|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 93 occurrences of 75 keywords
|
|
|
Results
Found 340 publication records. Showing 340 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
137 | Mitsuho Tahara, Naoki Tateishi, Toshio Oimatsu, Souhei Majima |
A Method to Detect Prefix Hijacking by Using Ping Tests. |
APNOMS |
2008 |
DBLP DOI BibTeX RDF |
Prefix Hijacking, Ping Test, Border Gateway Protocol (BGP) |
137 | Hitesh Ballani, Paul Francis, Xinyang Zhang |
A study of prefix hijacking and interception in the internet. |
SIGCOMM |
2007 |
DBLP DOI BibTeX RDF |
hijacking, routing, BGP, interception |
133 | Fernando Sanchez, Zhenhai Duan |
Region-based BGP announcement filtering for improved BGP security. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
BGP security, network prefix hijacking, BGP |
105 | Seong-Cheol Hong, Hong-Taek Ju, James W. Hong |
IP Prefix Hijacking Detection Using Idle Scan. |
APNOMS |
2009 |
DBLP DOI BibTeX RDF |
IP Prefix Hijacking, Security, Routing, BGP |
94 | Na Wang, Yingjian Zhi, Binqiang Wang |
AT: An Origin Verification Mechanism Based on Assignment Track for Securing BGP. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
86 | Changxi Zheng, Lusheng Ji, Dan Pei, Jia Wang 0001, Paul Francis |
A light-weight distributed scheme for detecting ip prefix hijacks in real-time. |
SIGCOMM |
2007 |
DBLP DOI BibTeX RDF |
hijacking, routing, detection, BGP, interception |
82 | Victor C. Zandy, Barton P. Miller, Miron Livny |
Process Hijacking. |
HPDC |
1999 |
DBLP DOI BibTeX RDF |
|
82 | Oliver Zheng, Jason Poon, Konstantin Beznosov |
Application-based TCP hijacking. |
EUROSEC |
2009 |
DBLP DOI BibTeX RDF |
TCP hijacking, Windows Live Messenger, application protocols, application-based TCP hijacking, packet injection |
79 | Laura Dugan, Gary LaFree, Alex R. Piquero |
Testing a Rational Choice Model of Airline Hijackings. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
66 | Xin Hu, Zhuoqing Morley Mao |
Accurate Real-time Identification of IP Prefix Hijacking. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
63 | Alexey Smirnov 0001, Tzi-cker Chiueh |
Automatic Patch Generation for Buffer Overflow Attacks. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
58 | Young-joo Chung, Masashi Toyoda, Masaru Kitsuregawa |
Detecting Link Hijacking by Web Spammers. |
PAKDD |
2009 |
DBLP DOI BibTeX RDF |
Link hijacking, Information retrieval, Link analysis, Web spam |
58 | Toshimitsu Ooshima, Mitsuho Tahara, Ritsu Kusaba, Souhei Majima, Satoshi Tajima, Yoshinori Kawamura, Ryousuke Narita |
A Study of Recovering from Communication Failure Caused by Route Hijacking. |
APNOMS |
2007 |
DBLP DOI BibTeX RDF |
route hijacking, communication recovery, BGP |
55 | Kuan-Ta Chen, Li-Wen Hong |
User identification based on game-play activity patterns. |
NETGAMES |
2007 |
DBLP DOI BibTeX RDF |
account hijacking, biometrical signatures, online games, user behavior, Kullback-Leibler divergence |
50 | Zheng Zhang 0009, Ying Zhang 0022, Y. Charlie Hu, Zhuoqing Morley Mao |
Practical defenses against BGP prefix hijacking. |
CoNEXT |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Rupinder Gill, Jason Smith 0001, Andrew J. Clark |
Experiences in passively detecting session hijacking attacks in IEEE 802.11 networks. |
ACSW |
2006 |
DBLP BibTeX RDF |
session hi-jacking, wireless intrusion detection, round trip time, received signal strength, passive monitoring |
47 | Martin Johns |
SessionSafe: Implementing XSS Immune Session Handling. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Lap-Chung Lam, Tzi-cker Chiueh |
Automatic Extraction of Accurate Application-Specific Sandboxing Policy. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
system call graph, non-deterministic finite state automaton, intrusion detection, sandboxing, mimicry attack |
38 | Pan Wang, Xuejiao Chen |
Co Hijacking Monitor: Collaborative Detecting and Locating Mechanism for HTTP Spectral Hijacking. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
38 | Ming Yuan, Ye Li, Zhoujun Li 0001 |
