The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
2004 (conf/acsac/2004)

  1. Steven B. Lipner
    The Trustworthy Computing Security Development Lifecycle. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:2-13 [Conf]
  2. Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer
    An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:16-27 [Conf]
  3. Shai Rubin, Somesh Jha, Barton P. Miller
    Automatic Generation and Analysis of NIDS Attacks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:28-38 [Conf]
  4. Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeves
    Reasoning About Complementary Intrusion Evidence. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:39-48 [Conf]
  5. Julie Thorpe, Paul C. van Oorschot
    Towards Secure Design Choices for Implementing Graphical Passwords. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:50-60 [Conf]
  6. Zhuowei Li, Amitabha Das
    Visualizing and Identifying Intrusion Context from System Calls Trace. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:61-70 [Conf]
  7. J. J. Brennan, Mindy Rudell, Donald B. Faatz, Carson Zimmerman
    Visualizing Enterprise-Wide Security (VIEWS). [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:71-79 [Conf]
  8. Martin C. Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu
    A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors). [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:82-90 [Conf]
  9. Christopher Krügel, William K. Robertson, Giovanni Vigna
    Detecting Kernel-Level Rootkits Through Binary Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:91-100 [Conf]
  10. Haizhi Xu, Wenliang Du, Steve J. Chapin
    Detecting Exploit Code Execution in Loadable Kernel Modules. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:101-110 [Conf]
  11. Marshall D. Abrams
    The Relationship of System & Product Specifications and Evaluations. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:112-113 [Conf]
  12. Ajay Gupta, Daniel C. DuVarney
    Using Predators to Combat Worms and Viruses: A Simulation-Based Study. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:116-125 [Conf]
  13. Kalyan S. Perumalla, Srikanth Sundaragopalan
    High-Fidelity Modeling of Computer Network Worms. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:126-135 [Conf]
  14. Guofei Gu, Monirul I. Sharif, Xinzhou Qin, David Dagon, Wenke Lee, George F. Riley
    Worm Detection, Early Warning and Response Based on Local Victim Information. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:136-145 [Conf]
  15. Hisashi Kojima, Ikuya Morikawa, Yuko Nakayama, Yuji Yamaoka
    Cozilet: Transparent Encapsulation to Prevent Abuse of Trusted Applets. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:146-155 [Conf]
  16. Emilie Lundin Barse, Erland Jonsson
    Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:158-167 [Conf]
  17. Jingyu Zhou, Giovanni Vigna
    Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:168-178 [Conf]
  18. Tzi-cker Chiueh, Dhruv Pilania
    Design, Implementation, and Evaluation of A Repairable Database Management System. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:179-188 [Conf]
  19. Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya
    RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:189-204 [Conf]
  20. Marvin Schaefer
    If A1 is the Answer, What was the Question? An Edgy Na?f's Retrospective on Promulgating the Trusted Computer Systems Evaluation Criteria. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:204-228 [Conf]
  21. Steven M. Bellovin
    A Look Back at "Security Problems in the TCP/IP Protocol Suite". [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:229-249 [Conf]
  22. Mudhakar Srivatsa, Ling Liu
    Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:252-261 [Conf]
  23. Ninghui Li, John C. Mitchell, Derrick Tong
    Securing Java RMI-Based Distributed Applications. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:262-271 [Conf]
  24. Nathanael Paul, David Evans
    .NET Security: Lessons Learned and Missed from Java. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:272-281 [Conf]
  25. Amit Purohit, Vishnu Navda, Tzi-cker Chiueh
    Tracing the Root of "Rootable" Processes. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:284-303 [Conf]
  26. John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian
    Open-Source Applications of TCPA Hardware. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:294-303 [Conf]
  27. Suranjan Pramanik, Vidyaraman Sankaranarayanan, Shambhu J. Upadhyaya
    Security Policies to Mitigate Insider Threat in the Document Control Domain. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:304-313 [Conf]
  28. Kulesh Shanmugasundaram, Mehdi Kharrazi, Nasir D. Memon
    Nabs: A System for Detecting Resource Abuses via Characterization of Flow Content Type. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:316-325 [Conf]
  29. Andrew H. Sung, Jianyun Xu, Patrick Chavez, Srinivas Mukkamala
    Static Analyzer of Vicious Executables (SAVE). [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:326-334 [Conf]
  30. Fu-Hau Hsu, Tzi-cker Chiueh
    CTCP: A Transparent Centralized TCP/IP Architecture for Network Security. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:335-344 [Conf]
  31. Dick Brackney, Terrance Goan, Allen Ott, Lockheed Martin
    The Cyber Enemy Within ... Countering the Threat from Malicious Insiders. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:346-347 [Conf]
  32. Steven Noel, Eric Robertson, Sushil Jajodia
    Correlating Intrusion Events and Building Attack Scenarios Through Attack Graph Distances. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:350-359 [Conf]
  33. Dingbang Xu, Peng Ning
    Alert Correlation through Triggering Events and Common Resources. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:360-369 [Conf]
  34. Xinzhou Qin, Wenke Lee
    Attack Plan Recognition and Prediction Using Causal Networks. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:370-379 [Conf]
  35. Carla Marceau, Simon N. Foley
    Themes and Highlights of the New Security Paradigms Workshop 2004. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:382-383 [Conf]
  36. Sye Loong Keoh, Emil Lupu, Morris Sloman
    PEACE: A Policy-Based Establishment of Ad-hoc Communities. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:386-395 [Conf]
  37. Ezedin Barka, Ravi S. Sandhu
    Role-Based Delegation Model/ Hierarchical Roles (RBDM1). [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:396-404 [Conf]
  38. Mohammad A. Al-Kahtani, Ravi S. Sandhu
    Mohammad A. Al-Kahtani, Ravi Sandhu. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:405-415 [Conf]
  39. Neil C. Rowe
    Designing Good Deceptions in Defense of Information Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:418-427 [Conf]
  40. Elvis Tombini, Hervé Debar, Ludovic Mé, Mireille Ducassé
    A Serial Combination of Anomaly and Misuse IDSes Applied to HTTP Traffic. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:428-437 [Conf]
  41. Alina Oprea, Dirk Balfanz, Glenn Durfee, Diana K. Smetters
    Securing a Remote Terminal Application with a Mobile Trusted Device. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2004, pp:438-447 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002