The SCEAS System
Navigation Menu

Conferences in DBLP

Network and Distributed System Security Symposium (NDSS) (ndss)
2006 (conf/ndss/2006)

  1. Umesh Shankar, Trent Jaeger, Reiner Sailer
    Toward Automated Information-Flow Integrity Verification for Security-Critical Applications. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  2. Doug Szajda, Michael Pohl, Jason Owen, Barry G. Lawson
    Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  3. Michael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis
    Software Self-Healing Using Collaborative Application Communities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  4. Stuart E. Schechter, Jaeyeon Jung, Will Stockwell, Cynthia D. McLain
    Inoculating SSH Against Address Harvesting. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  5. William K. Robertson, Giovanni Vigna, Christopher Krügel, Richard A. Kemmerer
    Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  6. Ryan Gerdes, Thomas Daniels, Mani Mina, Steve Russell
    Device Identification via Analog Signal Fingerprinting: A Matched Filter Approach. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  7. James Newsome, David Brumley, Dawn Xiaodong Song
    Vulnerability-Specific Execution Filtering for Exploit Prevention on Commodity Software. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  8. Stephan Neuhaus, Andreas Zeller
    Isolating Intrusions by Automatic Experiments. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  9. Kevin Fu, Seny Kamara, Yoshi Kohno
    Key Regression: Enabling Efficient Key Distribution for Secure Distributed Storage. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  10. Keith B. Frikken, Jiangtao Li, Mikhail J. Atallah
    Trust Negotiation with Hidden Credentials, Hidden Policies, and Policy Cycles. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  11. Alex Moshchuk, Tanya Bragin, Steven D. Gribble, Henry M. Levy
    A Crawler-based Study of Spyware in the Web. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  12. David Dagon, Cliff Zou, Wenke Lee
    Modeling Botnet Propagation Using Time Zones. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  13. Weidong Cui, Vern Paxson, Nicholas Weaver, Randy H. Katz
    Protocol-Independent Adaptive Replay of Application Dialog. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  14. Tyson Condie, Varun Kacholia, Sriram Sank, Joseph M. Hellerstein, Petros Maniatis
    Induced Churn as Shelter from Routing-Table Poisoning. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  15. Patrick Drew McDaniel, Shubho Sen, Oliver Spatscheck, Jacobus E. van der Merwe, William Aiello, Charles R. Kalmanek
    Enterprise Security: A Community of Interest Based Approach. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  16. Steven M. Bellovin, Eric Rescorla
    Deploying a New Hash Algorithm. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
  17. Yi-Min Wang, Doug Beck, Xuxian Jiang, Roussi Roussev, Chad Verbowski, Shuo Chen, Samuel T. King
    Automated Web Patrol with Strider HoneyMonkeys: Finding Web Sites That Exploit Browser Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    NDSS, 2006, pp:- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002