Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2012
- Dongkyun Ahn, Gyungho Lee:
A Memory Access Validation Scheme against Payload Injection Attacks. RAID 2012: 107-126 - B. Amann, Robin Sommer, Aashish Sharma, Seth Hall:
A Lone Wolf No More: Supporting Network Intrusion Detection with Real-Time Intelligence. RAID 2012: 314-333 - Martim Carbone, Matthew Conover, Bruce Montague, Wenke Lee:
Secure and Robust Monitoring of Virtual Machines through Guest-Assisted Introspection. RAID 2012: 22-41 - Jie Chu, Zihui Ge, Richard Huber, Ping Ji, Jennifer Yates, Yung-Chao Yu:
ALERT-ID: Analyze Logs of the Network Element in Real Time for Intrusion Detection. RAID 2012: 294-313 - Xiang Cui, Jinqiao Shi, Peng Liao, Chaoge Liu:
The Triple-Channel Model: Toward Robust and Efficient Advanced Botnets (Poster Abstract). RAID 2012: 376-377 - Lukás Durfina, Jakub Kroustek, Petr Zemek, Bretislav Kábele:
Accurate Recovery of Functions in a Retargetable Decompiler(Poster Abstract). RAID 2012: 390-392 - Luis Javier García-Villalba, Jaime Daniel Mejía Castro, Ana Lucila Sandoval Orozco, Javier Martínez Puentes:
Malware Detection System by Payload Analysis of Network Traffic (Poster Abstract). RAID 2012: 397-398 - Dina Hadziosmanovic, Lorenzo Simionato, Damiano Bolzoni, Emmanuele Zambon, Sandro Etalle:
N-Gram against the Machine: On the Feasibility of the N-Gram Network Analysis for Binary Protocols. RAID 2012: 354-373 - Shuyuan Jin, Zhi Yang, Xiang Cui:
Automatic Covert Channel Detection in Asbestos System (Poster Abstract). RAID 2012: 380-381 - Tobias Lauinger, Engin Kirda, Pietro Michiardi:
Paying for Piracy? An Analysis of One-Click Hosters' Controversial Reward Schemes. RAID 2012: 169-189 - Sebastian Lekies, Nick Nikiforakis, Walter Tighzert, Frank Piessens, Martin Johns:
DEMACRO: Defense against Malicious Cross-Domain Requests. RAID 2012: 254-273 - Shah Mahmood, Yvo Desmedt:
Online Social Networks, a Criminals Multipurpose Toolbox (Poster Abstract). RAID 2012: 374-375 - Jennifer Mankin, David R. Kaeli:
Dione: A Flexible Disk Monitoring and Analysis Framework. RAID 2012: 127-146 - Samuel Marchal, Jérôme François, Radu State, Thomas Engel:
Proactive Discovery of Phishing Related Domain Names. RAID 2012: 190-209 - Daisuke Mashima, Alvaro A. Cárdenas:
Evaluating Electricity Theft Detectors in Smart Grid Networks. RAID 2012: 210-229 - Timon Van Overveldt, Christopher Kruegel, Giovanni Vigna:
FlashDetect: ActionScript 3 Malware Detection. RAID 2012: 274-293 - Dengke Qiao, Tingwen Liu, Yong Sun, Li Guo:
EFA for Efficient Regular Expression Matching in NIDS (Poster Abstract). RAID 2012: 382-383 - Jenny Andrea Pinto Sánchez, Luis Javier García-Villalba:
Trie Data Structure to Compare Traffic Payload in a Supervised Anomaly Detection System (Poster Abstract). RAID 2012: 386-387 - Ahmed F. Shosha, Joshua James, Chen-Ching Liu, Pavel Gladyshev:
Towards Automated Forensic Event Reconstruction of Malicious Code (Poster Abstract). RAID 2012: 388-389 - Abhinav Srivastava, Himanshu Raj, Jonathon T. Giffin, Paul England:
Trusted VM Snapshots in Untrusted Cloud Infrastructures. RAID 2012: 1-21 - Olivier Thonnard, Leyla Bilge, Gavin O'Gorman, Seán Kiernan, Martin Lee:
Industrial Espionage and Targeted Attacks: Understanding the Characteristics of an Escalating Threat. RAID 2012: 64-85 - Victor C. Valgenti, Jatin Chhugani, Yan Sun, Nadathur Satish, Min Sik Kim, Changkyu Kim, Pradeep Dubey:
GPP-Grep: High-Speed Regular Expression Processing Engine on General Purpose Processors. RAID 2012: 334-353 - Victor van der Veen, Nitish dutt-Sharma, Lorenzo Cavallaro, Herbert Bos:
Memory Errors: The Past, the Present, and the Future. RAID 2012: 86-106 - Hugo Villanúa Vega, Jorge Maestre Vidal, Jaime Daniel Mejía Castro, Luis Javier García-Villalba:
Improvement of an Anagram Based NIDS by Reducing the Storage Space of Bloom Filters (Poster Abstract). RAID 2012: 393-394 - Mark Vella, Sotirios Terzis, Marc Roper:
Distress Detection (Poster Abstract). RAID 2012: 384-385 - Jorge Maestre Vidal, Hugo Villanúa Vega, Jaime Daniel Mejía Castro, Luis Javier García-Villalba:
Concurrency Optimization for NIDS (Poster Abstract). RAID 2012: 395-396 - Jinyu Wu, Lihua Yin, Binxing Fang:
Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract). RAID 2012: 378-379 - Zhi Xu, Hung-Yuan Hsu, Xin Chen, Sencun Zhu, Ali R. Hurson:
AK-PPM: An Authenticated Packet Attribution Scheme for Mobile Ad Hoc Networks. RAID 2012: 147-168 - Shengzhi Zhang, Peng Liu:
Assessing the Trustworthiness of Drivers. RAID 2012: 42-63 - Jialong Zhang, Chao Yang, Zhaoyan Xu, Guofei Gu:
PoisonAmplifier: A Guided Approach of Discovering Compromised Websites through Reversing Search Poisoning Attacks. RAID 2012: 230-253
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-19 15:17 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint