Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "polymorphic worm"
@article{DBLP:journals/ijis/WangYWLBT22, author = {Fangwei Wang and Shaojie Yang and Changguang Wang and Qingru Li and Kehinde O. Babaagba and Zhiyuan Tan}, title = {Toward machine intelligence that learns to fingerprint polymorphic worms in IoT}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {7058--7078}, year = {2022}, url = {https://doi.org/10.1002/int.22871}, doi = {10.1002/INT.22871}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/WangYWLBT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/virology/EskandariSG19, author = {Razieh Eskandari and Mahdi Shajari and Mojtaba Mostafavi Ghahfarokhi}, title = {{ERES:} an extended regular expression signature for polymorphic worm detection}, journal = {J. Comput. Virol. Hacking Tech.}, volume = {15}, number = {3}, pages = {177--194}, year = {2019}, url = {https://doi.org/10.1007/s11416-019-00330-1}, doi = {10.1007/S11416-019-00330-1}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/virology/EskandariSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nana/WangYZW19, author = {Fangwei Wang and Shaojie Yang and Dongmei Zhao and Changguang Wang}, title = {An Automatic Signature-Based Approach for Polymorphic Worms in Big Data Environment}, booktitle = {2019 International Conference on Networking and Network Applications, NaNA 2019, Daegu, Korea (South), October 10-13, 2019}, pages = {223--228}, year = {2019}, crossref = {DBLP:conf/nana/2019}, url = {https://doi.org/10.1109/NaNA.2019.00047}, doi = {10.1109/NANA.2019.00047}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nana/WangYZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/AljawarnehMM16, author = {Shadi A. Aljawarneh and Raja A. Moftah and Abdelsalam M. Maatuk}, title = {Investigations of automatic methods for detecting the polymorphic worms signatures}, journal = {Future Gener. Comput. Syst.}, volume = {60}, pages = {67--77}, year = {2016}, url = {https://doi.org/10.1016/j.future.2016.01.020}, doi = {10.1016/J.FUTURE.2016.01.020}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/AljawarnehMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcnis/AlmarshadMP16, author = {Malak Abdullah I. Almarshad and Mohssen M. Z. E. Mohammed and Al{-}Sakib Khan Pathan}, title = {Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm}, journal = {Int. J. Commun. Networks Inf. Secur.}, volume = {8}, number = {3}, year = {2016}, url = {http://www.ijcnis.org/index.php/ijcnis/article/view/2128}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijcnis/AlmarshadMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/WangW16, author = {Jie Wang and Jie Wu}, title = {A Novel Signature Generation Approach in Noisy Environments for Detecting Polymorphic Worm}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, pages = {109--121}, year = {2016}, crossref = {DBLP:conf/spaccs/2016}, url = {https://doi.org/10.1007/978-3-319-49148-6\_10}, doi = {10.1007/978-3-319-49148-6\_10}, timestamp = {Wed, 24 Apr 2024 14:55:54 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/WangW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangH15, author = {Jie Wang and Xiaoxian He}, title = {A Novel Signature Generation Approach for Polymorphic Worms}, booktitle = {Algorithms and Architectures for Parallel Processing - 15th International Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part {III}}, pages = {369--382}, year = {2015}, crossref = {DBLP:conf/ica3pp/2015-3}, url = {https://doi.org/10.1007/978-3-319-27137-8\_28}, doi = {10.1007/978-3-319-27137-8\_28}, timestamp = {Sat, 06 Aug 2022 22:05:44 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/intrust/WangH15, author = {Jie Wang and Xiaoxian He}, title = {A Signature Generation Approach Based on Clustering for Polymorphic Worm}, booktitle = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, pages = {84--96}, year = {2015}, crossref = {DBLP:conf/intrust/2015}, url = {https://doi.org/10.1007/978-3-319-31550-8\_6}, doi = {10.1007/978-3-319-31550-8\_6}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/intrust/WangH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VirvilisG14, author = {Nikos Virvilis and Dimitris Gritzalis}, title = {Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks}, journal = {Comput. Secur.}, volume = {42}, pages = {191--192}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.007}, doi = {10.1016/J.COSE.2014.01.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VirvilisG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/KaurS14, author = {Ratinder Kaur and Maninder Singh}, title = {A Survey on Zero-Day Polymorphic Worm Detection Techniques}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {16}, number = {3}, pages = {1520--1549}, year = {2014}, url = {https://doi.org/10.1109/SURV.2014.022714.00160}, doi = {10.1109/SURV.2014.022714.00160}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/KaurS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Shahin14a, author = {Ashraf A. Shahin}, title = {Polymorphic Worms Collection in Cloud Computing}, journal = {CoRR}, volume = {abs/1409.1654}, year = {2014}, url = {http://arxiv.org/abs/1409.1654}, eprinttype = {arXiv}, eprint = {1409.1654}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Shahin14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BayogluS12, author = {Burak Bayoglu and Ibrahim Sogukpinar}, title = {Graph based signature classes for detecting polymorphic worms via content analysis}, journal = {Comput. Networks}, volume = {56}, number = {2}, pages = {832--844}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2011.11.007}, doi = {10.1016/J.COMNET.2011.11.007}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/BayogluS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccseit/JabroothP12, author = {A. Uzma Jabrooth and B. Parvathavarthini}, title = {Polymorphic worms detection using Extended PolyTree}, booktitle = {The Second International Conference on Computational Science, Engineering and Information Technology, {CCSEIT} '12, Coimbatore, India, October 26-28, 2012}, pages = {532--538}, year = {2012}, crossref = {DBLP:conf/ccseit/2012}, url = {https://doi.org/10.1145/2393216.2393305}, doi = {10.1145/2393216.2393305}, timestamp = {Thu, 07 Nov 2019 15:14:46 +0100}, biburl = {https://dblp.org/rec/conf/ccseit/JabroothP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KongJGZLX11, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, title = {{SAS:} semantics aware signature generation for polymorphic worm detection}, journal = {Int. J. Inf. Sec.}, volume = {10}, number = {5}, pages = {269--283}, year = {2011}, url = {https://doi.org/10.1007/s10207-011-0132-7}, doi = {10.1007/S10207-011-0132-7}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KongJGZLX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/TangXL11, author = {Yong Tang and Bin Xiao and Xicheng Lu}, title = {Signature Tree Generation for Polymorphic Worms}, journal = {{IEEE} Trans. Computers}, volume = {60}, number = {4}, pages = {565--579}, year = {2011}, url = {https://doi.org/10.1109/TC.2010.130}, doi = {10.1109/TC.2010.130}, timestamp = {Sun, 23 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/TangXL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/tr/Bayoglu10, author = {Burak Bayoglu}, title = {Polimorfik solucan sald{\i}r{\i}lar{\i}n{\i}n tespiti (Detection of polymorphic worm attacks)}, school = {Gebze Institute of Technology, Turkey}, year = {2010}, url = {https://tez.yok.gov.tr/UlusalTezMerkezi/tezDetay.jsp?id=3vLI6\_FF6t1VxHbmsrWF\_A\&no=EC4WQQtp-WKmkq6XfA4VFw}, timestamp = {Sat, 04 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/phd/tr/Bayoglu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/WangLCFL10, author = {Lanjia Wang and Zhichun Li and Yan Chen and Zhi Fu and Xing Li}, title = {Thwarting zero-day polymorphic worms with network-level length-based signature generation}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {18}, number = {1}, pages = {53--66}, year = {2010}, url = {http://doi.acm.org/10.1145/1816288.1816293}, doi = {10.1145/1816288.1816293}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/WangLCFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/MohammedCVHA10, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Izzeldin Amin}, title = {Zero-day Polymorphic Worms Detection Using {A} modified Boyer-Moore Algorithm}, booktitle = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, pages = {413--418}, year = {2010}, crossref = {DBLP:conf/csreaSAM/2010}, timestamp = {Fri, 10 Dec 2010 11:46:08 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/MohammedCVHA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icitst/MohammedCVHB10, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Eihab Bashier}, title = {Fast and accurate detection for polymorphic worms}, booktitle = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, pages = {1--6}, year = {2010}, crossref = {DBLP:conf/icitst/2010}, url = {https://ieeexplore.ieee.org/document/5678546/}, timestamp = {Mon, 09 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icitst/MohammedCVHB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KongJGZLX10, author = {Deguang Kong and Yoon{-}chan Jhi and Tao Gong and Sencun Zhu and Peng Liu and Hongsheng Xi}, title = {{SAS:} Semantics Aware Signature Generation for Polymorphic Worm Detection}, booktitle = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, pages = {1--19}, year = {2010}, crossref = {DBLP:conf/securecomm/2010}, url = {https://doi.org/10.1007/978-3-642-16161-2\_1}, doi = {10.1007/978-3-642-16161-2\_1}, timestamp = {Sun, 07 Jan 2018 16:52:46 +0100}, biburl = {https://dblp.org/rec/conf/securecomm/KongJGZLX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TangXL09, author = {Yong Tang and Bin Xiao and Xicheng Lu}, title = {Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms}, journal = {Comput. Secur.