default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 49 matches
- 2017
- Ali Abbasi, Thorsten Holz, Emmanuele Zambon, Sandro Etalle:
ECFI: Asynchronous Control Flow Integrity for Programmable Logic Controllers. ACSAC 2017: 437-448 - Adam J. Aviv, John T. Davin, Flynn Wolf, Ravi Kuber:
Towards Baselines for Shoulder Surfing on Mobile Authentication. ACSAC 2017: 486-498 - Mozhgan Azimpourkivi, Umut Topkara, Bogdan Carbunar:
A Secure Mobile Authentication Alternative to Biometrics. ACSAC 2017: 28-41 - Timothy Barron, Nick Nikiforakis:
Picky Attackers: Quantifying the Role of System Properties on Intruder Behavior. ACSAC 2017: 387-398 - Reda Bellafqira, Gouenou Coatrieux, Dalel Bouslimi, Gwenolé Quellec, Michel Cozic:
Proxy Re-Encryption Based on Homomorphic Encryption. ACSAC 2017: 154-161 - Antonio Bianchi, Eric Gustafson, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna:
Exploitation and Mitigation of Authentication Schemes Based on Device-Public Information. ACSAC 2017: 16-27 - Riccardo Bortolameotti, Thijs van Ede, Marco Caselli, Maarten H. Everts, Pieter H. Hartel, Rick Hofstede, Willem Jonker, Andreas Peter:
DECANTeR: DEteCtion of Anomalous outbouNd HTTP TRaffic by Passive Application Fingerprinting. ACSAC 2017: 373-386 - Jo Van Bulck, Jan Tobias Mühlberg, Frank Piessens:
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks. ACSAC 2017: 225-237 - Xiaoyu Cao, Neil Zhenqiang Gong:
Mitigating Evasion Attacks to Deep Neural Networks via Region-based Classification. ACSAC 2017: 278-287 - Binbin Chen, Xinshu Dong, Guangdong Bai, Sumeet Jauhar, Yueqiang Cheng:
Secure and Efficient Software-based Attestation for Industrial Control Devices with ARM Processors. ACSAC 2017: 425-436 - Shang-Tse Chen, Yufei Han, Duen Horng Chau, Christopher S. Gates, Michael Hart, Kevin A. Roundy:
Predicting Cyber Threats with Virtual Security Products. ACSAC 2017: 189-199 - Lingwei Chen, Shifu Hou, Yanfang Ye:
SecureDroid: Enhancing Security of Machine Learning-based Detection against Adversarial Android Malware Attacks. ACSAC 2017: 362-372 - Haining Chen, Ninghui Li, William Enck, Yousra Aafer, Xiangyu Zhang:
Analysis of SEAndroid Policies: Combining MAC and DAC in Android. ACSAC 2017: 553-565 - Long Cheng, Ke Tian, Danfeng (Daphne) Yao:
Orpheus: Enforcing Cyber-Physical Execution Semantics to Defend Against Data-Oriented Attacks. ACSAC 2017: 315-326 - Ronny Chevalier, Maugan Villatel, David Plaquin, Guillaume Hiet:
Co-processor-based Behavior Monitoring: Application to the Detection of Attacks Against the System Management Mode. ACSAC 2017: 399-411 - Adrian Dabrowski, Johanna Ullrich, Edgar R. Weippl:
Grid Shock: Coordinated Load-Changing Attacks on Power Grids: The Non-Smart Power Grid is Vulnerable to Cyber Attacks as Well. ACSAC 2017: 303-314 - Matteo Dell'Amico, Leyla Bilge, Ashwin Kumar Kayyoor, Petros Efstathopoulos, Pierre-Antoine Vervier:
Lean On Me: Mining Internet Service Dependencies From Large-Scale DNS Data. ACSAC 2017: 449-460 - Xiyue Deng, Jelena Mirkovic:
Commoner Privacy And A Study On Network Traces. ACSAC 2017: 566-576 - Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, Hrishikesh B. Acharya:
The Devil's in The Details: Placing Decoy Routers in the Internet. ACSAC 2017: 577-589 - Le Guan, Shijie Jia, Bo Chen, Fengwei Zhang, Bo Luo, Jingqiang Lin, Peng Liu, Xinyu Xing, Luning Xia:
Supporting Transparent Snapshot for Bare-metal Malware Analysis on Mobile Devices. ACSAC 2017: 339-349 - Ghaith Husari, Ehab Al-Shaer, Mohiuddin Ahmed, Bill Chu, Xi Niu:
TTPDrill: Automatic and Accurate Extraction of Threat Actions from Unstructured Text of CTI Sources. ACSAC 2017: 103-115 - Uyeong Jang, Xi Wu, Somesh Jha:
Objective Metrics and Gradient Descent Algorithms for Adversarial Examples in Machine Learning. ACSAC 2017: 262-277 - Jianyu Jiang, Shixiong Zhao, Danish Alsayed, Yuexuan Wang, Heming Cui, Feng Liang, Zhaoquan Gu:
Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security. ACSAC 2017: 79-90 - Peter C. Johnson, Sergey Bratus, Sean W. Smith:
Protecting Against Malicious Bits On the Wire: Automatically Generating a USB Protocol Parser for a Production Kernel. ACSAC 2017: 528-541 - Jun Young Kim, Ralph Holz, Wen Hu, Sanjay Jha:
Automated Analysis of Secure Internet of Things Protocols. ACSAC 2017: 238-249 - Taegyu Kim, Chung Hwan Kim, Hongjun Choi, Yonghwi Kwon, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
RevARM: A Platform-Agnostic ARM Binary Rewriter for Security Applications. ACSAC 2017: 412-424 - Hoyeon Lee, Seungyeon Kim, Taekyoung Kwon:
Here Is Your Fingerprint!: Actual Risk versus User Perception of Latent Fingerprints and Smudges Remaining on Smartphones. ACSAC 2017: 512-527 - Jelena Mirkovic, Erik Kline, Peter L. Reiher:
RESECT: Self-Learning Traffic Filters for IP Spoofing Defense. ACSAC 2017: 474-485 - Matús Nemec, Dusan Klinec, Petr Svenda, Peter Sekan, Vashek Matyas:
Measuring Popularity of Cryptographic Libraries in Internet-Wide Scans. ACSAC 2017: 162-175 - Junya Ogasawara, Kenji Kono:
Nioh: Hardening The Hypervisor by Filtering Illegal I/O Requests to Virtual Devices. ACSAC 2017: 542-552
skipping 19 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-03 11:58 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint