|
Conferences in DBLP
Data Space Randomization. [Citation Graph (, )][DBLP]
XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. [Citation Graph (, )][DBLP]
VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. [Citation Graph (, )][DBLP]
Dynamic Binary Instrumentation-Based Framework for Malware Defense. [Citation Graph (, )][DBLP]
Embedded Malware Detection Using Markov n-Grams. [Citation Graph (, )][DBLP]
Learning and Classification of Malware Behavior. [Citation Graph (, )][DBLP]
On Race Vulnerabilities in Web Applications. [Citation Graph (, )][DBLP]
On the Limits of Information Flow Techniques for Malware Analysis and Containment. [Citation Graph (, )][DBLP]
Expanding Malware Defense by Securing Software Installations. [Citation Graph (, )][DBLP]
FluXOR: Detecting and Monitoring Fast-Flux Service Networks. [Citation Graph (, )][DBLP]
Traffic Aggregation for Malware Detection. [Citation Graph (, )][DBLP]
The Contact Surface: A Technique for Exploring Internet Scale Emergent Behaviors. [Citation Graph (, )][DBLP]
The Quest for Multi-headed Worms. [Citation Graph (, )][DBLP]
A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems. [Citation Graph (, )][DBLP]
|