![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 51 matches
- 2015
- Sangho Lee, Hyungsub Kim, Jong Kim:
Identifying Cross-origin Resource Status Using Application Cache. NDSS 2015 - Pieter Agten, Wouter Joosen, Frank Piessens, Nick Nikiforakis:
Seven Months' Worth of Mistakes: A Longitudinal Study of Typosquatting Abuse. NDSS 2015 - Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, Sotiris Ioannidis:
The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines. NDSS 2015 - Lujo Bauer, Shaoying Cai, Limin Jia, Timothy Passaro, Michael Stroucken, Yuan Tian:
Run-time Monitoring and Formal Analysis of Information Flows in Chromium. NDSS 2015 - Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Alfredo Pironti:
Verified Contributive Channel Bindings for Compound Authentication. NDSS 2015 - Igor Bilogrevic, Kévin Huguenin
, Stefan Mihaila, Reza Shokri
, Jean-Pierre Hubaux:
Predicting Users' Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms. NDSS 2015 - Jeremiah Blocki, Saranga Komanduri, Lorrie Faith Cranor, Anupam Datta:
Spaced Repetition and Mnemonics Enable Recall of Multiple Strong Passwords. NDSS 2015 - Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov:
Integro: Leveraging Victim Prediction for Robust Fake Account Detection in OSNs. NDSS 2015 - Raphael Bost, Raluca Ada Popa, Stephen Tu, Shafi Goldwasser:
Machine Learning Classification over Encrypted Data. NDSS 2015 - Yinzhi Cao, Yanick Fratantonio, Antonio Bianchi, Manuel Egele, Christopher Kruegel, Giovanni Vigna, Yan Chen:
EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework. NDSS 2015 - Xi Chen, Asia Slowinska, Dennis Andriesse, Herbert Bos, Cristiano Giuffrida:
StackArmor: Comprehensive Protection From Stack-based Memory Error Vulnerabilities for Binaries. NDSS 2015 - Stephen Crane, Andrei Homescu, Stefan Brunthaler
, Per Larsen, Michael Franz:
Thwarting Cache Side-Channel Attacks Through Dynamic Software Diversity. NDSS 2015 - Lucas Davi, Christopher Liebchen, Ahmad-Reza Sadeghi, Kevin Z. Snow, Fabian Monrose:
Isomeron: Code Randomization Resilient to (Just-In-Time) Return-Oriented Programming. NDSS 2015 - Soteris Demetriou, Xiao-yong Zhou, Muhammad Naveed, Yeonjoon Lee, Kan Yuan, XiaoFeng Wang, Carl A. Gunter:
What's in Your Dongle and Bank Account? Mandatory and Discretionary Protection of Android External Resources. NDSS 2015 - Daniel Demmler, Thomas Schneider, Michael Zohner:
ABY - A Framework for Efficient Mixed-Protocol Secure Two-Party Computation. NDSS 2015 - Mohan Dhawan, Rishabh Poddar, Kshiteej Mahajan, Vijay Mann:
SPHINX: Detecting Security Attacks in Software-Defined Networks. NDSS 2015 - Simon Eberz, Kasper Bonne Rasmussen, Vincent Lenders, Ivan Martinovic:
Preventing Lunchtime Attacks: Fighting Insider Threats With Eye Movement Biometrics. NDSS 2015 - Birhanu Eshete, Abeer Alhuzali, Maliheh Monshizadeh, Phillip A. Porras, Venkat N. Venkatakrishnan, Vinod Yegneswaran:
EKHunter: A Counter-Offensive Toolkit for Exploit Kit Infiltration. NDSS 2015 - Sharon Goldberg, Moni Naor, Dimitrios Papadopoulos, Leonid Reyzin, Sachin Vasant, Asaf Ziv:
NSEC5: Provably Preventing DNSSEC Zone Enumeration. NDSS 2015 - Michael I. Gordon, Deokhwan Kim, Jeff H. Perkins, Limei Gilham, Nguyen Nguyen, Martin C. Rinard:
Information Flow Analysis of Android Applications in DroidSafe. NDSS 2015 - Benjamin Güldenring, Volker Roth, Lars Ries:
Knock Yourself Out: Secure Authentication with Short Re-Usable Passwords. NDSS 2015 - Payas Gupta, Bharat Srinivasan, Vijay Balasubramaniyan, Mustaque Ahamad:
Phoneypot: Data-driven Understanding of Telephony Threats. NDSS 2015 - Sungmin Hong, Lei Xu, Haopei Wang, Guofei Gu:
Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures. NDSS 2015 - Jin Soo Jang, Sunjune Kong, Minsu Kim, Daegyeong Kim, Brent ByungHoon Kang:
SeCReT: Secure Channel between Rich Execution Environment and Trusted Execution Environment. NDSS 2015 - Shouling Ji, Weiqing Li, Neil Zhenqiang Gong, Prateek Mittal, Raheem A. Beyah:
On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge. NDSS 2015 - Brendan Juba, Christopher Musco
, Fan Long, Stelios Sidiroglou-Douskos, Martin C. Rinard:
Principled Sampling for Anomaly Detection. NDSS 2015 - Michael J. Kranch, Joseph Bonneau:
Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning. NDSS 2015 - Yonghwi Kwon, Fei Peng, Dohyeong Kim, Kyungtae Kim, Xiangyu Zhang, Dongyan Xu, Vinod Yegneswaran, John Qian:
P2C: Understanding Output Data Files via On-the-Fly Transformation from Producer to Consumer Executions. NDSS 2015 - Byoungyoung Lee, Chengyu Song, Yeongjin Jang, Tielei Wang, Taesoo Kim, Long Lu, Wenke Lee:
Preventing Use-after-free with Dangling Pointers Nullification. NDSS 2015 - Wilson Lian, Hovav Shacham, Stefan Savage:
Too LeJIT to Quit: Extending JIT Spraying to ARM. NDSS 2015
skipping 21 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-04 16:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint