Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
66 | Tom Chothia, Dominic Duggan |
Type-Based Distributed Access Control vs. Untyped Attackers. |
Formal Aspects in Security and Trust |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Jakob Eriksson, Michalis Faloutsos, Srikanth V. Krishnamurthy |
Routing amid Colluding Attackers. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Nicholas Weaver, Vern Paxson, Stuart Staniford, Robert K. Cunningham |
A taxonomy of computer worms. |
WORM |
2003 |
DBLP DOI BibTeX RDF |
mobile malicious code, taxonomy, motivation, attackers, computer worms |
42 | Marios Mavronicolas, Vicky Papadopoulou, Anna Philippou, Paul G. Spirakis |
A Network Game with Attackers and a Defender. |
Algorithmica |
2008 |
DBLP DOI BibTeX RDF |
Attacks and defenses, Security, Game theory, Graph theory, Nash equilibria |
42 | Sherif M. Khattab, Sameh Gobriel, Rami G. Melhem, Daniel Mossé |
Live Baiting for Service-Level DoS Attackers. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Ming-Hour Yang, Chien-Si Chiu, Shiuhpyng Shieh |
Tracing Mobile Attackers in Wireless Ad-Hoc Network. |
ICIW |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Terence K. T. Law, John C. S. Lui, David K. Y. Yau |
You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. |
IEEE Trans. Parallel Distributed Syst. |
2005 |
DBLP DOI BibTeX RDF |
attack traffic filtering, minimum stable time, DDoS attack, traceback |
42 | Shravan K. Rayanchu, Gautam Barua |
Tracing Attackers with Deterministic Edge Router Marking (DERM). |
ICDCIT |
2004 |
DBLP DOI BibTeX RDF |
|
37 | Musard Balliu, Isabella Mastroeni |
A weakest precondition approach to active attacks analysis. |
PLAS |
2009 |
DBLP DOI BibTeX RDF |
robustness, non-interference, declassification, program semantics, active attackers |
35 | Yinuo Du, Baptiste Prébot, Xiaoli Xi, Cleotilde Gonzalez |
A Cyber-War Between Bots: Human-Like Attackers are More Challenging for Defenders than Deterministic Attackers. |
HICSS |
2023 |
DBLP BibTeX RDF |
|
35 | Kelly Shortridge, Ryan Petrich |
Lamboozling Attackers: A New Generation of Deception: Software engineering teams can exploit attackers' human nature by building deception environments. |
ACM Queue |
2021 |
DBLP DOI BibTeX RDF |
|
34 | Marios Mavronicolas, Burkhard Monien, Vicky G. Papadopoulou |
How Many Attackers Can Selfish Defenders Catch? |
HICSS |
2008 |
DBLP DOI BibTeX RDF |
|
34 | K. T. Law, John C. S. Lui, David K. Y. Yau |
You Can Run, But You Can't Hide: An Effective Methodology to Traceback DDoS Attackers. |
MASCOTS |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Jing Chen, Huanguo Zhang, Junhui Hu |
An Efficiency Security Model of Routing Protocol in Wireless Sensor Networks. |
Asia International Conference on Modelling and Simulation |
2008 |
DBLP DOI BibTeX RDF |
sensor network, routing, security model |
33 | M. N. Kishore Babu, A. Antony Franklin, C. Shiv Ram Murthy |
On the prevention of collusion attack in OLSR-based Mobile Ad hoc Networks. |
ICON |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Wei Yu 0003, Zhu Ji, K. J. Ray Liu |
Securing Cooperative Ad-Hoc Networks Under Noise and Imperfect Monitoring: Strategies and Game Theoretic Analysis. |
IEEE Trans. Inf. Forensics Secur. |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Fumiaki Nagano, Kohei Tatara, Kouichi Sakurai, Toshihiro Tabata |
An Intrusion Detection System using Alteration of Data. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
Network Game with Attacker and Protector Entities. |
ISAAC |
2005 |
DBLP DOI BibTeX RDF |
|
33 | Dan Dumitriu, Edward W. Knightly, Aleksandar Kuzmanovic, Ion Stoica, Willy Zwaenepoel |
Denial-of-service resilience in peer-to-peer file sharing systems. |
SIGMETRICS |
2005 |
DBLP DOI BibTeX RDF |
file pollution, network-targeted attacks, peer-to-peer, denial of service |
33 | Roberto Giacobazzi, Isabella Mastroeni |
Abstract non-interference: parameterizing non-interference by abstract interpretation. |