}, volume = {28}, number = {8}, pages = {827--842}, year = {2009}, url = {https://doi.org/10.1016/j.cose.2009.06.003}, doi = {10.1016/J.COSE.2009.06.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TangXL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/SunC09a, author = {Wen{-}Chen Sun and Yi{-}Ming Chen}, title = {A rough set approach for automatic key attributes identification of zero-day polymorphic worms}, journal = {Expert Syst. Appl.}, volume = {36}, number = {3}, pages = {4672--4679}, year = {2009}, url = {https://doi.org/10.1016/j.eswa.2008.06.037}, doi = {10.1016/J.ESWA.2008.06.037}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/SunC09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/StephensonS09, author = {Bradley Stephenson and Biplab Sikdar}, title = {A Quasi-Species Model for the Propagation and Containment of Polymorphic Worms}, journal = {{IEEE} Trans. Computers}, volume = {58}, number = {9}, pages = {1289--1296}, year = {2009}, url = {https://doi.org/10.1109/TC.2009.63}, doi = {10.1109/TC.2009.63}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/StephensonS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/TataraHS09, author = {Kohei Tatara and Yoshiaki Hori and Kouichi Sakurai}, title = {Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {972--977}, year = {2009}, crossref = {DBLP:conf/IEEEares/2009}, url = {https://doi.org/10.1109/ARES.2009.103}, doi = {10.1109/ARES.2009.103}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/TataraHS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/MohammedCVHA09, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Izzeldin Amin}, title = {A modified Knuth-Morris-Pratt Algorithm for Zero-day Polymorphic Worms Detection}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {652--657}, year = {2009}, crossref = {DBLP:conf/csreaSAM/2009}, timestamp = {Wed, 30 Dec 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/MohammedCVHA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/WangWSC09, author = {Jie Wang and Jianxin Wang and Yu Sheng and Jianer Chen}, title = {Polymorphic Worm Detection Using Signatures Based on Neighborhood Relation}, booktitle = {11th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2009, 25-27 June 2009, Seoul, Korea}, pages = {347--353}, year = {2009}, crossref = {DBLP:conf/hpcc/2009}, url = {https://doi.org/10.1109/HPCC.2009.59}, doi = {10.1109/HPCC.2009.59}, timestamp = {Mon, 10 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/WangWSC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangWCZ09, author = {Jie Wang and Jianxin Wang and Jianer Chen and Xi Zhang}, title = {An Automated Signature Generation Approach for Polymorphic Worm Based on Color Coding}, booktitle = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, pages = {1--6}, year = {2009}, crossref = {DBLP:conf/icc/2009}, url = {https://doi.org/10.1109/ICC.2009.5198721}, doi = {10.1109/ICC.2009.5198721}, timestamp = {Tue, 12 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/WangWCZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icsea/MohammedCVHA09, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan and Neco Ventura and Mohsin Hashim and Izzeldin Amin}, title = {Polymorphic Worm Detection Using Double-Honeynet}, booktitle = {The Fourth International Conference on Software Engineering Advances, {ICSEA} 2009, 20-25 September 2009, Porto, Portugal}, pages = {401--406}, year = {2009}, crossref = {DBLP:conf/icsea/2009}, url = {https://doi.org/10.1109/ICSEA.2009.64}, doi = {10.1109/ICSEA.2009.64}, timestamp = {Wed, 09 Aug 2023 08:39:52 +0200}, biburl = {https://dblp.org/rec/conf/icsea/MohammedCVHA09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/broadcom/MohammedC08, author = {Mohssen M. Z. E. Mohammed and H. Anthony Chan}, title = {Fast Automated Signature Generation for Polymorphic Worms Using Double-Honeynet}, booktitle = {2008 Third International Conference on Broadband Communications, Information Technology {\&} Biomedical Applications, BroadCom 2008, 23-26 November 2008, Pretoria, Gauteng, South Africa}, pages = {142--147}, year = {2008}, crossref = {DBLP:conf/broadcom/2008}, url = {https://doi.org/10.1109/BROADCOM.2008.21}, doi = {10.1109/BROADCOM.2008.