The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
2008 (conf/ndss/2008)


  1. Impeding Malware Analysis Using Conditional Code Obfuscation. [Citation Graph (, )][DBLP]


  2. Measuring and Detecting Fast-Flux Service Networks. [Citation Graph (, )][DBLP]


  3. Halo: High-Assurance Locate for Distributed Hash Tables. [Citation Graph (, )][DBLP]


  4. Limits of Learning-based Signature Generation with Adversaries. [Citation Graph (, )][DBLP]


  5. A New Privacy-Enhanced Matchmaking Protocol. [Citation Graph (, )][DBLP]


  6. Realizing Massive-Scale Conditional Access Systems Through Attribute-Based Cryptosystems. [Citation Graph (, )][DBLP]


  7. Analyzing Privacy in Enterprise Packet Trace Anonymization. [Citation Graph (, )][DBLP]


  8. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. [Citation Graph (, )][DBLP]


  9. Analysis-Resistant Malware. [Citation Graph (, )][DBLP]


  10. BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic. [Citation Graph (, )][DBLP]


  11. PRECIP: Towards Practical and Retrofittable Confidential Information Protection. [Citation Graph (, )][DBLP]


  12. Would Diversity Really Increase the Robustness of the Routing Infrastructure against Software Defects? [Citation Graph (, )][DBLP]


  13. Exploiting Opportunistic Scheduling in Cellular Data Networks. [Citation Graph (, )][DBLP]


  14. Usable PIR. [Citation Graph (, )][DBLP]


  15. Automatic Network Protocol Analysis. [Citation Graph (, )][DBLP]


  16. Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority. [Citation Graph (, )][DBLP]


  17. Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. [Citation Graph (, )][DBLP]


  18. Taming the Devil: Techniques for Evaluating Anonymized Network Data. [Citation Graph (, )][DBLP]


  19. HookFinder: Identifying and Understanding Malware Hooking Behaviors. [Citation Graph (, )][DBLP]


  20. A Tune-up for Tor: Improving Security and Performance in the Tor Network. [Citation Graph (, )][DBLP]


  21. Automated Whitebox Fuzz Testing. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002