咨询与建议

限定检索结果

文献类型

  • 74 篇 会议

馆藏范围

  • 74 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 55 篇 工学
    • 53 篇 计算机科学与技术...
    • 24 篇 软件工程
    • 16 篇 信息与通信工程
    • 12 篇 控制科学与工程
    • 12 篇 安全科学与工程
    • 12 篇 网络空间安全
    • 11 篇 机械工程
    • 9 篇 交通运输工程
    • 1 篇 材料科学与工程(可...
    • 1 篇 电气工程
    • 1 篇 水利工程
    • 1 篇 测绘科学与技术
    • 1 篇 农业工程
    • 1 篇 生物工程
  • 9 篇 管理学
    • 9 篇 管理科学与工程(可...
  • 7 篇 理学
    • 5 篇 数学
    • 2 篇 物理学
    • 1 篇 生物学
    • 1 篇 统计学(可授理学、...
  • 1 篇 法学
    • 1 篇 法学

主题

  • 7 篇 security
  • 5 篇 intrusion detect...
  • 4 篇 computer archite...
  • 4 篇 network security
  • 3 篇 communication sy...
  • 3 篇 servers
  • 3 篇 distributed comp...
  • 3 篇 cloud computing
  • 3 篇 privacy
  • 3 篇 cryptography
  • 2 篇 scalability
  • 2 篇 linux
  • 2 篇 application soft...
  • 2 篇 dht
  • 2 篇 wireless sensor ...
  • 2 篇 databases
  • 2 篇 information secu...
  • 2 篇 protocols
  • 2 篇 hardware
  • 2 篇 malware

机构

  • 2 篇 ruhr university ...
  • 2 篇 institute of inf...
  • 2 篇 cispa helmholtz ...
  • 2 篇 university of ch...
  • 1 篇 indiana univ blo...
  • 1 篇 univ paris 11 lr...
  • 1 篇 univ moratuwa de...
  • 1 篇 information tran...
  • 1 篇 penn state univ ...
  • 1 篇 univ sydney fac ...
  • 1 篇 department of el...
  • 1 篇 univ calif river...
  • 1 篇 department of co...
  • 1 篇 us naval res lab...
  • 1 篇 peking univ peop...
  • 1 篇 fraunhofer insti...
  • 1 篇 department of co...
  • 1 篇 chinese acad sci...
  • 1 篇 tsinghua univers...
  • 1 篇 kunming universi...

作者

  • 2 篇 gu guofei
  • 2 篇 chen yu
  • 2 篇 fang liang
  • 2 篇 duan haixin
  • 2 篇 sun kun
  • 2 篇 wen yitong
  • 2 篇 holz thorsten
  • 2 篇 li jun
  • 2 篇 li qi
  • 2 篇 porras phillip
  • 2 篇 li fenghua
  • 1 篇 totel eric
  • 1 篇 zhang lin
  • 1 篇 zhang jialong
  • 1 篇 zhang xuemin
  • 1 篇 rache arne
  • 1 篇 imran nomica
  • 1 篇 querzoni leonard...
  • 1 篇 wang tielei
  • 1 篇 d. meng