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/broadcom/MohammedC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/CavallaroLMM08, author = {Lorenzo Cavallaro and Andrea Lanzi and Luca Mayer and Mattia Monga}, title = {{LISABETH:} automated content-based signature generator for zero-day polymorphic worms}, booktitle = {Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, {SESS} 2008, Leipzig, Germany, May 17-18, 2008}, pages = {41--48}, year = {2008}, crossref = {DBLP:conf/icse/2008sess}, url = {https://doi.org/10.1145/1370905.1370911}, doi = {10.1145/1370905.1370911}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icse/CavallaroLMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mue/TataraHS08, author = {Kohei Tatara and Yoshiaki Hori and Kouichi Sakurai}, title = {Analyzing Maximum Length of Instruction Sequence in Network Packets for Polymorphic Worm Detection}, booktitle = {2008 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2008), 24-26 April 2008, Busan, Korea}, pages = {485--489}, year = {2008}, crossref = {DBLP:conf/mue/2008}, url = {https://doi.org/10.1109/MUE.2008.119}, doi = {10.1109/MUE.2008.119}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mue/TataraHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/TangC07, author = {Yong Tang and Shigang Chen}, title = {An Automated Signature-Based Approach against Polymorphic Internet Worms}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {18}, number = {7}, pages = {879--892}, year = {2007}, url = {https://doi.org/10.1109/TPDS.2007.1050}, doi = {10.1109/TPDS.2007.1050}, timestamp = {Thu, 12 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/TangC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GundyCSV07, author = {Matthew Van Gundy and Hao Chen and Zhendong Su and Giovanni Vigna}, title = {Feature Omission Vulnerabilities: Thwarting Signature Generation for Polymorphic Worms}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {74--85}, year = {2007}, crossref = {DBLP:conf/acsac/2007}, url = {https://doi.org/10.1109/ACSAC.2007.42}, doi = {10.1109/ACSAC.2007.42}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GundyCSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atc/TangLX07, author = {Yong Tang and Xicheng Lu and Bin Xiao}, title = {Generating Simplified Regular Expression Signatures for Polymorphic Worms}, booktitle = {Autonomic and Trusted Computing, 4th International Conference, {ATC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, pages = {478--488}, year = {2007}, crossref = {DBLP:conf/atc/2007}, url = {https://doi.org/10.1007/978-3-540-73547-2\_49}, doi = {10.1007/978-3-540-73547-2\_49}, timestamp = {Thu, 01 Feb 2024 20:40:31 +0100}, biburl = {https://dblp.org/rec/conf/atc/TangLX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccn/RichardsonH07, author = {Theodor Richardson and Chin{-}Tser Huang}, title = {Containing Hitlist-Based Worms with Polymorphic Signatures}, booktitle = {Proceedings of the 16th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007}, pages = {652--657}, year = {2007}, crossref = {DBLP:conf/icccn/2007}, url = {https://doi.org/10.1109/ICCCN.2007.4317891}, doi = {10.1109/ICCCN.2007.4317891}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/icccn/RichardsonH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/LiWCF07, author = {Zhichun Li and Lanjia Wang and Yan Chen and Zhi Fu}, title = {Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms}, booktitle = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, pages = {164--173}, year = {2007}, crossref = {DBLP:conf/icnp/2007}, url = {https://doi.org/10.1109/ICNP.2007.4375847}, doi = {10.1109/ICNP.2007.4375847}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icnp/LiWCF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/woot/GundyBV07, author = {Matthew Van Gundy and Davide Balzarotti and Giovanni Vigna}, title = {Catch Me, If You Can: Evading Network Signatures with Web-based Polymorphic Worms}, booktitle = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston, MA, USA, August 6, 2007}, year = {2007}, crossref = {DBLP:conf/woot/2007}, url = {https://www.usenix.org/conference/woot-07/catch-me-if-you-can-evading-network-signatures-web-based-polymorphic-worms}, timestamp = {Mon, 01 Feb 2021 08:41:52 +0100}, biburl = {https://dblp.org/rec/conf/woot/GundyBV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ancs/ChenWLZ06, author = {Songqing Chen and Xinyuan Wang and Lei Liu and Xinwen Zhang}, title = {WormTerminator: an effective containment of unknown and polymorphic fast spreading worms}, booktitle = {Proceedings of the 2006 {ACM/IEEE} Symposium on Architecture for Networking and Communications Systems, {ANCS} 2006, San Jose, California, USA, December 3-5, 2006}, pages = {173--182}, year = {2006}, crossref = {DBLP:conf/ancs/2006}, url = {https://doi.org/10.1145/1185347.1185371}, doi = {10.1145/1185347.1185371}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ancs/ChenWLZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/StephensonS06, author = {Bradley Stephenson and Biplab Sikdar}, title = {A Quasi-Species Approach for Modeling the Dynamics of Polymorphic Worms}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, year = {2006}, crossref = {DBLP:conf/infocom/2006}, url = {https://doi.org/10.1109/INFOCOM.2006.93}, doi = {10.1109/INFOCOM.2006.93}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/StephensonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigcomm/WangHK006, author = {Jisheng Wang and Ihab Hamadeh and George Kesidis and David J. Miller}, title = {Polymorphic worm detection and defense: system design, experimental methodology, and data resources}, booktitle = {Proceedings of the 2006 {SIGCOMM} Workshop on Large-Scale Attack Defense, {LSAD} '06, Pisa, Italy, September 11-15, 2006}, pages = {169--176}, year = {2006}, crossref = {DBLP:conf/sigcomm/2006lsad}, url = {https://doi.org/10.1145/1162666.1162676}, doi = {10.1145/1162666.1162676}, timestamp = {Thu, 03 Feb 2022 15:46:18 +0100}, biburl = {https://dblp.org/rec/conf/sigcomm/WangHK006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/LeeKHK06, author = {Ki Hun Lee and Yuna Kim and Sung Je Hong and Jong Kim}, title = {PolyI-D: Polymorphic Worm Detection Based on Instruction Distribution}, booktitle = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, pages = {45--59}, year = {2006}, crossref = {DBLP:conf/wisa/2006}, url = {https://doi.org/10.1007/978-3-540-71093-6\_4}, doi = {10.1007/978-3-540-71093-6\_4}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/LeeKHK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CrandallSW05, author = {Jedidiah R. Crandall and Zhendong Su and Shyhtsun Felix Wu and Frederic T. Chong}, title = {On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {235--248}, year = {2005}, crossref = {DBLP:conf/ccs/2005}, url = {https://doi.org/10.1145/1102120.1102152}, doi = {10.1145/1102120.1102152}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/CrandallSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/KrugelKMRV05, author = {Christopher Kr{\"{u}}gel and Engin Kirda and Darren Mutz and William K. Robertson and Giovanni Vigna}, title = {Polymorphic Worm Detection Using Structural Information of Executables}, booktitle = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, pages = {207--226}, year = {2005}, crossref = {DBLP:conf/raid/2005}, url = {https://doi.org/10.1007/11663812\_11}, doi = {10.1007/11663812\_11}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/raid/KrugelKMRV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/NewsomeKS05, author = {James Newsome and Brad Karp and Dawn Xiaodong Song}, title = {Polygraph: Automatically Generating Signatures for Polymorphic Worms}, booktitle = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, pages = {226--241}, year = {2005}, crossref = {DBLP:conf/sp/2005}, url = {https://doi.org/10.1109/SP.2005.15}, doi = {10.1109/SP.2005.15}, timestamp = {Thu, 21 Sep 2023 15:57:31 +0200}, biburl = {https://dblp.org/rec/conf/sp/NewsomeKS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/nana/2019, title = {2019 International Conference on Networking and Network Applications, NaNA 2019, Daegu, Korea (South), October 10-13, 2019}, publisher = {{IEEE}}, year = {2019}, url = {https://ieeexplore.ieee.org/xpl/conhome/9015954/proceeding}, isbn = {978-1-7281-2629-6}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/nana/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/spaccs/2016, editor = {Guojun Wang and Indrakshi Ray and Jos{\'{e}} M. Alcaraz Calero and Sabu M. Thampi}, title = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 9th International Conference, SpaCCS 2016, Zhangjiajie, China, November 16-18, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10066}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49148-6}, doi = {10.1007/978-3-319-49148-6}, isbn = {978-3-319-49147-9}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ica3pp/2015-3, editor = {Guojun Wang and Albert Y. Zomaya and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Kenli Li}, title = {Algorithms and Architectures for Parallel Processing - 15th International Conference, {ICA3PP} 2015, Zhangjiajie, China, November 18-20, 2015. Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9530}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27137-8}, doi = {10.1007/978-3-319-27137-8}, isbn = {978-3-319-27136-1}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/2015-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/intrust/2015, editor = {Moti Yung and Jian{-}biao Zhang and Zhen Yang}, title = {Trusted Systems - 7th International Conference, {INTRUST} 2015, Beijing, China, December 7-8, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9565}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31550-8}, doi = {10.1007/978-3-319-31550-8}, isbn = {978-3-319-31549-2}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/intrust/2015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccseit/2012, editor = {Natarajan Meghanathan and Michal Wozniak}, title = {The Second International Conference on Computational Science, Engineering and Information Technology, {CCSEIT} '12, Coimbatore, India, October 26-28, 2012}, publisher = {{ACM}}, year = {2012}, url = {http://dl.acm.org/citation.cfm?id=2393216}, isbn = {978-1-4503-1310-0}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/ccseit/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csreaSAM/2010, editor = {Hamid R. Arabnia and Kevin Daimi and Michael R. Grimaila and George Markowsky and Selim Aissi and Victor A. Clincy and Leonidas Deligiannidis and Donara Gabrielyan and Gevorg Margarov and Ashu M. G. Solo and Craig Valli and Patricia A. H. Williams}, title = {Proceedings of the 2010 International Conference on Security {\&} Management, {SAM} 2010, July 12-15, 2010, Las Vegas Nevada, USA, 2 Volumes}, publisher = {{CSREA} Press}, year = {2010}, isbn = {1-60132-163-5}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icitst/2010, title = {5th International Conference for Internet Technology and Secured Transactions, {ICITST} 2010, London, United Kingdom, November 8-10, 2010}, publisher = {{IEEE}}, year = {2010}, url = {https://ieeexplore.ieee.org/xpl/conhome/5672505/proceeding}, isbn = {978-1-4244-8862-9}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/icitst/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/securecomm/2010, editor = {Sushil Jajodia and Jianying Zhou}, title = {Security and Privacy in Communication Networks - 6th Iternational {ICST} Conference, SecureComm 2010, Singapore, September 7-9, 2010. Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {50}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16161-2}, doi = {10.1007/978-3-642-16161-2}, isbn = {978-3-642-16160-5}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/IEEEares/2009, title = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5066393/proceeding}, isbn = {978-1-4244-3572-2}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/csreaSAM/2009, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, publisher = {{CSREA} Press}, year = {2009}, isbn = {1-60132-126-0}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/csreaSAM/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hpcc/2009, title = {11th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2009, 25-27 June 2009, Seoul, Korea}, publisher = {{IEEE}}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5166953/proceeding}, isbn = {978-0-7695-3738-2}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icc/2009, title = {Proceedings of {IEEE} International Conference on Communications, {ICC} 2009, Dresden, Germany, 14-18 June 2009}, publisher = {{IEEE}}, year = {2009}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/icc/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icsea/2009, editor = {Kenneth Boness and Jo{\~{a}}o M. Fernandes and Jon G. Hall and Ricardo Jorge Machado and Roy Oberhauser}, title = {The Fourth International Conference on Software Engineering Advances, {ICSEA} 2009, 20-25 September 2009, Porto, Portugal}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://ieeexplore.ieee.org/xpl/conhome/5298192/proceeding}, isbn = {978-0-7695-3777-1}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/icsea/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/broadcom/2008, editor = {Johnson I. Agbinya and Elmarie Biermann and Yskandar Hamam and Ntsibane Ntlatlapa and Keith Ferguson}, title = {2008 Third International Conference on Broadband Communications, Information Technology {\&} Biomedical Applications, BroadCom 2008, 23-26 November 2008, Pretoria, Gauteng, South Africa}, publisher = {{IEEE} Computer Society}, year = {2008}, isbn = {978-0-7695-3453-4}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/broadcom/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icse/2008sess, editor = {Bart De Win and Seok{-}Won Lee and Mattia Monga}, title = {Proceedings of the Fourth International Workshop on Software Engineering for Secure Systems, {SESS} 2008, Leipzig, Germany, May 17-18, 2008}, publisher = {{ACM}}, year = {2008}, url = {http://dl.acm.org/citation.cfm?id=1370905}, isbn = {978-1-60558-042-5}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/icse/2008sess.