|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1649 occurrences of 810 keywords
|
|
|
Results
Found 1785 publication records. Showing 1785 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
97 | Yongjin Kim, Ahmed Helmy |
Attacker traceback with cross-layer monitoring in wireless multi-hop networks. |
SASN |
2006 |
DBLP DOI BibTeX RDF |
DoS/DDoS attack, attacker traceback, cross-layer monitoring, wireless multi-hop networks |
80 | Serge Fehr, Christian Schaffner |
Randomness Extraction Via delta -Biased Masking in the Presence of a Quantum Attacker. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
76 | Jaafar Almasizadeh, Mohammad Abdollahi Azgomi |
A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
intrusion process, semi-Markov chain (SMC), Security, modeling, evaluation, attacker, system, discrete-time Markov chain (DTMC) |
73 | Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho |
Boosting Markov Reward Models for Probabilistic Security Evaluation by Characterizing Behaviors of Attacker and Defender. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Network security, anomaly detection, security evaluation, Markov Reward Models |
69 | Nazim Benaïssa |
Modelling Attacker's Knowledge for Cascade Cryptographic Protocols. |
ABZ |
2008 |
DBLP DOI BibTeX RDF |
model for attacker, formal methods, cryptography |
62 | Peng Liu 0005, Wanyu Zang, Meng Yu 0001 |
Incentive-based modeling and inference of attacker intent, objectives, and strategies. |
ACM Trans. Inf. Syst. Secur. |
2005 |
DBLP DOI BibTeX RDF |
Attacker intent and strategy modeling, attack strategy inference, game theory |
55 | Jared Cordasco, Susanne Wetzel |
An attacker model for MANET routing security. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
security, routing, ad-hoc, manet, attacker model |
52 | Yongjin Kim |
ATTENTION: ATTackEr Traceback Using MAC Layer AbNormality DetecTION. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
DoS, DDoS, Traceback |
52 | Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna |
Validating Security Protocols under the General Attacker. |
ARSPA-WITS |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Guido Boella, Leendert W. N. van der Torre |
An Attacker Model for Normative Multi-agent Systems. |
CEEMAS |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Andriy Panchenko 0001, Lexi Pimenidis |
Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
|
48 | Liang Xie 0002, Sencun Zhu |
Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
attacker identification, message dropping attacks, Overlay networks, attack detection |
42 | Siddharth Maru, Timothy X. Brown |
Denial of service vulnerabilities in the 802.16 protocol. |
WICON |
2008 |
DBLP DOI BibTeX RDF |
encryption, denial of service, traffic analysis, IEEE 802.16, sensing, jamming, broadband wireless access |
38 | Mark Rounds, Norman Pendegraft |
Diversity in Network Attacker Motivation: A Literature Review. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
38 | Daniel Ramsbrock, Robin Berthier, Michel Cukier |
Profiling Attacker Behavior Following SSH Compromises. |
DSN |
2007 |
DBLP DOI BibTeX RDF |
|
38 | Peng Liu 0005, Wanyu Zang |
Incentive-based modeling and inference of attacker intent, objectives, and strategies. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
attack prediction, game theory, computer security |
35 | Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang |
On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
DNS spoofing, MITM attacks, SIP, VoIP security |
35 | Mike Phillips, Manuela M. Veloso |
Robust Supporting Role in Coordinated Two-Robot Soccer Attack. |
RoboCup |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Ting He 0001, Lang Tong |
Detecting Encrypted Stepping-Stone Connections. |
IEEE Trans. Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Ryad Benadjila, Olivier Billet, Stanislas Francfort |
Drm to counter side-channel attacks? |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
white-box, AES, side-channel attacks, DRM |
35 | Sid Stamm, Zulfikar Ramzan, Markus Jakobsson |
Drive-By Pharming. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Salil S. Kanhere, Anjum Naveed |
A Novel Tuneable Low-Intensity Adversarial Attack. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Neil C. Rowe |
Designing Good Deceptions in Defense of Information Systems. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
35 | Ha Yoon Song, Han-gyoo Kim |
Cooperative Routers against DoS Attacks. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
33 | Masaki Kuwano, Momoka Okuma, Satoshi Okada, Takuho Mitsunaga |
The Attacker Might Also Do Next: ATT&CK Behavior Forecasting by Attacker-based Collaborative Filtering and Graph Databases. |
J. Inf. Process. |
2023 |
DBLP DOI BibTeX RDF |
|
33 | Thanh Hong Nguyen, Amulya Yadav |
The Risk of Attacker Behavioral Learning: Can Attacker Fool Defender Under Uncertainty? |
GameSec |
2022 |
DBLP DOI BibTeX RDF |
|
33 | Yashika Verma, Biswabandan Panda |
Avenger: Punishing the Cross-Core Last-Level Cache Attacker and Not the Victim by Isolating the Attacker. |
SEED |
2022 |
DBLP DOI BibTeX RDF |
|
33 | Abbas Arghavani, Mahdi Arghavani, Mahmood Ahmadi, Paul Crane |
Attacker-Manager Game Tree (AMGT): A new framework for visualizing and analysing the interactions between attacker and network security manager. |
Comput. Networks |
2018 |
DBLP DOI BibTeX RDF |
|
31 | Ioanna Kantzavelou, Sokratis K. Katsikas |
A Generic Intrusion Detection Game Model in IT Security. |
TrustBus |
2008 |
DBLP DOI BibTeX RDF |
internal attacker, Intrusion Detection, noncooperative Game Theory |
31 | Jin-yi Cai, Vinod Yegneswaran, Chris Alfeld, Paul Barford |
An Attacker-Defender Game for Honeynets. |
COCOON |
2009 |
DBLP DOI BibTeX RDF |
|
31 | Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou 0001 |
A Probabilistic Attacker Model for Quantitative Verification of DoS Security Threats. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
security, model checking, Denial of Service |
31 | Vaarun Vijairaghavan, Darshak Shah, Pallavi Galgali, Amit Shah, Nikhil Shah, Srinivasan Venkatesh 0002, Lokesh Bhatia |
Marking Technique to Isolate Boundary Router and Attacker. |
Computer |
2007 |
DBLP DOI BibTeX RDF |
network security, Internet Protocol traceback, Denial-of-service attacks |
31 | Kun Liu 0001, Chris Giannella, Hillol Kargupta |
An Attacker's View of Distance Preserving Maps for Privacy Preserving Data Mining. |
PKDD |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
Network Game with Attacker and Protector Entities. |
ISAAC |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Yongjin Kim, Ahmed Helmy |
SWAT: Small World-based Attacker Traceback in Ad-hoc Networks. |
MobiQuitous |
2005 |
DBLP DOI BibTeX RDF |
|
31 | Erland Jonsson, Tomas Olovsson |
A Quantitative Model of the Security Intrusion Process Based on Attacker Behavior. |
IEEE Trans. Software Eng. |
1997 |
DBLP DOI BibTeX RDF |
operational security, modeling, metric, Computer security, attacks, intrusion |
28 | Charles L. Cartledge, Michael L. Nelson |
Analysis of graphs for digital preservation suitability. |
HT |
2010 |
DBLP DOI BibTeX RDF |
robustness, resilience, small world |
28 | Jaafar Almasizadeh, Mohammad Abdollahi Azgomi |
Intrusion Process Modeling for Security Quantification. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Wei Sun, Xiangwei Kong, Dequan He, Xingang You |
Information Security Game Analysis with Penalty Parameter. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Zonghua Zhang, Farid Naït-Abdesselam, Xiaodong Lin 0001, Pin-Han Ho |
A model-based semi-quantitative approach for evaluating security of enterprise networks. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
intrusion detection, risk assessment, security evaluation |
28 | Leevar Williams, Richard Lippmann, Kyle Ingols |
GARNET: A Graphical Attack Graph and Reachability Network Evaluation Tool. |
VizSEC |
2008 |
DBLP DOI BibTeX RDF |
attack path, visualization, network, recommendation, vulnerability, treemap, security metrics, attack graph, exploit, adversary model |