POPL |
2004 |
DBLP DOI BibTeX RDF |
abstract interpretation, language-based security, non-interference, abstract domains |
29 | Bruce Schneier |
Empathy and Security. |
IEEE Secur. Priv. |
2011 |
DBLP DOI BibTeX RDF |
security, attackers, Empathy, morality |
29 | Mike Andrews, James A. Whittaker |
Computer Security. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
defense in depth, computer security, attackers, firewalls, vulnerability |
26 | Matthew Carpenter, Tom Liston, Ed Skoudis |
Hiding Virtualization from Attackers and Malware. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Karin Sallhammar, Svein J. Knapskog, Bjarne E. Helvik |
Using Stochastic Game Theory to Compute the Expected Behavior of Attackers. |
SAINT Workshops |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Juan José Salazar González |
Extending Cell Suppression to Protect Tabular Data against Several Attackers. |
Inference Control in Statistical Databases |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Tyler Moore 0001, Richard Clayton 0001 |
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. |
Financial Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Gérard Wagener, Radu State, Alexandre Dulaunoy, Thomas Engel 0001 |
Self Adaptive High Interaction Honeypots Driven by Game Theory. |
SSS |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Virginia N. L. Franqueira, Raul H. C. Lopes, Pascal van Eck |
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
hypergraph, attack graph, vulnerability assessment, network attack |
24 | Mao Lin Huang, Jie Liang 0004, Quang Vinh Nguyen |
A Visualization Approach for Frauds Detection in Financial Market. |
IV |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Ahren Studer, Adrian Perrig |
The Coremelt Attack. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Jie Yu 0008, Chengfang Fang, Liming Lu, Zhoujun Li 0001 |
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. |
Infoscale |
2009 |
DBLP DOI BibTeX RDF |
Trust, DDoS Attacks, Lightweight, Application layer |
24 | Hai Zhang, Xuyang Zhu, Wenming Guo |
TCP portscan detection based on single packet flows and entropy. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
TCP portscan, single packet flows, entropy |
24 | Jared Cordasco, Susanne Wetzel |
An attacker model for MANET routing security. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
security, routing, ad-hoc, manet, attacker model |
24 | Zhenhai Duan, Xin Yuan 0001, Jaideep Chandrashekar |
Controlling IP Spoofing through Interdomain Packet Filters. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Infrastructure Protection, Routing Protocols, BGP, DDoS, Network-level security and protection, IP Spoofing |
24 | Nan Zhang 0004, Wei Yu 0002, Xinwen Fu, Sajal K. Das 0001 |
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. |
ICPADS |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Shouhuai Xu |
Collaborative Attack vs. Collaborative Defense. |
CollaborateCom |
2008 |
DBLP DOI BibTeX RDF |
collaborative attack, collaborative defense, cyber security, cyber attack |
24 | Min Gyung Kang, Juan Caballero, Dawn Xiaodong Song |
Distributed Evasive Scan Techniques and Countermeasures. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
scan detection, distributed scanning, information-hiding, evasion |
24 | William Conner, Klara Nahrstedt |
Securing peer-to-peer media streaming systems from selfish and malicious behavior. |
Middleware (Doctoral Symposium) |
2007 |
DBLP DOI BibTeX RDF |
security, multimedia, peer-to-peer, accounting |
24 | H. Vicky Zhao, K. J. Ray Liu |
Behavior forensics for scalable multiuser collusion: fairness versus effectiveness. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
24 | H. Vicky Zhao, K. J. Ray Liu |
Traitor-Within-Traitor Behavior Forensics: Strategy and Risk Minimization. |
IEEE Trans. Inf. Forensics Secur. |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Cliff Changchun Zou, Ryan Cunningham |
