|
Conferences in DBLP
Impeding Malware Analysis Using Conditional Code Obfuscation. [Citation Graph (, )][DBLP]
Measuring and Detecting Fast-Flux Service Networks. [Citation Graph (, )][DBLP]
Halo: High-Assurance Locate for Distributed Hash Tables. [Citation Graph (, )][DBLP]
Limits of Learning-based Signature Generation with Adversaries. [Citation Graph (, )][DBLP]
A New Privacy-Enhanced Matchmaking Protocol. [Citation Graph (, )][DBLP]
Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. [Citation Graph (, )][DBLP]
Analyzing Privacy in Enterprise Packet Trace Anonymization. [Citation Graph (, )][DBLP]
Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. [Citation Graph (, )][DBLP]
Analysis-Resistant Malware. [Citation Graph (, )][DBLP]
BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. [Citation Graph (, )][DBLP]
PRECIP: Towards Practical and Retrofittable Confidential Information Protection. [Citation Graph (, )][DBLP]
Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? [Citation Graph (, )][DBLP]
Exploiting Opportunistic Scheduling in Cellular Data Networks. [Citation Graph (, )][DBLP]
Usable PIR. [Citation Graph (, )][DBLP]
Automatic Network Protocol Analysis. [Citation Graph (, )][DBLP]
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. [Citation Graph (, )][DBLP]
Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. [Citation Graph (, )][DBLP]
Taming the Devil: Techniques for Evaluating Anonymized Network Data. [Citation Graph (, )][DBLP]
HookFinder: Identifying and Understanding Malware Hooking Behaviors. [Citation Graph (, )][DBLP]
A Tune-up for Tor: Improving Security and Performance in the Tor Network. [Citation Graph (, )][DBLP]
Automated Whitebox Fuzz Testing. [Citation Graph (, )][DBLP]
|