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/mue/2008, title = {2008 International Conference on Multimedia and Ubiquitous Engineering {(MUE} 2008), 24-26 April 2008, Busan, Korea}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://ieeexplore.ieee.org/xpl/conhome/4505670/proceeding}, isbn = {978-0-7695-3134-2}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/mue/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2007, title = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4412959/proceeding}, isbn = {0-7695-3060-5}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/acsac/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/atc/2007, editor = {Bin Xiao and Laurence Tianruo Yang and Jianhua Ma and Christian M{\"{u}}ller{-}Schloer and Yu Hua}, title = {Autonomic and Trusted Computing, 4th International Conference, {ATC} 2007, Hong Kong, China, July 11-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4610}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73547-2}, doi = {10.1007/978-3-540-73547-2}, isbn = {978-3-540-73546-5}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/atc/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icccn/2007, title = {Proceedings of the 16th International Conference on Computer Communications and Networks, {IEEE} {ICCCN} 2007, Turtle Bay Resort, Honolulu, Hawaii, USA, August 13-16, 2007}, publisher = {{IEEE}}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4317769/proceeding}, isbn = {978-1-4244-1251-8}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/icccn/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icnp/2007, title = {Proceedings of the {IEEE} International Conference on Network Protocols, {ICNP} 2007, October 16-19, 2007, Beijing, China}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://ieeexplore.ieee.org/xpl/conhome/4375820/proceeding}, isbn = {1-4244-1588-8}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/icnp/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/woot/2007, editor = {Dan Boneh and Tal Garfinkel and Dug Song}, title = {First {USENIX} Workshop on Offensive Technologies, {WOOT} '07, Boston, MA, USA, August 6, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/woot07}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/woot/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ancs/2006, editor = {Laxmi N. Bhuyan and Michel Dubois and Will Eatherton}, title = {Proceedings of the 2006 {ACM/IEEE} Symposium on Architecture for Networking and Communications Systems, {ANCS} 2006, San Jose, California, USA, December 3-5, 2006}, publisher = {{ACM}}, year = {2006}, isbn = {1-59593-580-0}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/ancs/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/infocom/2006, title = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://ieeexplore.ieee.org/xpl/conhome/4146652/proceeding}, isbn = {1-4244-0221-2}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/infocom/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sigcomm/2006lsad, title = {Proceedings of the 2006 {SIGCOMM} Workshop on Large-Scale Attack Defense, {LSAD} '06, Pisa, Italy, September 11-15, 2006}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1162666}, doi = {10.1145/1162666}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/sigcomm/2006lsad.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/wisa/2006, editor = {Jae{-}Kwang Lee and Okyeon Yi and Moti Yung}, title = {Information Security Applications, 7th International Workshop, {WISA} 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4298}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71093-6}, doi = {10.1007/978-3-540-71093-6}, isbn = {978-3-540-71092-9}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/wisa/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2005, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, publisher = {{ACM}}, year = {2005}, isbn = {1-59593-226-7}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/ccs/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/raid/2005, editor = {Alfonso Valdes and Diego Zamboni}, title = {Recent Advances in Intrusion Detection, 8th International Symposium, {RAID} 2005, Seattle, WA, USA, September 7-9, 2005, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {3858}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11663812}, doi = {10.1007/11663812}, isbn = {3-540-31778-3}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/raid/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sp/2005, title = {2005 {IEEE} Symposium on Security and Privacy (S{\&}P 2005), 8-11 May 2005, Oakland, CA, {USA}}, publisher = {{IEEE} Computer Society}, year = {2005}, url = {https://ieeexplore.ieee.org/xpl/conhome/9752/proceeding}, isbn = {0-7695-2339-0}, timestamp = {Sat, 27 Apr 2024 11:46:10 +0200}, biburl = {https://dblp.org/rec/conf/sp/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.