语言

  • 74 篇 英文
检索条件"任意字段=16th Symposium on Network and Distributed System Security, NDSS 2009"
74 条 记 录,以下是1-10 订阅
排序:
Proceedings of the symposium on network and distributed system security, ndss 2009
Proceedings of the Symposium on Network and Distributed Syst...
收藏 引用
16th symposium on network and distributed system security, ndss 2009
the proceedings contain 19 papers. the topics discussed include: an efficient black-box technique for defeating web application attacks;CSAR: a practical and provable technique to make randomized systems accountable;s...
来源: 评论
Proceedings of the symposium on network and distributed system security, ndss 2001
Proceedings of the Symposium on Network and Distributed Syst...
收藏 引用
8th symposium on network and distributed system security, ndss 2001
the proceedings contain 16 papers. the topics discussed include: an algebraic approach to IP traceback;an architecture for flexible multi-security domain networks;authenticating streamed data in the presence of random...
来源: 评论
Proceedings of the symposium on network and distributed system security, ndss 2005
Proceedings of the Symposium on Network and Distributed Syst...
收藏 引用
12th symposium on network and distributed system security, ndss 2005
the proceedings contain 16 papers. the topics discussed include: a black-box tracing technique to identify causes of least-privilege incompatibilities;DIRA: automatic detection, identification, and repair of control-h...
来源: 评论
Proceedings of the symposium on network and distributed system security, ndss 2004
Proceedings of the Symposium on Network and Distributed Syst...
收藏 引用
11th symposium on network and distributed system security, ndss 2004
the proceedings contain 16 papers. the topics discussed include: a practical dynamic buffer overflow detector;an effective architecture and algorithm for detecting worms with various scan techniques;authentication and...
来源: 评论
Two-Party Computation Model for Privacy-Preserving Queries over distributed Databases  16
Two-Party Computation Model for Privacy-Preserving Queries o...
收藏 引用
16th symposium on network and distributed system security, ndss 2009
作者: Chow, Sherman S.M. Lee, Jie-Han Subramanian, Lakshminarayanan Department of Computer Science Courant Institute of Mathematical Sciences New York University NY10012 United States
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographic techniques. In addition, many of the...
来源: 评论
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution  16
IntScope: Automatically Detecting Integer Overflow Vulnerabi...
收藏 引用
16th symposium on network and distributed system security, ndss 2009
作者: Wang, Tielei Wei, Tao Lin, Zhiqiang Zou, Wei Key Laboratory of Network and Software Security Assurance Institute of Computer Science and Technology Peking University China Department of Computer Science Purdue University United States
the number of identified integer overflow vulnerabilities has been increasing rapidly in recent years. In this paper, we present a system, IntScope, which can automatically detect integer overflow vulnerabilities in x...
来源: 评论
RAINBOW: A Robust And Invisible Non-Blind Watermark for network Flows  16
RAINBOW: A Robust And Invisible Non-Blind Watermark for Netw...
收藏 引用
16th symposium on network and distributed system security, ndss 2009
作者: Houmansadr, Amir Kiyavash, Negar Borisov, Nikita Dept. of Electrical and Computer Engineering University of Illinois at Urbana–Champaign United States Dept. of Industrial and Enterprise Systems Engineering University of Illinois at Urbana–Champaign United States
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to reduce errors. Watermarking techniques all...
来源: 评论
K-Tracer: A system for Extracting Kernel Malware Behavior  16
K-Tracer: A System for Extracting Kernel Malware Behavior
收藏 引用
16th symposium on network and distributed system security, ndss 2009
作者: Lanzi, Andrea Sharif, Monirul Lee, Wenke School of Computer Science College of Computing Georgia Institute of Technology United States Dipartimento di Informatica e Comunicazione Università degli Studi di Milano Italy
Kernel rootkits can provide user level-malware programs with the additional capabilities of hiding their malicious activities by altering the legitimate kernel behavior of an operating system. While existing research ...
来源: 评论
the Blind Stone Tablet: Outsourcing Durability to Untrusted Parties  16
The Blind Stone Tablet: Outsourcing Durability to Untrusted ...
收藏 引用
16th symposium on network and distributed system security, ndss 2009
作者: Williams, Peter Sion, Radu Shasha, Dennis Network Security and Applied Cryptography Lab Stony Brook University United States Department of Computer Science New York University United States
We introduce a new paradigm for outsourcing the durability property of a multi-client transactional database to an untrusted service provider. Specifically, we enable untrusted service providers to support transaction...
来源: 评论
DELTA: A security Assessment Framework for Software-Defined networks  24
DELTA: A Security Assessment Framework for Software-Defined ...
收藏 引用
24th Annual network and distributed system security symposium (ndss)
作者: Lee, Seungsoo Yoon, Changhoon Lee, Chanhee Shin, Seungwon Yegneswaran, Vinod Porras, Phillip Korea Adv Inst Sci & Technol Daejeon South Korea SRI Int 333 Ravenswood Ave Menlo Pk CA 94025 USA
Developing a systematic understanding of the attack surface of emergent networks, such as software-defined networks (SDNs), is necessary and arguably the starting point toward making it more secure. Prior studies have... 详细信息
来源: 评论