Search Results
2. Accelerating Application-Level Security Protocols
3. A Comprehensive Survey of Voice over IP Security Research
4. A Cooperative Immunization System for an Untrusting Internet
5. Action Amplification: A New Approach To Scalable Administration
6. Adding a Flow-Oriented Paradigm to Commodity Operating Systems
7. Adding Trust to P2P Distribution of Paid Content
8. A Dynamic Mechanism for Recovering from Buffer Overflow Attacks
9. A Holistic Approach to Service Survivability
10. A Look at VoIP Vulnerabilities
11. A Market-based Bandwidth Charging Framework
12. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS
13. An Adversarial Evaluation of Network Signaling and Control Mechanisms
14. An Analysis of Rogue AV Campaigns
15. An Email Worm Vaccine Architecture
16. A Network Access Control Mechanism Based on Behavior Profiles
17. A Network Worm Vaccine Architecture
18. Anonymity in Wireless Broadcast Networks
19. A Pay-per-Use DoS Protection Mechanism For the Web
20. Application Communities: Using Monoculture for Dependability
21. Arachne: Integrated Enterprise Security Management
22. A Repeater Encryption Unit for IPv4 and IPv6
23. A Secure Active Network Environment Architecture: Realization in SwitchWare
24. A Secure PLAN
25. A Secure Plan
26. A Secure PLAN (Extended Version)
27. ASSURE: Automatic Software Self-healing Using Rescue Points
28. A Study of Malcode-Bearing Documents
29. A Study of the Relative Costs of Network Security Protocols
30. A Survey of Voice Over IP Security Research
31. Asynchronous Policy Evaluation and Enforcement
32. Authentication on Untrusted Remote Hosts with Public-key Sudo
33. Automating the Injection of Believable Decoys to Detect Snooping
34. Baiting Inside Attackers Using Decoy Documents
35. Band-aid Patching
36. BARTER: Behavior Profile Exchange for Behavior-Based Admission and Access Control in MANETs
37. Behavior-Based Network Access Control: A Proof-of-Concept
38. Behavior-Profile Clustering for False Alert Reduction in Anomaly Detection Sensors
39. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
40. Bridging the Network Reservation Gap Using Overlays
41. Building a Reactive Immune System for Software Services
42. CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap
43. Capturing Information Flow with Concatenated Dynamic Taint Analysis
44. Casting Out Demons: Sanitizing Training Data for Anomaly Sensors
45. Characterizing Self-healing Software Systems
46. Computer Security Research with Human Subjects: Risks, Benefits and Informed Consent
47. Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs
48. Conversion and Proxy Functions for Symmetric Key Ciphers
49. Conversion Functions for Symmetric Key Ciphers
50. Countering Code Injection Attacks With Instruction Set Randomization
- « Previous
- Next »
- 1
- 2
- 3
- 4