-
1
-
-
84857115666
-
World of warcraft hits 10 million subscribers
-
http://www.gamasutra.com/php-bin/news_index.php?story=17062.
-
Alexander, L. 2008. World of warcraft hits 10 million subscribers. http://www.gamasutra.com/php-bin/news_index.php?story=17062.
-
(2008)
-
-
Alexander, L.1
-
4
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
Brumley, D. Newsome, J., Song, D., Wang, H., and Jha, S. 2006. Towards automatic generation of vulnerability-based signatures. In Proceedings of the IEEE Symposium on Security and Privacy.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
5
-
-
35048885595
-
Creating vulnerability signatures using weakest preconditions
-
Brumley, D., Wang, H., Jha, S., and Song, D. 2007. Creating vulnerability signatures using weakest preconditions. In Proceedings of the Computer Security Foundations Symposium.
-
(2007)
Proceedings of the Computer Security Foundations Symposium.
-
-
Brumley, D.1
Wang, H.2
Jha, S.3
Song, D.4
-
7
-
-
34547241782
-
EXE: Automatically generating inputs of death
-
Cadar, C., Ganesh, V., Pawlowski, P. M., Dill, D. L., and Engler, D. R. 2006. EXE: Automatically generating inputs of death. In Proceedings of the 13th ACM Conference on Computer and Communications Security.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security.
-
-
Cadar, C.1
Ganesh, V.2
Pawlowski, P.M.3
Dill, D.L.4
Engler, D.R.5
-
8
-
-
34547223440
-
Identifying MMORPG bots: A traffic analysis approach
-
Chen, K.-T., Jiang, J.-W., Huang, P., Chu, H.-H., LEI, C.-L., and Chen, W.-C. 2006. Identifying MMORPG bots: A traffic analysis approach. In Proceedings of the ACM SIGCHI International Conference on Advances in Computer Entertainment Technology.
-
(2006)
Proceedings of the ACM SIGCHI International Conference on Advances in Computer Entertainment Technology
-
-
Chen, K.-T.1
Jiang, J.-W.2
Huang, P.3
Chu, H.-H.4
LEI, C.-L.5
Chen, W.-C.6
-
10
-
-
41149124878
-
Secure web applications via automatic partitioning
-
Chong, S., Liu, J., Myers, A. C., Qi, X., Vikram, N., Zheng, L., and Zheng, X. 2007. Secure web applications via automatic partitioning. In Proceedings of the 21st ACM Symposium on Operating Systems Principles. 31-44.
-
(2007)
Proceedings of the 21st ACM Symposium on Operating Systems Principles
, pp. 31-44
-
-
Chong, S.1
Liu, J.2
Myers, A.C.3
Qi, X.4
Vikram, N.5
Zheng, L.6
Zheng, X.7
-
12
-
-
11244251956
-
Is runtime verification applicable to cheat detection?
-
Delap, M., Knutsson, B., lu, H., Sokolsky, O., Sammapun, U., Lee, I., and Tsarouchis, C. 2004. Is runtime verification applicable to cheat detection? In Proceedings of the 3rd ACM SIGCOMM Workshop on Network and System Support for Games.
-
(2004)
Proceedings of the 3rd ACM SIGCOMM Workshop on Network and System Support for Games.
-
-
Delap, M.1
Knutsson, B.2
lu, H.3
Sokolsky, O.4
Sammapun, U.5
Lee, I.6
Tsarouchis, C.7
-
20
-
-
84938015047
-
A method for the construction of minimum-redundancy codes
-
Huffman, D. A. 1952. A method for the construction of minimum-redundancy codes. Proc. Institute Radio Engin. 40, 9, 1098-1101.
-
(1952)
Proc. Institute Radio Engin.
, vol.40
, pp. 1098-1101
-
-
Huffman, D.A.1
-
21
-
-
77953115606
-
Cheat detection for MMORPG on P2P environments
-
Izaiku, T. Yamamoto, S., Murata, Y., Shibata, N. Yasumoto, K, and Ito, M. 2006. Cheat detection for MMORPG on P2P environments. In Proceedings of the 5th ACM SIGCOMM Workshop on Network and System Support for Games.
-
(2006)
Proceedings of the 5th ACM SIGCOMM Workshop on Network and System Support for Games.
-
-
Izaiku, T.1
Yamamoto, S.2
Murata, Y.3
Shibata, N.4
Yasumoto, K.5
Ito, M.6
-
22
-
-
77955179760
-
Efficient directionless weakest preconditions
-
CMU-CyLab-10-002, Cylab, Carnegie Mellon University.
-
Jager, I. and Brumley, D. 2010. Efficient directionless weakest preconditions. Tech. rep. CMU-CyLab-10-002, Cylab, Carnegie Mellon University.
-
(2010)
Tech. rep.