Honeypot-Aware Advanced Botnet Construction and Maintenance. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Arjun Nambiar, Matthew K. Wright |
Salsa: a structured approach to large-scale anonymity. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
privacy, networks, peer-to-peer networks, anonymous communications |
24 | Linfeng Zhang, Anthony G. Persaud, Alan Johnson, Yong Guan |
Detection of stepping stone attack under delay and chaff perturbations. |
IPCCC |
2006 |
DBLP DOI BibTeX RDF |
|
24 | William Zhu 0001, Clark D. Thomborson, Fei-Yue Wang 0001 |
Applications of Homomorphic Functions to Software Obfuscation. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Shirley Gaw, Edward W. Felten |
Password management strategies for online accounts. |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
password reuse, security, survey, password, user behavior, password management |
24 | Byung Ryong Kim, Ki-Chang Kim |
A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Marina Gelastou, Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
The Power of the Defender. |
ICDCS Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Xinwen Fu, Wei Yu 0002, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham |
On Recognizing Virtual Honeypots and Countermeasures. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Marios Mavronicolas, Vicky G. Papadopoulou, Anna Philippou, Paul G. Spirakis |
A Graph-Theoretic Network Security Game. |
WINE |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Yuseung Sohn, Misung Cho, Giwon On, Kijoon Chae |
A Secure User Authentication Method in Networked Intelligent Manufacturing Systems. |
CW |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Gregory J. Conti, Kulsoom Abdullah |
Passive visual fingerprinting of network attack tools. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
application fingerprinting, network attack visualization, operating system fingerprinting, passive fingerprinting, visual fingerprinting, information visualization |
24 | Dong Yu 0001, Deborah A. Frincke |
A Novel Framework for Alert Correlation and Understanding. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam |
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. |
IPDPS |
2002 |
DBLP DOI BibTeX RDF |
attack resistant, mobile agents, intrusion detection systems, DoS attacks |
18 | Ruiliang Deng, Zongying Shi, Yisheng Zhong |
Reach-Avoid Games With Two Cooperative Attackers: Value Function and Singular Surfaces. |
IEEE Trans. Aerosp. Electron. Syst. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Hironori Uchibori, Katsunari Yoshioka, Kazumasa Omote |
Honeypot Method to Lure Attackers Without Holding Crypto-Assets. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Suman Sourav, Binbin Chen 0001 |
Exposing Hidden Attackers in Industrial Control Systems Using Micro-Distortions. |
IEEE Trans. Smart Grid |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Ruochen Tai, Liyong Lin, Rong Su 0001 |
On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. |
IEEE Trans. Autom. Control. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Kim Hammar, Rolf Stadler |
Learning Near-Optimal Intrusion Responses Against Dynamic Attackers. |
IEEE Trans. Netw. Serv. Manag. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Md Rayhanur Rahman, Setu Kumar Basak, Rezvan Mahdavi-Hezaveh, Laurie A. Williams |
Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Hangsheng Zhang, Jiqiang Liu, Jinsong Dong |
CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Gideon Samid |
Finite Key OTP Functionality: Ciphers That Hold Off Attackers Smarter Than Their Designers. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
18 | Davinder Kaur, Suleyman Uslu, Mimoza Durresi, Arjan Durresi |
Artificial intelligence control for trust-based detection of attackers in 5G social networks. |
Comput. Intell. |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Palvi Aggarwal, Saeefa Rubaiyet Nowmi, Yinuo Du, Cleotilde Gonzalez |