28 | Arvind Seshadri, Mark Luk, Adrian Perrig |
SAKE: Software Attestation for Key Establishment in Sensor Networks. |
DCOSS |
2008 |
DBLP DOI BibTeX RDF |
software attestation, sensor networks, Key establishment |
28 | Hilmi Günes Kayacik, Nur Zincir-Heywood |
Mimicry Attacks Demystified: What Can Attackers Do to Evade Detection? |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Joseph H. Silverman, William Whyte |
Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Ee-Chien Chang, Ren Shen, Francis Weijian Teo |
Finding the original point set hidden among chaff. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
biometric privacy protection, fingerprint template, online parking, secure sketch |
28 | Mikhail J. Atallah, Keith B. Frikken, Michael T. Goodrich, Roberto Tamassia |
Secure Biometric Authentication for Weak Computational Devices. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
authentication, biometrics, smart cards, cryptographic hash functions |
28 | Michael R. Clarkson, Andrew C. Myers, Fred B. Schneider |
Belief in Information Flow. |
CSFW |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Bharat B. Madan, Shashi Phoha, Kishor S. Trivedi |
StackOFFence: A Technique for Defending Against Buffer Overflow Attacks. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Jonathan M. McCune, Elaine Shi, Adrian Perrig, Michael K. Reiter |
Detection of Denial-of-Message Attacks on Sensor Network Broadcasts. |
S&P |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Bilal Rizvi, Emmanuel Fernández-Gaucherand |
Effectiveness of Advanced and Authenticated Packet Marking Scheme for Traceback of Denial of Service Attacks. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Xunhua Wang, Mohammad Hossain Heydari, Hua Lin |
An Intrusion-Tolerant Password Authentication System. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
off-line dictionary attack, password-authenticated key exchange (PAKE), Intrusion tolerance |
28 | Scott A. Crosby, Ian Goldberg, Robert Johnson, Dawn Xiaodong Song, David A. Wagner 0001 |
A Cryptanalysis of the High-Bandwidth Digital Content Protection System. |
Digital Rights Management Workshop |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Adam L. Young, Moti Yung |
Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
deniable password snatching, evasive electronic espionage, cryptovirology, active viral attacks, extortion attacks, electronic warfare, electronic espionage, cryptotrojan, public information, secure receiver-anonymous channel, espionage attacks, public key cryptography, passwords, malware, information resources, computer viruses, probabilistic encryption |
28 | William H. Cunningham |
Optimal Attach and Reinforcement of a Network |
J. ACM |
1985 |
DBLP DOI BibTeX RDF |
|
24 | Heng He, Ruixuan Li 0001, Guoqiang Gao, Zhiyong Xu 0003, Weijun Xiao |
An Integrated System Solution for Secure P2P Content Distribution Based on Network Coding. |
NAS |
2011 |
DBLP DOI BibTeX RDF |
P2P content distribution, homomorphic hash, attacker identification, network coding, pollution attacks |
24 | Yukiko Sawaya, Ayumu Kubota, Yutaka Miyake |
Detection of Attackers in Services Using Anomalous Host Behavior Based on Traffic Flow Statistics. |
SAINT |
2011 |
DBLP DOI BibTeX RDF |
flow-based attacker detection, spam mail sending hosts, botnet, DDoS attack, NetFlow |
24 | Jesus Molina, Michel Cukier |
Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
filesystem data, attacker behavior, SSH compromise, Intrusion detection systems, honeypots, empirical analysis |
24 | Martin Craig Serpell, Alistair R. Clark, Jim E. Smith, Andrea T. Staggemeier |
Pre-processing Optimisation Applied to the Classical Integer Programming Model for Statistical Disclosure Control. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
Cell Suppression Problem, Classical Model, Pre-processing Optimisation, External Attacker, Statistical Disclosure Control |
24 | Norman Pendegraft, Mark Rounds, Deborah A. Frincke |
