Search Results
2. Worm propagation strategies in an IPv6 Internet
3. WebSOS: Protecting Web Servers From DDoS Attacks
4. WebSOS: An Overlay-based System For Protecting Web Servers From Denial of Service Attacks
5. WebDAVA: An Administrator-Free Approach To Web File-Sharing
6. W3Bcrypt: Encryption as a Stylesheet
7. Voice-over-IP Security: Research and Practice
8. Voice over IP: Risks, Threats and Vulnerabilities
9. Virtual Private Services: Coordinated Policy Enforcement for Distributed Applications
10. Using Rescue Points to Navigate Software Recovery
11. Using Overlays to Improve Network Security
12. Using Graphic Turing Tests To Counter Automated DDoS Attacks Against Web Servers
13. Trust Management for IPsec
14. Traffic Analysis Against Low-Latency Anonymity Networks Using Available Bandwidth Estimation
15. Towards Collaborative Security and P2P Intrusion Detection
16. Towards a Universal Data Provenance Framework Using Dynamic Instrumentation
17. Towards a Forensic Analysis for Multimedia Communication Services
18. The SwitchWare Active Network Architecture
19. The STRONGMAN Architecture
20. The SPARCHS Project: Hardware Support for Software Security
21. The Security of Elastic Block Ciphers Against Key-Recovery Attacks
22. The Price of Safety in an Active Network
23. The MINESTRONE Architecture Combining Static and Dynamic Analysis Techniques for Software Security
24. The Efficient Dual Receiver Cryptosystem and Its Applications
25. The Effect of DNS Delays on Worm Propagation in an IPv6 Internet
26. The Dual Receiver Cryptogram and Its Applications
27. The Design of the OpenBSD Cryptographic Framework
28. The Case for Crypto Protocol Awareness Inside the OS Kernel
29. The Bandwidth Exchange Architecture
30. TAPI: Transactions for Accessing Public Infrastructure
31. Taming the Devil: Techniques for Evaluating Anonymized Network Data
32. Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking
33. Tagging Data In The Network Stack: mbuf tags
34. SSARES: Secure Searchable Automated Remote Email Storage
35. SQLrand: Preventing SQL Injection Attacks
36. Speculative Virtual Verification: Policy-Constrained Speculative Execution
37. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
38. SOS: An Architecture for Mitigating DDoS Attacks
39. Software Self-Healing Using Collaborative Application Communities
40. Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization
41. Shadow Honeypots
42. Securing MANET Multicast Using DIPLOMA
43. Secure Quality of Service Handling: SQoSH
44. Secure Overlay Services
45. Secure and Flexible Global File Sharing
46. Scalable Resource Control in Active Networks
47. Safety and Security of Programmable Network Infrastructures
48. ROP Payload Detection Using Speculative Code Execution
49. Robust Reactions to Potential Day-Zero Worms Through Cooperation and Validation
50. Return Value Predictability Profiles for Self–healing
- « Previous
- Next »
- 1
- 2
- 3
- 4