-
1
-
-
34547409727
-
-
The suif 2 compiler system, 2005
-
The suif 2 compiler system, 2005.
-
-
-
-
2
-
-
0036688074
-
A survey on sensor networks
-
August
-
I. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci. A survey on sensor networks. IEEE Communications Magazine, 40(8):102-114, August 2002.
-
(2002)
IEEE Communications Magazine
, vol.40
, Issue.8
, pp. 102-114
-
-
Akyildiz, I.1
Su, W.2
Sankarasubramaniam, Y.3
Cayirci, E.4
-
3
-
-
18744376889
-
-
Proceedings of the 10th ACM Conference on Computer and Communications Security CCS, October
-
E. Barrantes, D. Ackley, S. Forrest, T. Palmer, D. Stefanovic, and D. Zovi. Randomized instruction set emulation to disrupt binary code injection attacks. In In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), pages 281-289, October 2003.
-
(2003)
Randomized instruction set emulation to disrupt binary code injection attacks
, pp. 281-289
-
-
Barrantes, E.1
Ackley, D.2
Forrest, S.3
Palmer, T.4
Stefanovic, D.5
Zovi, D.6
-
4
-
-
85028765277
-
Perfectly-secure key distribution for dynamic conferences
-
C. Blundo, A. De Santis, A. Herzberg, S. Kutten, U. Vaccaro, and M. Yung. Perfectly-secure key distribution for dynamic conferences. Lecture Notes in Computer Science, 740:471-486, 1993.
-
(1993)
Lecture Notes in Computer Science
, vol.740
, pp. 471-486
-
-
Blundo, C.1
De Santis, A.2
Herzberg, A.3
Kutten, S.4
Vaccaro, U.5
Yung, M.6
-
5
-
-
0038487088
-
Random key predistribution schemes for sensor networks
-
Washington, DC, USA, IEEE Computer Society
-
H. Chan, A. Perrig, and D. Song. Random key predistribution schemes for sensor networks. In SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy, page 197, Washington, DC, USA, 2003. IEEE Computer Society.
-
(2003)
SP '03: Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 197
-
-
Chan, H.1
Perrig, A.2
Song, D.3
-
6
-
-
14944374640
-
Mitigating buffer overflows by operating system randomization
-
Technical Report CMU-CS-02-197, Department of Computer Science, Carnegie Mellon University, dec
-
M. Chew and D. Song. Mitigating buffer overflows by operating system randomization. Technical Report CMU-CS-02-197, Department of Computer Science, Carnegie Mellon University, dec 2002.
-
(2002)
-
-
Chew, M.1
Song, D.2
-
7
-
-
0004046658
-
A taxonomy of obfuscating transformations
-
Technical report, July
-
C. Collberg, C. Thomborson, and D. Low. A taxonomy of obfuscating transformations. Technical report, July 1997.
-
(1997)
-
-
Collberg, C.1
Thomborson, C.2
Low, D.3
-
9
-
-
81055157683
-
Diversity against accidental and deliberate faults
-
Washington, DC, USA, IEEE Computer Society
-
Y. Deswarte, K. Kanoun, and J-C. Laprie. Diversity against accidental and deliberate faults. In CSDA '98: Proceedings of the Conference on Computer Security, Dependability, and Assurance, page 171, Washington, DC, USA, 1998. IEEE Computer Society.
-
(1998)
CSDA '98: Proceedings of the Conference on Computer Security, Dependability, and Assurance
, pp. 171
-
-
Deswarte, Y.1
Kanoun, K.2
Laprie, J.-C.3
-
10
-
-
8344262333
-
A key management scheme for wireless sensor networks using deployment knowledge
-
Hongkong, China, March 7-11
-
W. Du, J. Deng, Y. S. Han, S. Chen, and P. Varshney. A key management scheme for wireless sensor networks using deployment knowledge. In Proceedings of the IEEE INFOCOM'04, pages 586-597, Hongkong, China, March 7-11 2004.
-
(2004)
Proceedings of the IEEE INFOCOM'04
, pp. 586-597
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Chen, S.4
Varshney, P.5
-
11
-
-
3042783638
-
A pairwise key pre-distribution scheme for wireless sensor networks
-
Washington DC, USA, October 27-31
-
W. Du, J. Deng, Y. S. Han, and P. Varshney. A pairwise key pre-distribution scheme for wireless sensor networks. In Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS), pages 42-51, Washington DC, USA, October 27-31 2003.
-
(2003)
Proceedings of the 10th ACM Conference on Computer and Communications Security (CCS)
, pp. 42-51
-
-
Du, W.1
Deng, J.2
Han, Y.S.3
Varshney, P.4
-
12
-
-
34547425208
-
-
R. J. Ellison, D. A. Fisher, R. C. Linger, H. F. Lipson, T. A. Longstaff, and N. R. Mead. Survivability: Protecting your critical systems, 1999.
-
(1999)
Survivability: Protecting your critical systems
-
-
Ellison, R.J.1
Fisher, D.A.2
Linger, R.C.3
Lipson, H.F.4
Longstaff, T.A.5
Mead, N.R.6
-
13
-
-
0038341106
-
A key management scheme for distributed sensor networks
-
New York, NY, USA, ACM Press
-
L. Eschenauer and V. D. Gligor. A key management scheme for distributed sensor networks. In CCS '02: Proceedings of the 9th A CM conference on Computer and communications security, pages 41-47, New York, NY, USA, 2002. ACM Press.
-
(2002)
CCS '02: Proceedings of the 9th A CM conference on Computer and communications security
, pp. 41-47
-
-
Eschenauer, L.1
Gligor, V.D.2
-
15
-
-
34547483839
-
-
D. Gay, P. Levis, D. Culler, and E. Brewer, nesc 1.1 language reference manual, May 2003.
-
D. Gay, P. Levis, D. Culler, and E. Brewer, nesc 1.1 language reference manual, May 2003.
-
-
-
-
16
-
-
14844282642
-
Cyberinsecurity: The cost of monopoly
-
Technical report
-
D. Geer, R. Bace, P. Gutmann, P. Metzger, C. P. Pfleeger, J. S. Quarterman, and B. Schneier. Cyberinsecurity: The cost of monopoly. Technical report, 2003.
-
(2003)
-
-
Geer, D.1
Bace, R.2
Gutmann, P.3
Metzger, P.4
Pfleeger, C.P.5
Quarterman, J.S.6
Schneier, B.7
-
17
-
-
84961725667
-
-
M. A. Hiltunen, R. D. Schlichting, C. A. Ugarte, and G. T. Wong. Survivability through customization and adaptability: The cactus approach. In In Proceedings of DARPA Information Survivability Conference and Exposition, pages 294-307, 2000.
-
M. A. Hiltunen, R. D. Schlichting, C. A. Ugarte, and G. T. Wong. Survivability through customization and adaptability: The cactus approach. In In Proceedings of DARPA Information Survivability Conference and Exposition, pages 294-307, 2000.
-
-
-
-
18
-
-
14844317200
-
Countering code-injection attacks with instruction-set randomization
-
New York, NY, USA, ACM Press
-
G. S. Kc, A. D. Keromytis, and V. Prevelakis. Countering code-injection attacks with instruction-set randomization. In CCS '03: Proceedings of the 10th A CM conference on Computer and communications security, pages 272-280, New York, NY, USA, 2003. ACM Press.
-
(2003)
CCS '03: Proceedings of the 10th A CM conference on Computer and communications security
, pp. 272-280
-
-
Kc, G.S.1
Keromytis, A.D.2
Prevelakis, V.3
-
19
-
-
0032740068
-
Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software
-
Washington, DC, USA, IEEE Computer Society
-
R. C. Linger. Systematic generation of stochastic diversity as an intrusion barrier in survivable systems software. In HICSS '99: Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences-Volume 3, page 3062, Washington, DC, USA, 1999. IEEE Computer Society.
-
(1999)
HICSS '99: Proceedings of the Thirty-Second Annual Hawaii International Conference on System Sciences
, vol.3
, pp. 3062
-
-
Linger, R.C.1
-
20
-
-
14344262813
-
Obfuscation of executable code to improve resistance to static disassembly
-
New York, NY, USA, ACM Press
-
C. Linn and S. Debray. Obfuscation of executable code to improve resistance to static disassembly. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 290-299, New York, NY, USA, 2003. ACM Press.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 290-299
-
-
Linn, C.1
Debray, S.2
-
21
-
-
3042822764
-
Establishing pairwise keys in distributed sensor networks
-
New York, NY, USA, ACM Press
-
Donggang Liu and Peng Ning. Establishing pairwise keys in distributed sensor networks. In CCS '03: Proceedings of the 10th ACM conference on Computer and communications security, pages 52-61, New York, NY, USA, 2003. ACM Press.
-
(2003)
CCS '03: Proceedings of the 10th ACM conference on Computer and communications security
, pp. 52-61
-
-
Liu, D.1
Ning, P.2
-
23
-
-
84976661022
-
Design complexity measurement and testing
-
Thomas J. McCabe and Charles W. Butler. Design complexity measurement and testing. Communications of the ACM, 32(12):1415-1425, 1989.
-
(1989)
Communications of the ACM
, vol.32
, Issue.12
, pp. 1415-1425
-
-
McCabe, T.J.1
Butler, C.W.2
-
24
-
-
34547475392
-
-
Oct
-
M. C. Mont, A. Baldwin, Y. Beres, K. Harrison, M. Sadler, and S. Shiu. Towards diversity of cots software applications: Reducing risks of widespread faults and attacks, Oct. 2000.
-
(2000)
Towards diversity of cots software applications: Reducing risks of widespread faults and attacks
-
-
Mont, M.C.1
Baldwin, A.2
Beres, Y.3
Harrison, K.4
Sadler, M.5
Shiu, S.6
-
27
-
-
14844337104
-
On achieving software diversity for improved network security using distributed coloring algorithms
-
New York, NY, USA, ACM Press
-
A. J. O'Donnell and H. Sethu. On achieving software diversity for improved network security using distributed coloring algorithms. In CCS '04: Proceedings of the 11th ACM conference on Computer and communications security, pages 121-131, New York, NY, USA, 2004. ACM Press.
-
(2004)
CCS '04: Proceedings of the 11th ACM conference on Computer and communications security
, pp. 121-131
-
-
O'Donnell, A.J.1
Sethu, H.2
-
28
-
-
0034771605
-
SPINS: Security protocols for sensor netowrks
-
A. Perrig, R. Szewczyk, V. Wen, D. E. Culler, and J. D. Tygar. SPINS: security protocols for sensor netowrks. In Mobile Computing and Networking, pages 189-199, 2001.
-
(2001)
Mobile Computing and Networking
, pp. 189-199
-
-
Perrig, A.1
Szewczyk, R.2
Wen, V.3
Culler, D.E.4
Tygar, J.D.5
-
30
-
-
14844300164
-
Resilient aggregation in sensor networks
-
New York, NY, USA, ACM Press
-
D. Wagner. Resilient aggregation in sensor networks. In SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks, pages 78-87, New York, NY, USA, 2004. ACM Press.
-
(2004)
SASN '04: Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
, pp. 78-87
-
-
Wagner, D.1
-
33
-
-
34547476456
-
-
Method of Program Code Obfuscation. PhD thesis, Wroclaw University of Technology, Institute of Engineering Cybernetics
-
G. Wroblewski. General Method of Program Code Obfuscation. PhD thesis, Wroclaw University of Technology, Institute of Engineering Cybernetics, 2002.
-
(2002)
General
-
-
Wroblewski, G.1
-
34
-
-
0242539790
-
Heterogeneous networking: A new survivability paradigm
-
New York, NY, USA, ACM Press
-
Y. Zhang, H. Vin, L. Alvisi, W. Lee, and S. K. Dao. Heterogeneous networking: a new survivability paradigm. In NSPW '01: Proceedings of the 2001 workshop on New security paradigms, pages 33-39, New York, NY, USA, 2001. ACM Press.
-
(2001)
NSPW '01: Proceedings of the 2001 workshop on New security paradigms
, pp. 33-39
-
-
Zhang, Y.1
Vin, H.2
Alvisi, L.3
Lee, W.4
Dao, S.K.5
|