A simulation model of IS security. |
ACM Southeast Regional Conference (2) |
2005 |
DBLP DOI BibTeX RDF |
system attacker interaction, system user interaction, simulation |
24 | Xinyu Yang, Ting Ma |
A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6. |
FGCN (1) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Vasileios Karyotis, Symeon Papavassiliou |
On the malware spreading over non-propagative wireless ad hoc networks: the attacker's perspective. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
attack strategies, malware spreading, ad hoc networks |
24 | Nikita Borisov |
An Analysis of Parallel Mixing with Attacker-Controlled Inputs. |
Privacy Enhancing Technologies |
2005 |
DBLP DOI BibTeX RDF |
|
24 | René Rydhof Hansen |
A Hardest Attacker for Leaking References. |
ESOP |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Serdar Cabuk, Carla E. Brodley, Clay Shields |
IP Covert Channel Detection. |
ACM Trans. Inf. Syst. Secur. |
2009 |
DBLP DOI BibTeX RDF |
Network covert channels, channel detection, information hiding |
21 | Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
Chernoff-Type Direct Product Theorems. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Challenge-response protocols, Parallel repetition with threshold, Direct product theorem |
21 | Jedidiah R. Crandall, John Brevik, Shaozhi Ye, Gary Wassermann, Daniela Alvim Seabra de Oliveira, Zhendong Su 0001, Shyhtsun Felix Wu, Frederic T. Chong |
Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
information theft detection, Intrusion detection, information theory, malware analysis |
21 | Yves Younan, Pieter Philippaerts, Frank Piessens, Wouter Joosen, Sven Lachmund, Thomas Walter 0001 |
Filter-resistant code injection on ARM. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
alphanumeric shellcode, filter-resistance, turing completeness |
21 | Yao Liu 0007, Michael K. Reiter, Peng Ning |
False data injection attacks against state estimation in electric power grids. |
CCS |
2009 |
DBLP DOI BibTeX RDF |
attack, power grids, state estimation |
21 | Leyla Bilge, Thorsten Strufe, Davide Balzarotti, Engin Kirda |
All your contacts are belong to us: automated identity theft attacks on social networks. |
WWW |
2009 |
DBLP DOI BibTeX RDF |
social network security, identity theft |
21 | Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka |
QR-TAN: Secure Mobile Transaction Authentication. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Jun-Won Ho, Donggang Liu, Matthew K. Wright, Sajal K. Das 0001 |
Distributed Detection of Replicas with Deployment Knowledge in Wireless Sensor Networks. |
PerCom Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Razvi Doomun, Thaier Hayajneh, Prashant Krishnamurthy, David Tipper |
SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks. |
ISCC |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Gabriel Ghinita, Maria Luisa Damiani, Claudio Silvestri, Elisa Bertino |
Preventing velocity-based linkage attacks in location-aware applications. |
GIS |
2009 |
DBLP DOI BibTeX RDF |
location-aware social networks, location privacy |
21 | Musard Balliu, Isabella Mastroeni |
A weakest precondition approach to active attacks analysis. |
PLAS |
2009 |
DBLP DOI BibTeX RDF |
robustness, non-interference, declassification, program semantics, active attackers |
21 | Danesh Irani, Steve Webb, Kang Li 0001, Calton Pu |
Large Online Social Footprints - An Emerging Threat. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Norman Pendegraft, Mark Rounds |
A Simulation of Various Variable Hacker Populations. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Lei Wang 0031, Yu Sasaki, Kazuo Sakiyama, Kazuo Ohta |
Bit-Free Collision: Application to APOP Attack. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
bit-free collision, APOP, hash function, MD5, MD4 |
21 | Ariel Futoransky, Fernando Miranda, José Ignacio Orlicki, Carlos Sarraute |
Simulating cyber-attacks for fun and profit. |
SimuTools |
2009 |
DBLP DOI BibTeX RDF |
