Passive security intelligence to analyze the security risks of mobile/BYOD activities. | 0 | 0.34 | 2016 |
Security 360°: Enterprise security for the cognitive era. | 0 | 0.34 | 2016 |
Detecting Malicious Exploit Kits using Tree-based Similarity Searches. | 9 | 0.54 | 2016 |
Closing the loop: Network and in-host monitoring tandem for comprehensive cloud security visibility. | 0 | 0.34 | 2016 |
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics | 3 | 0.45 | 2015 |
Stream computing for large-scale, multi-channel cyber threat analytics | 2 | 0.37 | 2014 |
Reconciling malware labeling discrepancy via consensus learning | 0 | 0.34 | 2014 |
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation. | 2 | 0.41 | 2014 |
Kaleido: Network Traffic Attribution using Multifaceted Footprinting. | 1 | 0.37 | 2014 |
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation | 0 | 0.34 | 2014 |
Outsourcing multi-version key-value stores with verifiable data freshness | 7 | 0.55 | 2014 |
Practical comprehensive bounds on surreptitious communication over DNS | 12 | 0.76 | 2013 |
Scalable integrity monitoring in virtualized environments | 3 | 0.41 | 2010 |
Synthesizing Near-Optimal Malware Specifications from Suspicious Behaviors | 90 | 2.80 | 2010 |
Cloud security is not (just) virtualization security: a short paper | 74 | 3.36 | 2009 |
Virtualization and Hardware-Based Security | 14 | 0.79 | 2008 |
TVDc: managing security in the trusted virtual datacenter | 61 | 3.54 | 2008 |
Trustworthy and personalized computing on public kiosks | 40 | 5.82 | 2008 |
Managing the risk of covert information flows in virtual machine systems | 15 | 1.05 | 2007 |
A layered approach to simplified access control in virtualized systems | 22 | 1.31 | 2007 |
Retrofitting the IBM POWER Hypervisor to Support Mandatory Access Control | 5 | 0.79 | 2007 |
Linking remote attestation to secure tunnel endpoints | 57 | 3.80 | 2006 |
Shamon: A System for Distributed Mandatory Access Control | 33 | 2.37 | 2006 |
vTPM: virtualizing the trusted platform module | 233 | 16.04 | 2006 |
Toward Automated Information-Flow Integrity Verification for Security-Critical Applications | 25 | 1.46 | 2006 |
Shame on trust in distributed systems | 6 | 0.66 | 2006 |
PRIMA: policy-reduced integrity measurement architecture | 151 | 8.03 | 2006 |
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor | 153 | 12.61 | 2005 |
Design and implementation of a TCG-based integrity measurement architecture | 504 | 35.99 | 2004 |
Pervasive Authentication Domains for Automatic Pervasive Device Authorization | 11 | 0.80 | 2004 |
Resolving constraint conflicts | 18 | 1.67 | 2004 |
Attestation-based policy enforcement for remote access | 93 | 7.55 | 2004 |
Analyzing integrity protection in the SELinux example policy | 80 | 4.62 | 2003 |
Authentication for Distributed Web Caches | 7 | 0.66 | 2002 |
Secure coprocessor-based intrusion detection | 54 | 5.12 | 2002 |
IPSECvalidate: A Tool to Validate IPSEC Configurations | 1 | 0.42 | 2001 |
Verteiltes Filtern mit Contags und Sicherheits-Labeln | 0 | 0.34 | 2001 |
Building the IBM 4758 Secure Coprocessor | 118 | 14.80 | 2001 |
An Evolutionary Approach to Multilaterally Secure Services in ISDN / IN | 3 | 0.43 | 1998 |
Authentikation als Grundlage der Skalierung von Sicherheit in der Kommunikationstechnik | 0 | 0.34 | 1997 |
Ein Domain-Konzept zur systematischen und wirtschaftlichen Integration von Sicherheit in Kommunikationsnetze. | 1 | 0.39 | 1996 |