|
Conferences in DBLP
Structuring for Strategic Cyber Defense: A Cyber Manhattan Project Blueprint. [Citation Graph (, )][DBLP]
Practical Applications of Bloom Filters to the NIST RDS and Hard Drive Triage. [Citation Graph (, )][DBLP]
Systematic Signature Engineering by Re-use of Snort Signatures. [Citation Graph (, )][DBLP]
Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window. [Citation Graph (, )][DBLP]
New Side Channels Targeted at Passwords. [Citation Graph (, )][DBLP]
PinUP: Pinning User Files to Known Applications. [Citation Graph (, )][DBLP]
Defending Against Attacks on Main Memory Persistence. [Citation Graph (, )][DBLP]
Automatic Inference and Enforcement of Kernel Data Structure Invariants. [Citation Graph (, )][DBLP]
VICI Virtual Machine Introspection for Cognitive Immunity. [Citation Graph (, )][DBLP]
Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense. [Citation Graph (, )][DBLP]
On Purely Automated Attacks and Click-Based Graphical Passwords. [Citation Graph (, )][DBLP]
YAGP: Yet Another Graphical Password Strategy. [Citation Graph (, )][DBLP]
Privacy-Aware Biometrics: Design and Implementation of a Multimodal Verification System. [Citation Graph (, )][DBLP]
Improving the Efficiency of Capture-Resistant Biometric Authentication Based on Set Intersection. [Citation Graph (, )][DBLP]
ProActive Access Control for Business Process-Driven Environments. [Citation Graph (, )][DBLP]
Assessing Quality of Policy Properties in Verification of Access Control Policies. [Citation Graph (, )][DBLP]
Please Permit Me: Stateless Delegated Authorization in Mashups. [Citation Graph (, )][DBLP]
Implementing ACL-Based Policies in XACML. [Citation Graph (, )][DBLP]
Execution Trace-Driven Automated Attack Signature Generation. [Citation Graph (, )][DBLP]
Improving Security Visualization with Exposure Map Filtering. [Citation Graph (, )][DBLP]
Attack Grammar: A New Approach to Modeling and Analyzing Network Attack Sequences. [Citation Graph (, )][DBLP]
Host-Centric Model Checking for Network Vulnerability Analysis. [Citation Graph (, )][DBLP]
The Role Hierarchy Mining Problem: Discovery of Optimal Role Hierarchies. [Citation Graph (, )][DBLP]
Permission Set Mining: Discovering Practical and Useful Roles. [Citation Graph (, )][DBLP]
Enforcing Role-Based Access Control Policies in Web Services with UML and OCL. [Citation Graph (, )][DBLP]
Addressing Low Base Rates in Intrusion Detection via Uncertainty-Bounding Multi-Step Analysis. [Citation Graph (, )][DBLP]
Toward Automatic Generation of Intrusion Detection Verification Rules. [Citation Graph (, )][DBLP]
STILL: Exploit Code Detection via Static Taint and Initialization Analyses. [Citation Graph (, )][DBLP]
McBoost: Boosting Scalability in Malware Collection and Analysis Using Statistical Classification of Executables. [Citation Graph (, )][DBLP]
MalTRAK: Tracking and Eliminating Unknown Malware. [Citation Graph (, )][DBLP]
Preventing Information Leaks through Shadow Executions. [Citation Graph (, )][DBLP]
XSSDS: Server-Side Detection of Cross-Site Scripting Attacks. [Citation Graph (, )][DBLP]
Anti-Phishing in Offense and Defense. [Citation Graph (, )][DBLP]
OMOS: A Framework for Secure Communication in Mashup Applications. [Citation Graph (, )][DBLP]
Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors. [Citation Graph (, )][DBLP]
Bluetooth Network-Based Misuse Detection. [Citation Graph (, )][DBLP]
Bridging the Gap between Data-Flow and Control-Flow Analysis for Anomaly Detection. [Citation Graph (, )][DBLP]
Epilogue for RFC 1281, Guidelines for the Secure Operation of the Internet. [Citation Graph (, )][DBLP]
The Evolution of System-Call Monitoring. [Citation Graph (, )][DBLP]
PAS: Predicate-Based Authentication Services Against Powerful Passive Adversaries. [Citation Graph (, )][DBLP]
pwdArmor: Protecting Conventional Password-Based Authentications. [Citation Graph (, )][DBLP]
DARE: A Framework for Dynamic Authentication of Remote Executions. [Citation Graph (, )][DBLP]
Instruction Set Extensions for Enhancing the Performance of Symmetric-Key Cryptography. [Citation Graph (, )][DBLP]
A Survey to Guide Group Key Protocol Development. [Citation Graph (, )][DBLP]
Transaction Oriented Text Messaging with Trusted-SMS. [Citation Graph (, )][DBLP]
|