default search action
Search dblp for Publications
export results for "toc:db/conf/acsac/acsac2002.bht:"
@inproceedings{DBLP:conf/acsac/AdelsteinSK02, author = {Frank Adelstein and Matthew Stillerman and Dexter Kozen}, title = {Malicious Code Detection for Open Firmware}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {403--412}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176312}, doi = {10.1109/CSAC.2002.1176312}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AdelsteinSK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Al-KahtaniS02, author = {Mohammad A. Al{-}Kahtani and Ravi S. Sandhu}, title = {A Model for Attribute-Based User-Role Assignment}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {353--362}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176307}, doi = {10.1109/CSAC.2002.1176307}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Al-KahtaniS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/AuraRA02, author = {Tuomas Aura and Michael Roe and Jari Arkko}, title = {Security of Internet Location Management}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {78--87}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176281}, doi = {10.1109/CSAC.2002.1176281}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/AuraRA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BarbieriBR02, author = {Roberto Barbieri and Danilo Bruschi and Emilia Rosti}, title = {Voice over IPsec: Analysis and Solutions}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {261--270}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176297}, doi = {10.1109/CSAC.2002.1176297}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BarbieriBR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BuchholzDEGGKNSS02, author = {Florian P. Buchholz and Thomas E. Daniels and James P. Early and Rajeev Gopalakrishna and R. Patrick Gorman and Benjamin A. Kuperman and Sofie Nystrom and Addam Schroll and Andrew Smith}, title = {Digging For Worms, Fishing For Answers}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {219--226}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176293}, doi = {10.1109/CSAC.2002.1176293}, timestamp = {Wed, 11 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BuchholzDEGGKNSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Clifford02, author = {Michael Clifford}, title = {Networking in The Solar Trust Model: Determining Optimal Trust Paths in a Decentralized Trust Network}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {271--281}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176298}, doi = {10.1109/CSAC.2002.1176298}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Clifford02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CorneyVAM02, author = {Malcolm Corney and Olivier Y. de Vel and Alison Anderson and George M. Mohay}, title = {Gender-Preferential Text Mining of E-mail Discourse}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {282--289}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176299}, doi = {10.1109/CSAC.2002.1176299}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CorneyVAM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/CovingtonFZA02, author = {Michael J. Covington and Prahlad Fogla and Zhiyuan Zhan and Mustaque Ahamad}, title = {A Context-Aware Security Architecture for Emerging Applications}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {249--258}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176296}, doi = {10.1109/CSAC.2002.1176296}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/CovingtonFZA02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/DouceurABBY02, author = {John R. Douceur and Atul Adya and Josh Benaloh and William J. Bolosky and Gideon Yuval}, title = {A Secure Directory Service based on Exclusive Encryption}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {172--182}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176289}, doi = {10.1109/CSAC.2002.1176289}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/DouceurABBY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GassendCDD02, author = {Blaise Gassend and Dwaine E. Clarke and Marten van Dijk and Srinivas Devadas}, title = {Controlled Physical Random Functions}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {149--160}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176287}, doi = {10.1109/CSAC.2002.1176287}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GassendCDD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GeerH02, author = {Daniel E. Geer Jr. and John Harthorne}, title = {Penetration Testing: {A} Duet}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {185--195}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176290}, doi = {10.1109/CSAC.2002.1176290}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GeerH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HaggertySM02, author = {John Haggerty and Qi Shi and Madjid Merabti}, title = {Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {413--422}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176313}, doi = {10.1109/CSAC.2002.1176313}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HaggertySM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/HybertsonRCK02, author = {Duane Hybertson and A. Reedy and S. Chapin and M. Kirwan Jr.}, title = {Enterprise Engineering And Security: Enterprise Frameworks and Architectures, and {IA} Patterns}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {293--296}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.ieeecomputersociety.org/10.1109/ACSAC.2002.10000}, doi = {10.1109/ACSAC.2002.10000}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/HybertsonRCK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Johnson02, author = {Dale M. Johnson}, title = {Wireless Security: Vulnerabilities and Countermeasures}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {91}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176282}, doi = {10.1109/CSAC.2002.1176282}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Johnson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/KargerS02, author = {Paul A. Karger and Roger R. Schell}, title = {Thirty Years Later: Lessons from the Multics Security Evaluation}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {119--126}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176285}, doi = {10.1109/CSAC.2002.1176285}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/KargerS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Kemmerer02, author = {Richard A. Kemmerer}, title = {A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {109--118}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176284}, doi = {10.1109/CSAC.2002.1176284}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Kemmerer02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Kern02, author = {Axel Kern}, title = {Advanced Features for Enterprise-Wide Role-Based Access Control}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {333--342}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176305}, doi = {10.1109/CSAC.2002.1176305}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Kern02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Langweg02, author = {Hanno Langweg}, title = {With Gaming Technology towards Secure User Interfaces}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {44--50}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176277}, doi = {10.1109/CSAC.2002.1176277}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Langweg02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LeeRKL02, author = {Dustin Lee and Jeff Rowe and Calvin Ko and Karl N. Levitt}, title = {Detecting and Defending against Web-Server Fingerprinting}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {321--330}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176304}, doi = {10.1109/CSAC.2002.1176304}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LeeRKL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/LeitoldHP02, author = {Herbert Leitold and Arno Hollosi and Reinhard Posch}, title = {Security Architecture of the Austrian Citizen Card Concept}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {391--400}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176311}, doi = {10.1109/CSAC.2002.1176311}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/LeitoldHP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Levitt02, author = {Karl N. Levitt}, title = {Intrusion Detection: Current Capabilities and Future