The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
2006 (conf/acsac/2006)

  1. Dixie B. Baker
    Privacy and Security in Public Health: Maintaining the Delicate Balance between Personal Privacy and Population Safety. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:3-22 [Conf]
  2. Jonathan M. McCune, Trent Jaeger, Stefan Berger, Ramón Cáceres, Reiner Sailer
    Shamon: A System for Distributed Mandatory Access Control. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:23-32 [Conf]
  3. George C. Oikonomou, Jelena Mirkovic, Peter L. Reiher, Max Robinson
    A Framework for a Collaborative DDoS Defense. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:33-42 [Conf]
  4. Shiping Chen, Dongyu Liu, Songqing Chen, Sushil Jajodia
    V-COPS: A Vulnerability-Based Cooperative Alert Distribution System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:43-56 [Conf]
  5. Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian
    Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:57-66 [Conf]
  6. Dinei A. F. Florêncio, Cormac Herley
    KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:67-76 [Conf]
  7. Collin Mulliner, Giovanni Vigna
    Vulnerability Analysis of MMS User Agents. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:77-88 [Conf]
  8. Randy Smith, Cristian Estan, Somesh Jha
    Backtracking Algorithmic Complexity Attacks against a NIDS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:89-98 [Conf]
  9. Hao Wang, Somesh Jha, Vinod Ganapathy
    NetSpy: Automatic Generation of Spyware Signatures for NIDS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:99-108 [Conf]
  10. Jeffrey Horton, Reihaneh Safavi-Naini
    Detecting Policy Violations through Traffic Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:109-120 [Conf]
  11. Kyle Ingols, Richard Lippmann, Keith Piwowarski
    Practical Attack Graph Generation for Network Defense. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:121-130 [Conf]
  12. Kun Sun, Pai Peng, Peng Ning, Cliff Wang
    Secure Distributed Cluster Formation in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:131-140 [Conf]
  13. Rupinder Gill, Jason Smith, Andrew Clark
    Specification-Based Intrusion Detection in WLANs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:141-152 [Conf]
  14. Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew McDaniel
    From Languages to Systems: Understanding Practical Application Development in Security-typed Languages. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:153-164 [Conf]
  15. Aggelos Kiayias, Michael Korman, David Walluck
    An Internet Voting System Supporting User Privacy. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:165-174 [Conf]
  16. Lillian Rostad, Ole Edsberg
    A Study of Access Control Requirements for Healthcare Systems Based on Audit Trails from Access Logs. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:175-186 [Conf]
  17. Brian Witten
    Engineering Sufficiently Secure Computing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:187-202 [Conf]
  18. Philip W. L. Fong, Simon A. Orr
    A Module System for Isolating Untrusted Software Extensions. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:203-212 [Conf]
  19. Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
    How to Automatically and Accurately Sandbox Microsoft IIS. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:213-222 [Conf]
  20. Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakrishnan
    Data Sandboxing: A Technique for Enforcing Confidentiality Policies. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:223-234 [Conf]
  21. Wei Yu, Xun Wang, Prasad Calyam, Dong Xuan, Wei Zhao
    On Detecting Camouflaging Worm. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:235-244 [Conf]
  22. Guanhua Yan, Stephan Eidenbenz
    Bluetooth Worms: Models, Dynamics, and Defense Implications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:245-256 [Conf]
  23. Francis Hsu, Hao Chen, Thomas Ristenpart, Jason Li, Zhendong Su
    Back to the Future: A Framework for Automatic Malware Removal and System Repair. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:257-268 [Conf]
  24. Marco Cova, Viktoria Felmetsger, Greg Banks, Giovanni Vigna
    Static Detection of Vulnerabilities in x86 Executables. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:269-278 [Conf]
  25. Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
    Foreign Code Detection on the Windows/X86 Platform. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:279-288 [Conf]
  26. Paul Royal, Mitch Halpin, David Dagon, Robert Edmonds, Wenke Lee
    PolyUnpack: Automating the Hidden-Code Extraction of Unpack-Executing Malware. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:289-300 [Conf]
  27. Jeremy Epstein
    Fifteen Years after TX: A Look Back at High Assurance Multi-Level Secure Windowing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:301-320 [Conf]
  28. Peter G. Neumann
    Risks of Untrustworthiness. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:321-328 [Conf]
  29. Lixin Li, James E. Just, R. Sekar
    Address-Space Randomization for Windows Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:329-338 [Conf]
  30. Chongkyung Kil, Jinsuk Jun, Christopher Bookholt, Jun Xu, Peng Ning
    Address Space Layout Permutation (ASLP): Towards Fine-Grained Randomization of Commodity Software. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:339-348 [Conf]
  31. Yoav Weiss, Elena Gabriela Barrantes
    Known/Chosen Key Attacks against Software Instruction Set Randomization. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:349-360 [Conf]
  32. Frédéric Massicotte, François Gagnon, Yvan Labiche, Lionel C. Briand, Mathieu Couture
    Automatic Evaluation of Intrusion Detection Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:361-370 [Conf]
  33. Nigel Jacob, Carla E. Brodley
    Offloading IDS Computation to the GPU. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:371-380 [Conf]
  34. Ying Pan, Xuhua Ding
    Anomaly Based Web Phishing Page Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:381-392 [Conf]
  35. David Whyte, Paul C. van Oorschot, Evangelos Kranakis
    Addressing SMTP-Based Mass-Mailing Activity within Enterprise Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:393-402 [Conf]
  36. Rakeshbabu Bobba, Omid Fatemieh, Fariba Khan, Carl A. Gunter, Himanshu Khurana
    Using Attribute-Based Access Control to Enable Attribute-Based Messaging. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:403-413 [Conf]
  37. Jeff Yan, Pook Leong Cho
    Enhancing Collaborative Spam Detection with Bloom Filters. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:414-428 [Conf]
  38. Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen
    Extended Protection against Stack Smashing Attacks without Performance Loss. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:429-438 [Conf]
  39. Ashish Gehani, Surendar Chandra
    PAST: Probabilistic Authentication of Sensor Timestamps. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:439-448 [Conf]
  40. Kun Bai, Peng Liu
    Towards Database Firewall: Mining the Damage Spreading Patterns. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:449-462 [Conf]
  41. Lap-Chung Lam, Tzi-cker Chiueh
    A General Dynamic Information Flow Tracking Framework for Security Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:463-472 [Conf]
  42. Zhenghong Wang, Ruby B. Lee
    Covert and Side Channels Due to Processor Architecture. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:473-482 [Conf]
  43. Guillaume Duc, Ronan Keryell
    CryptoPage: An Efficient Secure Architecture with Memory Encryption, Integrity and Information Leakage Protection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:483-492 [Conf]
  44. Yinglian Xie, Michael K. Reiter, David R. O'Hallaron
    Protecting Privacy in Key-Value Search Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:493-504 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002