz, Atta Badii |
Increasing Detection Rate of User-to-Root Attacks Using Genetic Algorithms. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ryan D. Riley, Xuxian Jiang, Dongyan Xu |
An Architectural Approach to Preventing Code Injection Attacks. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
Secure Memory Architecture, Code Injection |
16 | Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang 0001, Lixia Zhang 0001 |
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Traian Avram, Seungchan Oh, Salim Hariri |
Analyzing Attacks in Wireless Ad Hoc Network with Self-Organizing Maps. |
CNSR |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Muhammad Sher, Thomas Magedanz |
Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
Intrusion Detection and Prevention system, IP Multimedia Subsystem, Services Delivery Platform, Security Threats |
16 | Ronghua Wang, Wenliang Du, Peng Ning |
Containing denial-of-service attacks in broadcast authentication in sensor networks. |
MobiHoc |
2007 |
DBLP DOI BibTeX RDF |
broadcast delay, security, wireless sensor networks, energy saving, denial of service attack |
16 | Shahram Khazaei, Simon Fischer 0002, Willi Meier |
Reduced Complexity Attacks on the Alternating Step Generator. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Alternating Step Generator, Stream Cipher, Clock-Controlled Generator |
16 | Yacine Djemaiel, Noureddine Boudriga |
A global marking scheme for tracing cyber attacks. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
global marking, malicious activity, digital investigation, security attack |
16 | Qi Duan, Mohit Virendra, Shambhu J. Upadhyaya |
On the Hardness of Minimum Cost Blocking Attacks on Multi-Path Wireless Routing Protocols. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Yanlan Ding, Guiping Su |
Intrusion detection system for signal based SIP attacks through timed HCPN. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ettore Merlo, Dominic Letarte, Giuliano Antoniol |
Automated Protection of PHP Applications Against SQL-injection Attacks. |
CSMR |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Kevin S. Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas C. Sicker |
Low-resource routing attacks against tor. |
WPES |
2007 |
DBLP DOI BibTeX RDF |
load balancing, anonymity, traffic analysis, tor |
16 | Tran Van Phuong, Ngo Trong Canh, Young-Koo Lee, Sungyoung Lee, Heejo Lee |
Transmission Time-Based Mechanism to Detect Wormhole Attacks. |
APSCC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Sondre Rønjom, Guang Gong, Tor Helleseth |
A Survey of Recent Attacks on the Filter Generator. |
AAECC |
2007 |
DBLP DOI BibTeX RDF |
nonlinear combiner generator, Boolean function, stream ciphers, m-sequences, filter generator |
16 | Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 |
Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mohammad Zoroufi |
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks. |
ICISS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | E. Ramirez-Silva, Marc Dacier |
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. |
ASIAN |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Hilmi Günes Kayacik, Malcolm I. Heywood, Nur Zincir-Heywood |
Evolving Buffer Overflow Attacks with Detector Feedback. |
EvoWorkshops |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Husrev T. Sencar, Qiming Li, Nasir D. Memon |
A new approach to countering ambiguity attacks. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
ambiguity attack, security, watermarking |
16 | Jorge Nakahara Jr., Ivan Carlos Pavão |
Impossible-Differential Attacks on Large-Block Rijndael. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
information security, Impossible differential cryptanalysis |
16 | Min-Sung Koh, Esteban Rodriguez-Marek, Claudio Talarico |
A Novel Data Dependent Multimedia Encryption Algorithm Secure Against Chosen-Plaintext Attacks. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Jongsung Kim, Seokhie Hong, Bart Preneel |
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack |
16 | Håkan Englund, Martin Hell, Thomas Johansson 0001 |
Two General Attacks on Pomaranch-Like Keystream Generators. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
resynchronization attack, Stream ciphers, distinguishing attack, eSTREAM, Pomaranch |
16 | Amey Shevtekar, Nirwan Ansari |
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Chuan-Wen Loe, Khoongming Khoo |
Side Channel Attacks on Irregularly Decimated Generators. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Irregularly Decimated Generators, ABSG, Timing Analysis, Fault Attack, DECIM |
16 | Massimo Alioto, Massimo Poli, Santina Rocchi, Valerio Vignoli |
Mixed Techniques to Protect Precharged Busses against Differential Power Analysis Attacks. |
ISCAS |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Orr Dunkelman, Gautham Sekar, Bart Preneel |
Improved Meet-in-the-Middle Attacks on Reduced-Round DES. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Wentao Zhang, Lei Zhang 0012, Wenling Wu, Dengguo Feng |
Related-Key Differential-Linear Attacks on Reduced AES-192. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
related-key, differential-linear attack, cryptanalysis, AES |
16 | Sirikarn Pukkawanna, Vasaka Visoottiviseth, Panita Pongpaibool |
Lightweight Detection of DoS Attacks. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Daniel Peter Dallas, Christopher Leckie, Kotagiri Ramamohanarao |
Hop-Count Monitoring: Detecting Sinkhole Attacks in Wireless Sensor Networks. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ming Hu, Minghua Jiang |
Simulation of Attacks on Network-based Error Detection. |
IITA |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Fareed Zaffar, Gershon Kedem |
A Service Architecture for Countering Distributed Denial of Service Attacks. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Úlfar Erlingsson |
Low-Level Software Security: Attacks and Defenses. |
FOSAD |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Qingtao Wu, Haichao Zhang, Jiexin Pu |
Mitigating distributed denial-of-service attacks using network connection control charts. |
Infoscale |
2007 |
DBLP DOI BibTeX RDF |
Shewhart's control charts, automated response model, network security, distributed denial-of-service |
16 | Javed I. Khan, Sajid S. Shaikh |
A Multi-scenario Reputation Estimation Framework and its Resilience Study against Various forms of Attacks. |
Web Intelligence |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Marlom A. Konrath, Marinho P. Barcellos, Rodrigo B. Mansilha |
Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent. |
Peer-to-Peer Computing |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Carmela Troncoso, Claudia Díaz, Orr Dunkelman, Bart Preneel |
Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Mohsen Sharifi, Mohammad Zoroufi, Alireza Saberi |
How to Counter Control Flow Tampering Attacks. |
AICCSA |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Meng Yu 0001, Wanyu Zang, Peng Liu 0005 |
Database Isolation and Filtering against Data Corruption Attacks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Mark E. Snyder, Ravi Sundaram, Mayur Thakur |
A Game-Theoretic Framework for Bandwidth Attacks and Statistical Defenses. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee 0002, Jongin Lim 0001, Jaechul Sung, Okyeon Yi |
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. |
J. Cryptol. |
2006 |
DBLP DOI BibTeX RDF |
|
16 | Zili Shao, Chun Xue, Qingfeng Zhuge, Mei Kang Qiu, Bin Xiao 0001, Edwin Hsing-Mean Sha |
Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
hardware/software, Security, embedded system, protection, buffer overflow attack |
16 | Amit B. Kulkarni, Stephen F. Bush |
Detecting Distributed Denial-of-Service Attacks Using Kolmogorov Complexity Metrics. |
J. Netw. Syst. Manag. |
2006 |
DBLP DOI BibTeX RDF |
complexity probes, entropy, active network, Kolmogorov Complexity, denial-of-service attack |
16 | Martin Hell, Thomas Johansson 0001 |
Two New Attacks on the Self-Shrinking Generator. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
|
|