|
Conferences in DBLP
- Richard Ford, Sarah Gordon
Cent, five cent, ten cent, dollar: hitting botnets where it really hurts. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:3-10 [Conf]
- Michael E. Locasto, Angelos Stavrou, Angelos D. Keromytis
Dark application communities. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:11-18 [Conf]
- Carrie Gates, Carol Taylor
Challenging the anomaly detection paradigm: a provocative discussion. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:21-29 [Conf]
- Vicentiu Neagoe, Matt Bishop
Inconsistency in deception for defense. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:31-38 [Conf]
- Rick Crawford, Matt Bishop, Bhume Bhumiratana, Lisa Clark, Karl N. Levitt
Sanitization models and their limitations. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:41-56 [Conf]
- Phillip A. Porras, Vitaly Shmatikov
Large-scale collection and sanitization of network security data: risks and challenges. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:57-64 [Conf]
- Gregory J. Conti
Googling considered harmful. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:67-76 [Conf]
- Mike Bond, George Danezis
A pact with the devil. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:77-82 [Conf]
- Steven J. Greenwald
E-Prime for security: a new security paradigm. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:87-95 [Conf]
- Wei Wang, Thomas E. Daniels
Diffusion and graph spectral methods for network forensic analysis. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:99-106 [Conf]
- Peter Gutmann
PKI design for the real world. [Citation Graph (0, 0)][DBLP] NSPW, 2006, pp:109-116 [Conf]
|