Evidence of Cognitive Biases in Cyber Attackers from An Empirical Study. |
HICSS |
2024 |
DBLP BibTeX RDF |
|
18 | Haoxiang Ma, Shuo Han 0002, Charles A. Kamhoua, Jie Fu |
Optimizing Sensor Allocation Against Attackers With Uncertain Intentions: A Worst-Case Regret Minimization Approach. |
IEEE Control. Syst. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Amith Manoharan, P. B. Sujit |
NMPC-Based Cooperative Strategy to Lure Two Attackers Into Collision by Two Targets. |
IEEE Control. Syst. Lett. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yuanhua Fu, Zhiming He |
Massive SSDF Attackers Identification in Cognitive Radio Networks by Using Consistent Property. |
IEEE Trans. Veh. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Sandeep Patil, Lalita Admuthe, Meenakshi R. Patil |
SNTAM: secure neuro-fuzzy-based trusted neighbour selection and attackers detection in multipath ad-hoc network. |
Int. J. Internet Protoc. Technol. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Li Liang, Jianan Wang, Fang Deng |
Targets-Attackers-Defenders Game via Pairwise Outcomes. |
Unmanned Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xuewen Dong, Yuanyu Zhang, Yuanxiong Guo, Yanmin Gong 0001, Yulong Shen, Jianfeng Ma 0001 |
PRAM: A Practical Sybil-Proof Auction Mechanism for Dynamic Spectrum Access With Untruthful Attackers. |
IEEE Trans. Mob. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Yufeng Cai, Wenya Wang, Yicong Chen, Haijun Tan, Ning Xie 0007, Jiangzhou Wang |
Multiple Cooperative Attackers for Tag-Based Physical Layer Authentication. |
IEEE Commun. Mag. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | S. Lakshmi, E. A. Mary Anita, J. Jenefa |
A Hybrid Approach Against Black Hole Attackers Using Dynamic Threshold Value and Node Credibility. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Chaoqun Yang, Lei Mo, Xianghui Cao, Heng Zhang 0001, Zhiguo Shi 0001 |
A Labeled RFS-Based Framework for Multiple Integrity Attackers Detection and Identification in Cyber-Physical Systems. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | P. S. Nandhini, S. Kuppuswami, Subramaniam Malliga, R. Devi Priya |
Enhanced Rank Attack Detection Algorithm (E-RAD) for securing RPL-based IoT networks by early detection and isolation of rank attackers. |
J. Supercomput. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mana Azamat, Johann Schütz, Mathias Uslar |
Use cases also exist for attackers - how to foster the concept of misuse cases. |
Elektrotech. Informationstechnik |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Cong Zhang, Jie Wang 0047, Qingchen Liu, Weiming Fu, Wei Xing Zheng 0001 |
Optimal power control for sensors and DoS attackers over a fading channel network. |
J. Frankl. Inst. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ruochen Tai, Liyong Lin, Rong Su 0001 |
Synthesis of optimal covert sensor-actuator attackers for discrete-event systems. |
Autom. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Kim Hammar, Rolf Stadler |
Learning Near-Optimal Intrusion Responses Against Dynamic Attackers. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Lei Yuan, Ziqian Zhang, Ke Xue 0001, Hao Yin, Feng Chen 0042, Cong Guan, Lihe Li, Chao Qian 0001, Yang Yu 0001 |
Robust multi-agent coordination via evolutionary generation of auxiliary adversarial attackers. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Keane Lucas, Matthew Jagielski, Florian Tramèr, Lujo Bauer, Nicholas Carlini |
Randomness in ML Defenses Helps Persistent Attackers and Hinders Evaluators. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Cansu Dogan, Selim Yilmaz, Sevil Sen |
Assessing the Impact of Mobile Attackers on RPL-based Internet of Things. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xuandong Zhao, Kexun Zhang, Yu-Xiang Wang 0003, Lei Li 0005 |
Generative Autoencoders as Watermark Attackers: Analyses of Vulnerabilities and Threats. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hanyang Hu, Minh Bui, Mo Chen |