Hijacking Your Routers via Control-Hijacking URLs in Embedded Devices with Web Interfaces. |
ICICS |
2017 |
DBLP DOI BibTeX RDF |
|
35 | Daniela Alvim Seabra de Oliveira, Jedidiah R. Crandall, Gary Wassermann, Shaozhi Ye, Shyhtsun Felix Wu, Zhendong Su 0001, Frederic T. Chong |
Bezoar: Automated virtual machine-based full-system recovery from control-flow hijacking attacks. |
NOMS |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Mohammad Mannan, Paul C. van Oorschot |
Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer. |
Financial Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
31 | Lap-Chung Lam, Wei Li 0020, Tzi-cker Chiueh |
Accurate and Automated System Call Policy-Based Intrusion Prevention. |
DSN |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Nai Xia, Bing Mao, Qingkai Zeng 0002, Li Xie 0001 |
Efficient and Practical Control Flow Monitoring for Program Security. |
ASIAN |
2006 |
DBLP DOI BibTeX RDF |
Program Vulnerability, Source Code Instrumentation, Static Analysis, Control Flow, Dynamic Profiling |
31 | Kirill Levchenko, Ramamohan Paturi, George Varghese |
On the difficulty of scalably detecting network attacks. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
communication complexity, network intrusion detection |
23 | Anne M. Payton |
A review of spyware campaigns and strategies to combat them. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
browser hijacking, deceptive installations, dialers, false anti-spyware, keyloggers, pop-unders, popups, spyware distributors, web beacons, online advertisers, cookies, spyware, bundling, drive-by downloads, adware |
23 | Marcelo Bagnulo, Alberto García-Martínez, Arturo Azcorra |
Efficient security for IPv6 multihoming. |
Comput. Commun. Rev. |
2005 |
DBLP DOI BibTeX RDF |
hijacking protection, IPv6, multihoming |
23 | Elias Levy |
Interface Illusions. |
IEEE Secur. Priv. |
2004 |
DBLP DOI BibTeX RDF |
Web browser attacks, address-bar spoofing, XUL attacks, hijacking, GUI, attacks, event models |
23 | Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Lixia Zhang 0001 |
Protecting BGP Routes to Top-Level DNS Servers. |
IEEE Trans. Parallel Distributed Syst. |
2003 |
DBLP DOI BibTeX RDF |
DNS infrastructure protection, route hijacking, BGP path filtering, Fault-tolerance |
23 | Lan Wang, Xiaoliang Zhao, Dan Pei, Randy Bush, Daniel Massey, Allison Mankin, Shyhtsun Felix Wu, Lixia Zhang 0001 |
Protecting BGP Routes to Top Level DNS Servers. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
DNS infrastructure protection, route hijacking, BGP path filtering, fault-tolerance |
19 | Muteeb Bin Muzammil, Muhammad Bilal 0006, Sahar Ajmal, Sandile Charles Shongwe, Yazeed Yasin Ghadi |
Unveiling Vulnerabilities of Web Attacks Considering Man in the Middle Attack and Session Hijacking. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Sune Dueholm Müller, Johan Ivar Sæbø |
The 'hijacking' of the Scandinavian Journal of Information Systems: Implications for the information systems community. |
Inf. Syst. J. |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Yassine Mekdad, Abbas Acar, Ahmet Aris, Abdeslam El Fergougui, Mauro Conti, Riccardo Lazzeretti, A. Selcuk Uluagac |
Exploring Jamming and Hijacking Attacks for Micro Aerial Drones. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Yunjie Ge, Qian Wang, Huayang Huang, Qi Li 0002, Cong Wang, Chao Shen, Lingchen Zhao, Peipei Jiang, Zheng Fang, Shenyi Zhang |
Hijacking Attacks against Neural Networks by Analyzing Training Data. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Zhuolin Yang, Cathy Yuanchen Li, Arman Bhalla, Ben Y. Zhao, Haitao Zheng 0001 |
Inception Attacks: Immersive Hijacking in Virtual Reality Systems. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Ziqiang Wang, Xuewei Feng, Qi Li 0002, Kun Sun, Yuxiang Yang, Mengyuan Li, Ke Xu 0002, Jianping Wu |
Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Kenta Nakashima, Michiko Harayama, Miwako Mishima |
Detection of BGP Hijacking based on AS Hegemony. |
ICEIC |
2024 |
DBLP DOI BibTeX RDF |
|
19 | Pedro Fernández-Álvarez, Ricardo J. Rodríguez |
Module extraction and DLL hijacking detection via single or multiple memory dumps. |
Forensic Sci. Int. Digit. Investig. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Sune Dueholm Müller, Anna Abalkina |
The Hijacking of the Scandinavian Journal of Information Systems. Reflections and commentary. |
Scand. J. Inf. Syst. |
2023 |
DBLP BibTeX RDF |
|
19 | Taahir Aiyoob Patel, Clement N. Nyirenda |
Semi-Supervised Anomaly Detection for the Determination of Vehicle Hijacking Tweets. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Wai Man Si, Michael Backes 0001, Yang Zhang 0016, Ahmed Salem 0001 |
Two-in-One: A Model Hijacking Attack Against Text Generation Models. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Ka Ho Chow, Ling Liu 0001, Wenqi Wei, Fatih Ilhan, Yanzhao Wu 0001 |
STDLens: Model Hijacking-Resilient Federated Learning for Object Detection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Joonhyun Jeong |
Hijacking Context in Large Multi-modal Models. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Derry Pratama, Jaegeun Moon, Agus Mahardika Ari Laksmono, Dongwook Yun, Iqbal Muhammad, Byeonguk Jeong, Janghyun Ji, Howon Kim 0001 |
Behind The Wings: The Case of Reverse Engineering and Drone Hijacking in DJI Enhanced Wi-Fi Protocol. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Ege Erdogan, Unat Teksen, Mehmet Salih Celiktenyildiz, Alptekin Küpçü, A. Ercüment Çiçek |
Defense Mechanisms Against Training-Hijacking Attacks in Split Learning. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yao Qiang, Xiangyu Zhou, Dongxiao Zhu |
Hijacking Large Language Models via Adversarial In-Context Learning. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yunlong Mao, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong 0002 |
Secure Split Learning against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Pu Sun, Sen Chen 0001, Lingling Fan 0003, Pengfei Gao, Fu Song, Min Yang |
VenomAttack: automated and adaptive activity hijacking in Android. |
Frontiers Comput. Sci. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Ala Altaweel, Radu Stoleru, Guofei Gu, Arnab Kumar Maity, Suman Bhunia |
On Detecting Route Hijacking Attack in Opportunistic Mobile Networks. |
IEEE Trans. Dependable Secur. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Felix Stöger, Anxin Zhou, Huayi Duan, Adrian Perrig |
Demystifying Web3 Centralization: The Case of Off-Chain NFT Hijacking. |
FC |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Pietro Spadaccino, Sara Bruzzese, Francesca Cuomo, Flavio Luciani |
Analysis and emulation of BGP hijacking events. |
NOMS |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Jun He, Yahui Li, Han Zhang 0009, Ming Wang, Changqing An, Jilong Wang 0001 |
Be Careful of Your Neighbors: Injected Sub-Prefix Hijacking Invisible to Public Monitors. |
ICC |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Xuewei Feng, Qi Li 0002, Kun Sun 0001, Yuxiang Yang, Ke Xu 0002 |
Traffic Hijacking in Wi-Fi Networks via ICMP Redirects. |
ACM TUR-C |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Wai Man Si, Michael Backes 0001, Yang Zhang 0016, Ahmed Salem 0001 |
Two-in-One: A Model Hijacking Attack Against Text Generation Models. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
19 | Elias Heftrig, Haya Schulmann, Michael Waidner |
Downgrading DNSSEC: How to Exploit Crypto Agility for Hijacking Signed Zones. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
19 | Komail Dharsee, John Criswell |
Jinn: Hijacking Safe Programs with Trojans. |
USENIX Security Symposium |
2023 |
DBLP BibTeX RDF |
|
19 | Jiayun Fu, Xiaojing Ma 0002, Bin B. Zhu, Pingyi Hu, Ruixin Zhao, Yaru Jia, Peng Xu 0003, Hai Jin 0001, Dongmei Zhang 0001 |
Focusing on Pinocchio's Nose: A Gradients Scrutinizer to Thwart Split-Learning Hijacking Attacks Using Intrinsic Attributes. |
NDSS |
2023 |
DBLP BibTeX RDF |
|
19 | Zixuan Wu, Sean Charles Ye, Byeolyi Han, Matthew C. Gombolay |
Hijacking Robot Teams Through Adversarial Communication. |
CoRL |
