BEHIND THE SCENES OF ONLINE ATTACKS: AN ANALYSIS OF EXPLOITATION BEHAVIORS ON THE WEB

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Network and Distributed System Security Symposium (20. : 2013 : San Diego, Calif.) Network and Distributed System Security Symposium 2013 (NDSS '13) ; Volume 2 of 2
1. Verfasser: Canali, Davide (VerfasserIn)
Weitere Verfasser: Balzarotti, Davide (VerfasserIn)
Pages:2013
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
PRIVACY-ENHANCING TECHNOLOGIES FOR MEDICAL TESTS USING GENOMIC DATA 2020 Ayday, Erman
TRANSFORMING AND TAMING PRIVACY-BREACHING ANDROID APPLICATIONS 2020 Zhang, Mu
A NON-INTERACTIVE DUAL CHANNEL AUTHENTICATION PROTOCOL FOR ASSURING PSUEDO-CONFIDENTTALITY 2020 Irakiza, David
RBRIDGE: USER REPUTATION BASED TOR BRIDGE DISTRIBUTION WITH PRIVACY PRESERVATION 2020 Wang, Qiyan
KINWRITE: HANDWRITING-BASED AUTHENTICATION USING KINECT 2020 Tian, Jing
SECURE COMPUTATION ON FLOATING POINT NUMBERS 2020 Aliasgari, Mehrdad
VERITO: A PRACTICAL SYSTEM FOR TRANSPARENCY AND ACCOUNTABILITY IN VIRTUAL ECONOMIES 2020 Bhaskar, Raghav
FIX ME UP: REPAIRING ACCESS-CONTROL BUGS IN WEB APPLICATIONS ............ 2020 Son, Sooel
LOW-COST STANDARD SIGNATURES IN WIRELESS SENSOR NETWORKS: A CASE FOR REVIVING PRE-COMPUTATION TECHNIQUES? 2020 Ateniese, Giuseppe
JUICE: A LONGITUDINAL STUDY OF AN SEO CAMPAIGN 2020 Wang, David Y.
PRACTICAL TIMING SIDE CHANNEL ATTACKS AGAINST KERNEL SPACE ASLR 2020 Hund, Ralf
AUTOMATIC PROTOCOL SELECTION IN SECURE TWO-PARTY COMPUTATION? 2020 Kerschbaum, Florian
ASSESSING SOFTWARE INTEGRITY OF VIRTUAL APPLIANCES THROUGH SOFTWARE WHITELISTS: IS IT ANY GOOD? 2020 Huh, Jun Ho
OBLIVISTORE: HIGH PERFORMANCE OBLIVIOUS DISTRIBUTED CLOUD DATA STORE 2020 Stefanov, Emil
LIRA: LIGHTWEIGHT INCENTIVIZED ROUTING FOR ANONYMITY 2020 Jansen, Rob
DOES COUNTING STILL COUNT? REVISITING THE SECURITY OF COUNTING BASED USER AUTHENTICATION PROTOCOLS AGAINST STATISTICAL ATTACKS 2020 Asghar, Hassan Jameel
AUTOMATICALLY INFERRING THE EVOLUTION OF MALICIOUS ACTIVITY ON THE INTERNET 2020 Venkataraman, Shobha
DETECTION OF MALICIOUS PDF FILES BASED ON HIERARCHICAL DOCUMENT STRUCTURE 2020 Srndic, Nedim
CLICKONOMICS: DETERMINING THE EFFECT OF ANTI-PIRACY MEASURES FOR ONE-CLICK HOSTING 2020 Lauinger, Tobias
FRESCO: MODULAR COMPOSABLE SECURITY SERVICES FOR SOFTWARE-DEFINED NETWORKS 2020 Shin, Seungwon
Alle Artikel auflisten