The SCEAS System
Navigation Menu

Conferences in DBLP

Annual Computer Security Applications Conference (acsac)
2008 (conf/acsac/2008)


  1. Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint. [Citation Graph (, )][DBLP]


  2. Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage. [Citation Graph (, )][DBLP]


  3. Systematic Signature Engineering by Re-use of Snort Signatures. [Citation Graph (, )][DBLP]


  4. Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window. [Citation Graph (, )][DBLP]


  5. New Side Channels Targeted at Passwords. [Citation Graph (, )][DBLP]


  6. PinUP: Pinning User Files to Known Applications. [Citation Graph (, )][DBLP]


  7. Defending Against Attacks on Main Memory Persistence. [Citation Graph (, )][DBLP]


  8. Automatic Inference and Enforcement of Kernel Data Structure Invariants. [Citation Graph (, )][DBLP]


  9. VICI Virtual Machine Introspection for Cognitive Immunity. [Citation Graph (, )][DBLP]


  10. Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. [Citation Graph (, )][DBLP]


  11. On Purely Automated Attacks and Click-Based Graphical Passwords. [Citation Graph (, )][DBLP]


  12. YAGP: Yet Another Graphical Password Strategy. [Citation Graph (, )][DBLP]


  13. Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System. [Citation Graph (, )][DBLP]


  14. Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection. [Citation Graph (, )][DBLP]


  15. ProActive Access Control for Business Process-Driven Environments. [Citation Graph (, )][DBLP]


  16. Assessing Quality of Policy Properties in Verification of Access Control Policies. [Citation Graph (, )][DBLP]


  17. Please Permit Me: Stateless Delegated Authorization in Mashups. [Citation Graph (, )][DBLP]


  18. Implementing ACL-Based Policies in XACML. [Citation Graph (, )][DBLP]


  19. Execution Trace-Driven Automated Attack Signature Generation. [Citation Graph (, )][DBLP]


  20. Improving Security Visualization with Exposure Map Filtering. [Citation Graph (, )][DBLP]


  21. Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. [Citation Graph (, )][DBLP]


  22. Host-Centric Model Checking for Network Vulnerability Analysis. [Citation Graph (, )][DBLP]


  23. The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. [Citation Graph (, )][DBLP]


  24. Permission Set Mining: Discovering Practical and Useful Roles. [Citation Graph (, )][DBLP]


  25. Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. [Citation Graph (, )][DBLP]


  26. Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. [Citation Graph (, )][DBLP]


  27. Toward Automatic Generation of Intrusion Detection Verification Rules. [Citation Graph (, )][DBLP]


  28. STILL: Exploit Code Detection via Static Taint and Initialization Analyses. [Citation Graph (, )][DBLP]


  29. McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. [Citation Graph (, )][DBLP]


  30. MalTRAK: Tracking and Eliminating Unknown Malware. [Citation Graph (, )][DBLP]


  31. Preventing Information Leaks through Shadow Executions. [Citation Graph (, )][DBLP]


  32. XSSDS: Server-Side Detection of Cross-Site Scripting Attacks. [Citation Graph (, )][DBLP]


  33. Anti-Phishing in Offense and Defense. [Citation Graph (, )][DBLP]


  34. OMOS: A Framework for Secure Communication in Mashup Applications. [Citation Graph (, )][DBLP]


  35. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. [Citation Graph (, )][DBLP]


  36. Bluetooth Network-Based Misuse Detection. [Citation Graph (, )][DBLP]


  37. Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection. [Citation Graph (, )][DBLP]


  38. Epilogue for RFC 1281, Guidelines for the Secure Operation of the Internet. [Citation Graph (, )][DBLP]


  39. The Evolution of System-Call Monitoring. [Citation Graph (, )][DBLP]


  40. PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. [Citation Graph (, )][DBLP]


  41. pwdArmor: Protecting Conventional Password-Based Authentications. [Citation Graph (, )][DBLP]


  42. DARE: A Framework for Dynamic Authentication of Remote Executions. [Citation Graph (, )][DBLP]


  43. Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography. [Citation Graph (, )][DBLP]


  44. A Survey to Guide Group Key Protocol Development. [Citation Graph (, )][DBLP]


  45. Transaction Oriented Text Messaging with Trusted-SMS. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002