2023 |
DBLP BibTeX RDF |
|
19 | Seungchan Woo, Jaehyoung Park, Soonhong Kwon, Kyungmin Park, Jonghyun Kim, Jong-Hyouk Lee |
Simulation of Data Hijacking Attacks for a 5G-Advanced Core Network. |
EuCNC/6G Summit |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Alessandro Bertani, Marco Bonelli, Lorenzo Binosi, Michele Carminati, Stefano Zanero, Mario Polino |
Untangle: Aiding Global Function Pointer Hijacking for Post-CET Binary Exploitation. |
DIMVA |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Ka Ho Chow, Ling Liu 0001, Wenqi Wei, Fatih Ilhan, Yanzhao Wu 0001 |
STDLens: Model Hijacking-Resilient Federated Learning for Object Detection. |
CVPR |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Eric Bergen, Daniel Lukaszewski, Geoffrey G. Xie |
Data Exfiltration via Flow Hijacking at the Socket Layer. |
HICSS |
2023 |
DBLP BibTeX RDF |
|
19 | Cyril Li, Christophe Ducottet, Sylvain Desroziers, Maxime Moreaud |
Less-than-One Shot 3D Segmentation Hijacking a Pre-trained Space-Time Memory Network. |
ACIVS |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Yunlong Mao, Zexi Xin, Zhenyu Li, Jue Hong, Qingyou Yang, Sheng Zhong 0002 |
Secure Split Learning Against Property Inference, Data Reconstruction, and Feature Space Hijacking Attacks. |
ESORICS (4) |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Antonin Verdier, Romain Laborde, Mohamed Ali Kandi, Abdelmalek Benzekri |
A SLAHP in the Face of DLL Search Order Hijacking. |
UbiSec |
2023 |
DBLP DOI BibTeX RDF |
|
19 | Anne Gerdes |
The tech industry hijacking of the AI ethics research agenda and why we should reclaim it. |
Discov. Artif. Intell. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Man Zeng, Xiaohong Huang, Pei Zhang 0003, Dandan Li |
Understanding the impact of outsourcing mitigation against BGP prefix hijacking. |
Comput. Networks |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Jiadai Wang, Jiajia Liu 0001 |
Location Hijacking Attack in Software-Defined Space-Air-Ground-Integrated Vehicular Network. |
IEEE Internet Things J. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Petter Solnør, Øystein Volden, Kristoffer Gryte, Slobodan Petrovic, Thor I. Fossen |
Hijacking of unmanned surface vehicles: A demonstration of attacks and countermeasures in the field. |
J. Field Robotics |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Xuewei Feng, Qi Li 0002, Kun Sun 0001, Chuanpu Fu, Ke Xu 0002 |
Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID. |
IEEE/ACM Trans. Netw. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Tal Shapira, Yuval Shavitt |
AP2Vec: An Unsupervised Approach for BGP Hijacking Detection. |
IEEE Trans. Netw. Serv. Manag. |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Grzegorz Gawron, Philip Stubbings |
Feature Space Hijacking Attacks against Differentially Private Split Learning. |
CoRR |
2022 |
DBLP BibTeX RDF |
|
19 | Taahir Aiyoob Patel, Clement N. Nyirenda |
A Twitter-Driven Deep Learning Mechanism for the Determination of Vehicle Hijacking Spots in Cities. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Yiwei Zhang, Siqi Ma, Tiancheng Chen, Juanru Li, Robert H. Deng, Elisa Bertino |
EvilScreen Attack: Smart TV Hijacking via Multi-channel Remote Control Mimicry. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Weimin Lyu, Songzhu Zheng, Tengfei Ma 0001, Haibin Ling, Chao Chen 0012 |
Attention Hijacking in Trojan Transformers. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Raymond Muller, Yanmao Man, Z. Berkay Celik, Ming Li 0003, Ryan M. Gerdes |
Physical Hijacking Attacks against Object Trackers. |
CCS |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Martin Fejrskov, Jens Myrup Pedersen, Emmanouil Vasilomanolakis |
Detecting DNS hijacking by using NetFlow data. |
CNS |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek |
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. |
WPES@CCS |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Aversa Prentosito, McKenna Skoczen, Lauren Kahrs, Suman Bhunia |
Case Study on a Session Hijacking Attack: The 2021 CVS Health Data Breach. |