0-day, network security, training, network simulation, vulnerability, exploit, penetration test, cyber-attack |
21 | Adedayo Adetoye, Atta Badii |
A Policy Model for Secure Information Flow. |
ARSPA-WITS |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Peng Ning, An Liu, Wenliang Du |
Mitigating DoS attacks against broadcast authentication in wireless sensor networks. |
ACM Trans. Sens. Networks |
2008 |
DBLP DOI BibTeX RDF |
security, Sensor networks, broadcast authentication, DoS attacks |
21 | H. Vicky Zhao, Wan-Yi Sabrina Lin, K. J. Ray Liu |
Game-theoretic analysis of maximum-payoff multiuser collusion. |
ICIP |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Aleksandra Korolova, Rajeev Motwani 0001, Shubha U. Nabar, Ying Xu 0002 |
Link privacy in social networks. |
CIKM |
2008 |
DBLP DOI BibTeX RDF |
link privacy, privacy in data mining, social networks, anonymization, link analysis |
21 | Cormac Herley, Dinei A. F. Florêncio |
Protecting Financial Institutions from Brute-Force Attacks. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Aleksandra Korolova, Rajeev Motwani 0001, Shubha U. Nabar, Ying Xu 0002 |
Link Privacy in Social Networks. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Steve Kremer, Antoine Mercier 0002, Ralf Treinen |
Proving Group Protocols Secure Against Eavesdroppers. |
IJCAR |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Gabriele Gianini, Ernesto Damiani |
A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study. |
Secure Data Management |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel |
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Wei He, Chunhe Xia, Haiquan Wang, Cheng Zhang, Yi Ji |
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. |
CSSE (6) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | He Wei, Chunhe Xia, Haiquan Wang, Zhang Cheng, Ji Yi |
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Gabriele Gianini, Ernesto Damiani |
Cloaking games in location based services. |
SWS |
2008 |
DBLP DOI BibTeX RDF |
game theory, location based services, k-anonymity |
21 | Francesco Regazzoni 0001, Thomas Eisenbarth 0001, Luca Breveglieri, Paolo Ienne, Israel Koren |
Can Knowledge Regarding the Presence of Countermeasures Against Fault Attacks Simplify Power Attacks on Cryptographic Devices?. |
DFT |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands 0001 |
Termination-Insensitive Noninterference Leaks More Than Just a Bit. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Anh-Quynh Nguyen, Yoshiyasu Takefuji |
A novel approach for a file-system integrity monitor tool of Xen virtual machine. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
Xen virtual machine, intrusion detection, Linux, rootkit |
21 | David J. Martin 0001, Daniel Kifer, Ashwin Machanavajjhala, Johannes Gehrke, Joseph Y. Halpern |
Worst-Case Background Knowledge for Privacy-Preserving Data Publishing. |
ICDE |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Martin Gilje Jaatun, Åsmund Ahlmann Nyre, Jan Tore Sørensen |
Survival by Deception. |
SAFECOMP |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Donggang Liu, Qi Dong 0001 |
Detecting Misused Keys in Wireless Sensor Networks. |
IPCCC |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Paul Resnick, Rahul Sami |
The influence limiter: provably manipulation-resistant recommender systems. |
RecSys |
2007 |
DBLP DOI BibTeX RDF |
manipulation-resistance, recommender system, shilling |
21 | Wil Michiels, Paul Gorissen |
Mechanism for software tamper resistance: an application of white-box cryptography. |
Digital Rights Management Workshop |
2007 |
DBLP DOI BibTeX RDF |
software tamper resistance, white-box cryptography, software protection |
21 | Ghada Alnifie, Robert Simon |
A multi-channel defense against jamming attacks in wireless sensor networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
|
21 | Russell Impagliazzo, Ragesh Jaiswal, Valentine Kabanets |
Chernoff-Type Direct Product Theorems. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1785 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|