-
-
Jager, I.1
Brumley, D.2
-
23
-
-
34548788559
-
Enforcing semantic integrity on untrusted clients in networked virtual environments (extended abstract)
-
Jha, S., Katzenbeisser, S., Schallhart, C., Veith, H., and Chenney, S. 2007. Enforcing semantic integrity on untrusted clients in networked virtual environments (extended abstract). In Proceedings of the IEEE Symposium on Security and Privacy. 179-186.
-
(2007)
Proceedings of the IEEE Symposium on Security and Privacy.
, pp. 179-186
-
-
Jha, S.1
Katzenbeisser, S.2
Schallhart, C.3
Veith, H.4
Chenney, S.5
-
24
-
-
84958251037
-
Addressing cheating in distributed MMOGs
-
Kabus, P., Terpstra, W. W., Cilia, M., and Buchmann, A. P. 2005. Addressing cheating in distributed MMOGs. In Proceedings of 4th ACM SIGCOMM Workshop on Network and System Support for Games.
-
(2005)
Proceedings of 4th ACM SIGCOMM Workshop on Network and System Support for Games.
-
-
Kabus, P.1
Terpstra, W.W.2
Cilia, M.3
Buchmann, A.P.4
-
26
-
-
85077528077
-
Automating mimicry attacks using static binary analysis
-
Kruegel, C. Kirda, E. Mutz, D. Robertson, W. and Vigna, G. 2005. Automating mimicry attacks using static binary analysis. In Proceedings of the 14th USENIX Security Symposium. 161-176.
-
(2005)
Proceedings of the 14th USENIX Security Symposium.
, pp. 161-176
-
-
Kruegel, C.1
Kirda, E.2
Mutz, D.3
Robertson, W.4
Vigna, G.5
-
28
-
-
85024242899
-
Videogames sales bigger than DVD-Blu-ray for first time
-
http://www.videobusiness.com/article/CA6631456.html.
-
Magiera, M. 2009. Videogames sales bigger than DVD-Blu-ray for first time. http://www.videobusiness.com/article/CA6631456.html.
-
(2009)
-
-
Magiera, M.1
-
29
-
-
67650790241
-
Server-side bot detection in massive multiplayer online games
-
Mitterhofer, S. Platzer, C. Kruegel, C. and Kirda, E. 2009. Server-side bot detection in massive multiplayer online games. IEEE Secu. Priv. 7, 3, 18-25.
-
(2009)
IEEE Secu. Priv.
, vol.7
, pp. 18-25
-
-
Mitterhofer, S.1
Platzer, C.2
Kruegel, C.3
Kirda, E.4
-
32
-
-
0026812659
-
The design and implementation of a log-structured file system
-
Rosenblum, M. and Ousterhout, J. K. 1992. The design and implementation of a log-structured file system. ACM Trans. Comput. Syst. 10, 1, 26-52.
-
(1992)
ACM Trans. Comput. Syst.
, vol.10
, pp. 26-52
-
-
Rosenblum, M.1
Ousterhout, J.K.2
-
34
-
-
85024271134
-
Cheating in online games
-
http://internetgames.about.com/od/gamingnews/a/cheating.htm.
-
Spohn, D. Cheating in online games. http://internetgames.about.com/od/gamingnews/a/cheating.htm.
-
-
-
Spohn, D.1
-
36
-
-
74049087814
-
Privacy-preserving genomic computation through program specialization
-
Wang, R., Wang, X., Li, Z., Tang, H., Reiter, M. K., and Dong, Z. 2009. Privacy-preserving genomic computation through program specialization. In Proceedings of the 16th ACM Conference on Computer and Communications Security.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security
-
-
Wang, R.1
Wang, X.2
Li, Z.3
Tang, H.4
Reiter, M.K.5
Dong, Z.6
-
37
-
-
84856165628
-
Warcraft game maker in spying row
-
http://news.bbc.co.uk/2/hi/technology/4385050.stm.
-
Ward, M. 2005. Warcraft game maker in spying row. http://news.bbc.co.uk/2/hi/technology/4385050.stm.
-
(2005)
-
-
Ward, M.1
-
39
-
-
41249095464
-
Embedded noninteractive continuous bot detection
-
Yampolskly, R. V. and Govindaraju, V. 2007. Embedded noninteractive continuous bot detection. Comput. Entertain. 5, 4, 1-11.
-
(2007)
Comput. Entertain.
, vol.5
, pp. 1-11
-
-
Yampolskly, R.V.1
Govindaraju, V.2
-
41
-
-
33751060454
-
Automatically generating malicious disks using symbolic execution
-
Yang, J., Sar, C., Twohey, P., Cadar, C., and Engler, D. 2006. Automatically generating malicious disks using symbolic execution. in Proceedings of the IEEE Symposium on Security and Privacy.
-
(2006)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Yang, J.1
Sar, C.2
Twohey, P.3
Cadar, C.4
Engler, D.5
|