The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
2009 (conf/ndss/2009)

  1. CSAR: A Practical and Provable Technique to Make Randomized Systems Accountable. [Citation Graph (, )][DBLP]

  2. Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases. [Citation Graph (, )][DBLP]

  3. Detecting Forged TCP Reset Packets. [Citation Graph (, )][DBLP]

  4. Noncespaces: Using Randomization to Enforce Information Flow Tracking and Thwart Cross-Site Scripting Attacks. [Citation Graph (, )][DBLP]

  5. Recursive DNS Architectures and Vulnerability Implications. [Citation Graph (, )][DBLP]

  6. Coordinated Scan Detection. [Citation Graph (, )][DBLP]

  7. RB-Seeker: Auto-detection of Redirection Botnets. [Citation Graph (, )][DBLP]

  8. An Efficient Black-box Technique for Defeating Web Application Attacks. [Citation Graph (, )][DBLP]

  9. Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense. [Citation Graph (, )][DBLP]

  10. RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows. [Citation Graph (, )][DBLP]

  11. Scalable, Behavior-Based Malware Clustering. [Citation Graph (, )][DBLP]

  12. IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution. [Citation Graph (, )][DBLP]

  13. Safe Passage for Passwords and Other Sensitive Data. [Citation Graph (, )][DBLP]

  14. SybilInfer: Detecting Sybil Nodes using Social Networks. [Citation Graph (, )][DBLP]

  15. The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties. [Citation Graph (, )][DBLP]

  16. Traffic Morphing: An Efficient Defense Against Statistical Traffic Analysis. [Citation Graph (, )][DBLP]

  17. Conditioned-safe Ceremonies and a User Study of an Application to Web Authentication. [Citation Graph (, )][DBLP]

  18. Analyzing and Comparing the Protection Quality of Security Enhanced Operating Systems. [Citation Graph (, )][DBLP]

  19. K-Tracer: A System for Extracting Kernel Malware Behavior. [Citation Graph (, )][DBLP]

  20. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002