Search Results
2. On Effectiveness of Traffic Analysis Against Anonymity Networks Using Netflow
3. CloudFence: Enabling Users to Audit the Use of their Cloud-Resident Data
4. Detecting Traffic Snooping in Anonymity Networks Using Decoys
5. libdft: Practical Dynamic Data Flow Tracking for Commodity Systems
6. A Comprehensive Survey of Voice over IP Security Research
7. BotSwindler: Tamper Resistant Injection of Believable Decoys in VM-Based Hosts for Crimeware Detection
8. Baiting Inside Attackers Using Decoy Documents
9. F3ildCrypt: End-to-End Protection of Sensitive Information in Web Services
10. Approximating a Global Passive Adversary Against Tor
11. Behavior-Based Network Access Control: A Proof-of-Concept
12. Distributed Firewall For MANETs
13. LinkWidth: A Method to Measure Link Capacity and Available Bandwidth using Single-End Probes
14. Path-based Access Control for Enterprise Networks
15. Spectrogram: A Mixture-of-Markov-Chains Model for Anomaly Detection in Web Traffic
16. A Model for Automatically Repairing Execution Integrity
17. A Study of Malcode-Bearing Documents
18. BARTER: Profile Model Exchange for Behavior-Based Access Control and Communication Security in MANETs
19. Can P2P Replace Direct Download for Content Distribution
20. Data Sanitization: Improving the Forensic Utility of Anomaly Detection Systems
- « Previous
- Next »
- 1
- 2
- 3