Search Results
2. Bait and Snitch: Defending Computer Systems with Decoys
3. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow
4. CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data
5. Detecting Traffic Snooping in Anonymity Networks Using Decoys
6. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
7. A Comprehensive Survey of Voice over IP Security Research
8. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
9. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
10. Approximating a Global Passive Adversary Against Tor
11. Distributed Firewall For MANETs
12. LinkWidth: A Method to Measure Link Capacity and Available Bandwidth using Single-End Probes
13. Path-based Access Control for Enterprise Networks
14. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
15. A Model for Automatically Repairing Execution Integrity
16. BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs
17. Can P2P Replace Direct Download for Content Distribution
18. On the Infeasibility of Modeling Polymorphic Shellcode for Signature Detection
19. STAND: Sanitization Tool for ANomaly Detection
20. A Case for P2P Delivery of Paid Content
- « Previous
- Next »
- 1
- 2
- 3