|
Conferences in DBLP
- Umesh Shankar, Trent Jaeger, Reiner Sailer
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Doug Szajda, Michael Pohl, Jason Owen, Barry G. Lawson
Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis
Software Self-Healing Using Collaborative Application Communities. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain
Inoculating SSH Against Address Harvesting. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Ryan Gerdes, Thomas Daniels, Mani Mina, Steve Russell
Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- James Newsome, David Brumley, Dawn Xiaodong Song
Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Stephan Neuhaus, Andreas Zeller
Isolating Intrusions by Automatic Experiments. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Kevin Fu, Seny Kamara, Yoshi Kohno
Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Alex Moshchuk, Tanya Bragin, Steven D. Gribble, Henry M. Levy
A Crawler-based Study of Spyware in the Web. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- David Dagon, Cliff Zou, Wenke Lee
Modeling Botnet Propagation Using Time Zones. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz
Protocol-Independent Adaptive Replay of Application Dialog. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis
Induced Churn as Shelter from Routing-Table Poisoning. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Patrick Drew McDaniel, Shubho Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek
Enterprise Security: A Community of Interest Based Approach. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Steven M. Bellovin, Eric Rescorla
Deploying a New Hash Algorithm. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
- Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP] NDSS, 2006, pp:- [Conf]
|