Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks | 0 | 0.34 | 2022 |
Consistency is All I Ask: Attacks and Countermeasures on the Network Context of Distributed Honeypots | 0 | 0.34 | 2022 |
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part I. | 0 | 0.34 | 2020 |
Security and Privacy in Communication Networks - 16th EAI International Conference, SecureComm 2020, Washington, DC, USA, October 21-23, 2020, Proceedings, Part II. | 0 | 0.34 | 2020 |
Memory Forensic Challenges Under Misused Architectural Features. | 1 | 0.35 | 2018 |
Your Neighbors are Listening: Evaluating PostMessage Use in OAuth | 0 | 0.34 | 2017 |
FEC-Seluge: Efficient, reliable, and secure large data dissemination using erasure codes. | 0 | 0.34 | 2017 |
Now You See Me: Hide and Seek in Physical Address Space | 3 | 0.39 | 2015 |
HyperCheck: A Hardware-AssistedIntegrity Monitor | 16 | 0.75 | 2014 |
Protecting Enterprise Networks through Attack Surface Expansion | 7 | 0.58 | 2014 |
Remotely wiping sensitive data on stolen smartphones | 4 | 0.55 | 2014 |
MOTAG: Moving Target Defense against Internet Denial of Service Attacks | 24 | 1.23 | 2013 |
Verification of data redundancy in cloud storage | 1 | 0.41 | 2013 |
SPECTRE: A dependable introspection framework via System Management Mode | 24 | 0.77 | 2013 |
Capability-Based Defenses Against DoS Attacks in Multi-path MANET Communications | 1 | 0.34 | 2013 |
TerraCheck: verification of dedicated cloud storage | 0 | 0.34 | 2013 |
A moving target defense mechanism for MANETs based on identity virtualization | 11 | 0.81 | 2013 |
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. | 13 | 0.70 | 2012 |
A dependability analysis of hardware-assisted polling integrity checking systems | 3 | 0.39 | 2012 |
Hardware-Assisted Application Integrity Monitor | 1 | 0.48 | 2012 |
NetGator: malware detection using program interactive challenges | 2 | 0.40 | 2012 |
Disk storage isolation and verification in cloud | 4 | 0.44 | 2012 |
Automatic Security Analysis Using Security Metrics | 6 | 0.47 | 2011 |
Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensics | 18 | 0.95 | 2011 |
CapMan: Capability-Based Defense against Multi-Path Denial of Service (DoS) Attacks in MANET | 3 | 0.41 | 2011 |