-
3
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
June
-
A. Blum, C. Dwork, F. McSherry, and K. Nissim. Practical privacy: the SuLQ framework. In Proceedings of the 24th ACM Symposium on Principles of Database Systems (PODS), pages 128-138, June 2005.
-
(2005)
Proceedings of the 24th ACM Symposium on Principles of Database Systems (PODS)
, pp. 128-138
-
-
Blum, A.1
Dwork, C.2
McSherry, F.3
Nissim, K.4
-
5
-
-
77149142916
-
Continuity analysis of programs
-
S. Chaudhuri, S. Gulwani, and R. Lublinerman. Continuity analysis of programs. ACM SIGPLAN Notices, 45(1):57-70, 2010.
-
(2010)
ACM SIGPLAN Notices
, vol.45
, Issue.1
, pp. 57-70
-
-
Chaudhuri, S.1
Gulwani, S.2
Lublinerman, R.3
-
6
-
-
0036967463
-
Use of spectral analysis in defense against DoS attacks
-
C.-M. Cheng, H. T. Kung, and K.-S. Tan. Use of spectral analysis in defense against DoS attacks. In Proceedings of IEEE GLOBECOM, volume 3, pages 2143-2148, 2002.
-
(2002)
Proceedings of IEEE GLOBECOM
, vol.3
, pp. 2143-2148
-
-
Cheng, C.-M.1
Kung, H.T.2
Tan, K.-S.3
-
7
-
-
84888402098
-
The zombie roundup: Understanding, detecting, and disrupting botnets
-
July
-
E. Cooke, F. Jahanian, and D. McPherson. The zombie roundup: Understanding, detecting, and disrupting botnets. In Proceedings of the Conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI), July 2005.
-
(2005)
Proceedings of the Conference on Steps to Reducing Unwanted Traffic on the Internet (SRUTI)
-
-
Cooke, E.1
Jahanian, F.2
McPherson, D.3
-
10
-
-
70350645515
-
The differential privacy frontier (extended abstract) , chapter 29. Springer
-
C. Dwork. The differential privacy frontier (extended abstract). In Theory of Cryptography, Lecture Notes in Computer Science, chapter 29, pages 496-502. Springer, 2009.
-
(2009)
Theory of Cryptography, Lecture Notes in Computer Science
, pp. 496-502
-
-
Dwork, C.1
-
15
-
-
85061529860
-
Bothunter: Detecting malware infection through IDS-driven dialog crrelation
-
Aug.
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee. Bothunter: Detecting malware infection through IDS-driven dialog crrelation. In Proceedings of the 16th USENIX Security Symposium, Aug. 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
17
-
-
77952402694
-
-
Nov
-
A. Gupta, K. Ligett, F. McSherry, A. Roth, and K. Talwar. Differentially private combinatorial optimization, Nov 2009. http://arxiv.org/abs/0903.4510.
-
(2009)
Differentially Private Combinatorial Optimization
-
-
Gupta, A.1
Ligett, K.2
McSherry, F.3
Roth, A.4
Talwar, K.5
-
20
-
-
70349272437
-
Spamalytics: An empirical analysis of spam marketing conversion
-
Oct.
-
C. Kanich, C. Kreibich, K. Levchenko, B. Enright, G. M. Voelker, V. Paxson, and S. Savage. Spamalytics: an empirical analysis of spam marketing conversion. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages 3-14, Oct. 2008.
-
(2008)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 3-14
-
-
Kanich, C.1
Kreibich, C.2
Levchenko, K.3
Enright, B.4
Voelker, G.M.5
Paxson, V.6
Savage, S.7
-
22
-
-
57949111704
-
What can we learn privately?
-
October
-
S. P. Kasiviswanathan, H. K. Lee, K. Nissim, S. Raskhodnikova, and A. Smith. What can we learn privately? In Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 531-540, October 2008.
-
(2008)
Proceedings of the 49th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 531-540
-
-
Kasiviswanathan, S.P.1
Lee, H.K.2
Nissim, K.3
Raskhodnikova, S.4
Smith, A.5
-
30
-
-
74049154670
-
Your botnet is my botnet: Analysis of a botnet takeover
-
B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel, and G. Vigna. Your botnet is my botnet: analysis of a botnet takeover. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), pages 635-647, 2009.
-
(2009)
Proceedings of the ACM Conference on Computer and Communications Security (CCS)
, pp. 635-647
-
-
Stone-Gross, B.1
Cova, M.2
Cavallaro, L.3
Gilbert, B.4
Szydlowski, M.5
Kemmerer, R.6
Kruegel, C.7
Vigna, G.8
|