Directions}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {365--367}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176308}, doi = {10.1109/CSAC.2002.1176308}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Levitt02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Liu02, author = {Peng Liu}, title = {Architectures for Intrusion Tolerant Database Systems}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {311--320}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176303}, doi = {10.1109/CSAC.2002.1176303}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Liu02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Marshall02, author = {Andrew D. Marshall}, title = {A Financial Institution's Legacy Mainframe Access Control System in Light of the Proposed {NIST} {RBAC} Standard}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {382--390}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176310}, doi = {10.1109/CSAC.2002.1176310}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Marshall02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/PopescuST02, author = {Bogdan C. Popescu and Maarten van Steen and Andrew S. Tanenbaum}, title = {A Security Architecture for Object-Based Distributed Systems}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {161--171}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176288}, doi = {10.1109/CSAC.2002.1176288}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/PopescuST02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ProbstEW02, author = {Stefan Probst and Wolfgang E{\ss}mayr and Edgar R. Weippl}, title = {Reusable Components for Developing Security-Aware Application}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {239--248}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176295}, doi = {10.1109/CSAC.2002.1176295}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ProbstEW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/RitcheyON02, author = {Ronald W. Ritchey and Brian O'Berry and Steven Noel}, title = {Representing {TCP/IP} Connectivity For Topological Analysis of Network Security}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {25--31}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176275}, doi = {10.1109/CSAC.2002.1176275}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/RitcheyON02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SampemaneNC02, author = {Geetanjali Sampemane and Prasad Naldurg and Roy H. Campbell}, title = {Access Control for Active Spaces}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {343--352}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176306}, doi = {10.1109/CSAC.2002.1176306}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SampemaneNC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Saydjari02, author = {O. Sami Saydjari}, title = {{LOCK} : An Historical Perspective}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {96--108}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176283}, doi = {10.1109/CSAC.2002.1176283}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/Saydjari02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchaadM02, author = {Andreas Schaad and Jonathan D. Moffett}, title = {A Framework for Organisational Control Principles}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {229--238}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176294}, doi = {10.1109/CSAC.2002.1176294}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchaadM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SchmidHG02, author = {Matthew Schmid and Frank Hill and Anup K. Ghosh}, title = {Protecting Data from Malicious Software}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {199--208}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176291}, doi = {10.1109/CSAC.2002.1176291}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/SchmidHG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ScottD02, author = {Kevin Scott and Jack W. Davidson}, title = {Safe Virtual Execution Using Software Dynamic Translation}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {209--218}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176292}, doi = {10.1109/CSAC.2002.1176292}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ScottD02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/SerbanS02, author = {Cristina Serban and O. Sami Saydjari}, title = {Themes and Highlights of the New Security Paradigms Workshop 2002}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {297--298}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176301}, doi = {10.1109/CSAC.2002.1176301}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/SerbanS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/TothK02, author = {Thomas Toth and Christopher Kr{\"{u}}gel}, title = {Evaluating the Impact of Automated Intrusion Response Mechanisms}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {301--310}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176302}, doi = {10.1109/CSAC.2002.1176302}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/TothK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Ungureanu02, author = {Victoria Ungureanu}, title = {Regulating E-Commerce through Certified Contracts}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {35--43}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176276}, doi = {10.1109/CSAC.2002.1176276}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Ungureanu02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/VignaVZK02, author = {Giovanni Vigna and Fredrik Valeur and Jingyu Zhou and Richard A. Kemmerer}, title = {Composable Tools For Network Discovery and Security Analysis}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {14--24}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176274}, doi = {10.1109/CSAC.2002.1176274}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/VignaVZK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Waldvogel02, author = {Marcel Waldvogel}, title = {{GOSSIB} vs. {IP} Traceback Rumors}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {5--13}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176273}, doi = {10.1109/CSAC.2002.1176273}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Waldvogel02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/WeberSSG02, author = {Michael Weber and Matthew Schmid and Michael Schatz and David Geyer}, title = {A Toolkit for Detecting and Analyzing Malicious Software}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {423--431}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176314}, doi = {10.1109/CSAC.2002.1176314}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/WeberSSG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/Williamson02, author = {Matthew M. Williamson}, title = {Throttling Viruses: Restricting propagation to defeat malicious mobile code}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {61--68}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176279}, doi = {10.1109/CSAC.2002.1176279}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/Williamson02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/XuLS02, author = {Donghua Xu and Chenghuai Lu and Andr{\'{e}} L. M. dos Santos}, title = {Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {51--58}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176278}, doi = {10.1109/CSAC.2002.1176278}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/XuLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/YuM02, author = {Weijiang Yu and Aloysius K. Mok}, title = {Enforcing Resource Bound Safety for Mobile {SNMP} Agents}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {69--77}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176280}, doi = {10.1109/CSAC.2002.1176280}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/YuM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/ZurkoKSB02, author = {Mary Ellen Zurko and Charlie Kaufman and Katherine Spanbauer and Chuck Bassett}, title = {Did You Ever Have To Make Up Your Mind? What Notes Users Do When Faced With {A} Security Decision}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {371--381}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176309}, doi = {10.1109/CSAC.2002.1176309}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/ZurkoKSB02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/acsac/2002, title = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://ieeexplore.ieee.org/xpl/conhome/8386/proceeding}, isbn = {0-7695-1828-1}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.