MobiWIS |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Lancheng Qin, Dan Li, Ruifeng Li, Kang Wang |
Themis: Accelerating the Detection of Route Origin Hijacking by Distinguishing Legitimate and Illegitimate MOAS. |
USENIX Security Symposium |
2022 |
DBLP BibTeX RDF |
|
19 | Xianbo Wang, Shangcheng Shi, Yikang Chen, Wing Cheong Lau |
PHYjacking: Physical Input Hijacking for Zero-Permission Authorization Attacks on Android. |
NDSS |
2022 |
DBLP BibTeX RDF |
|
19 | Ahmed Salem 0001, Michael Backes 0001, Yang Zhang 0016 |
Get a Model! Model Hijacking Attack Against Machine Learning Models. |
NDSS |
2022 |
DBLP BibTeX RDF |
|
19 | Ali Akbar Mohammadi, Rasheed Hussain, Alma Oracevic, Syed Muhammad Ahsan Raza Kazmi, Fatima Hussain, Moayad Aloqaily, Junggab Son |
A Novel TCP/IP Header Hijacking Attack on SDN. |
INFOCOM Workshops |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Christopher Faircloth, Gavin Hartzell, Nathan Callahan, Suman Bhunia |
A Study on Brute Force Attack on T-Mobile Leading to SIM-Hijacking and Identity-Theft. |
AIIoT |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Junya Huang, Zhihua Liu, Zhongmin Zheng, Xuan Wei, Man Li, Man Jia |
Research and Development of Intelligent Protection Capabilities Against Internet Routing Hijacking and Leakage. |
AIIPCC |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Wei Ling Cheah, Hui Na Chua |
Detection of Social Media Hashtag Hijacking Using Dictionary-based and Machine Learning Methods. |
IICAIET |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Kabid Hassan Shibly, Md Delwar Hossain, Hiroyuki Inoue, Yuzo Taenaka, Youki Kadobayashi |
Autonomous Driving Model Defense Study on Hijacking Adversarial Attack. |
ICANN (4) |
2022 |
DBLP DOI BibTeX RDF |
|
19 | John Dorsch |
Hijacking Epistemic Agency: How Emerging Technologies Threaten our Wellbeing as Knowers. |
AIES |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Gautam Akiwate, Raffaele Sommese, Mattijs Jonker, Zakir Durumeric, kc claffy, Geoffrey M. Voelker, Stefan Savage |
Retroactive identification of targeted DNS infrastructure hijacking. |
IMC |
2022 |
DBLP DOI BibTeX RDF |
|
19 | Pang-Wei Tsai, Aris Cahyadi Risdianto, Meng Hui Choi, Satis Kumar Permal, Teck Chaw Ling |
SD-BROV: An Enhanced BGP Hijacking Protection with Route Validation in Software-Defined eXchange. |
Future Internet |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Qing-Yi Fu, Hui-Ming Wang 0001 |
Detection of Hijacking DDoS Attack Based on Air Interface Traffic. |
IEEE Wirel. Commun. Lett. |
2021 |
DBLP DOI BibTeX RDF |
|
19 | I Wayan Budi Sentana, Muhammad Ikram 0001, Mohamed Ali Kâafar |
BlockJack: Towards Improved Prevention of IP Prefix Hijacking Attacks in Inter-Domain Routing Via Blockchain. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Igor Korkin |
Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Pavlos Sermpezis, Vasileios Kotronis, Konstantinos Arakadakis, Athena Vakali |
Estimating the Impact of BGP Prefix Hijacking. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Ahmed Salem 0001, Michael Backes 0001, Yang Zhang 0016 |
Get a Model! Model Hijacking Attack Against Machine Learning Models. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek |
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
19 | Igor Korkin |
Windows Kernel Hijacking Is Not an Option: MemoryRanger Comes to the Rescue Again. |
J. Digit. Forensics Secur. Law |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Adi Farshteindiker, Rami Puzis |
Leadership Hijacking in Docker Swarm and Its Consequences. |
Entropy |
2021 |
DBLP DOI BibTeX RDF |
|
19 | Ege Erdogan, Alptekin Küpçü, A. Ercüment Çiçek |
SplitGuard: Detecting and Mitigating Training-Hijacking Attacks in Split Learning. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
19 | Christos Lyvas, Costas Lambrinoudakis, Dimitris Geneiatakis |
On Android's activity hijacking prevention. |
Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 340 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ >>] |
|