Multi-Agent Reach-Avoid Games: Two Attackers Versus One Defender and Mixed Integer Programming. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Suman Sourav, Binbin Chen 0001 |
Exposing Hidden Attackers in Industrial Control Systems using Micro-distortions. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Puning Zhao, Zhiguo Wan |
High Dimensional Distributed Gradient Descent with Arbitrary Number of Byzantine Attackers. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rong Du, Qingqing Ye 0001, Yue Fu, Haibo Hu 0001, Jin Li 0002, Chengfang Fang, Jie Shi |
Differential Aggregation against General Colluding Attackers. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Haoxiang Ma, Shuo Han 0002, Charles A. Kamhoua, Jie Fu |
Optimizing Sensor Allocation against Attackers with Uncertain Intentions: A Worst-Case Regret Minimization Approach. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Ruochen Tai, Liyong Lin, Rong Su 0001 |
On Decidability of Existence of Fortified Supervisors Against Covert Actuator Attackers. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams |
What Are the Attackers Doing Now? Automating Cyberthreat Intelligence Extraction from Text on Pace with the Changing Threat Landscape: A Survey. |
ACM Comput. Surv. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Fengxiang Yang, Juanjuan Weng, Zhun Zhong, Hong Liu 0009, Zheng Wang 0007, Zhiming Luo, Donglin Cao, Shaozi Li, Shin'ichi Satoh 0001, Nicu Sebe |
Towards Robust Person Re-Identification by Defending Against Universal Attackers. |
IEEE Trans. Pattern Anal. Mach. Intell. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mary Ellen Zurko |
Unusable Security for Attackers [From the Editors]. |
IEEE Secur. Priv. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Chan Dai Truyen Thai, Thanh T. Tran, De-Thu Huynh |
Secure and opportunistic communication with interference cancellation against powerful and full-duplex attackers. |
Wirel. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Eric Dubois 0004, Ashley Peper, Laura A. Albert |
Interdicting Attack Plans with Boundedly Rational Players and Multiple Attackers: An Adversarial Risk Analysis Approach. |
Decis. Anal. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Gaoxin Qi, Jichao Li, Chi Xu, Gang Chen, Kewei Yang |
Attack-Defense Game Model with Multi-Type Attackers Considering Information Dilemma. |
Entropy |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Xu An Wang 0001, Lunhai Pan, Hao Liu, Xiaoyuan Yang 0002 |
Traitor Tracing Revisited: New Attackers, Stronger Security Model and New Construction. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
18 | Yaoqi Yang, Xianglin Wei, Renhui Xu, Weizheng Wang, Laixian Peng, Yangang Wang |
Jointly beam stealing attackers detection and localization without training: an image processing viewpoint. |
Frontiers Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Cathryn Peoples, Adrian Moore 0001, Nektarios Georgalas |
The Design of Ethical Service-Level Agreements to Protect Cyber Attackers and Attackees. |
Emerging Trends in Cybersecurity Applications |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Torsten Krauß, Alexandra Dmitrienko |
MESAS: Poisoning Defense for Federated Learning Resilient against Adaptive Attackers. |
CCS |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Rong Du, Qingqing Ye 0001, Yue Fu, Haibo Hu 0001, Jin Li 0002, Chengfang Fang, Jie Shi |
Differential Aggregation against General Colluding Attackers. |
ICDE |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Stanislava Ivanova, Naghmeh Moradpoor |
Fake PLC in the Cloud, We Thought the Attackers Believed that: How ICS Honeypot Deception Gets Impacted by Cloud Deployments? |
WFCS |
2023 |
DBLP DOI BibTeX RDF |
|
18 | He Zhu, Ce Li, Haitian Yang, Yan Wang 0081, Weiqing Huang |
Prompt Makes mask Language Models Better Adversarial Attackers. |
ICASSP |
2023 |
DBLP DOI BibTeX RDF |
|