


default search action
Search dblp for Publications
export results for "toc:db/journals/dtrap/dtrap1.bht:"
@article{DBLP:journals/dtrap/0001JPZ20, author = {Xinyi Zhou and Atishay Jain and Vir V. Phoha and Reza Zafarani}, title = {Fake News Early Detection: {A} Theory-driven Model}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {12:1--12:25}, year = {2020}, url = {https://doi.org/10.1145/3377478}, doi = {10.1145/3377478}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/0001JPZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/AgadakosDJWASWK20, author = {Ioannis Agadakos and Nicholas DeMarinis and Di Jin and Kent Williams{-}King and Jearson Alfajardo and Benjamin Shteinfeld and David Williams{-}King and Vasileios P. Kemerlis and Georgios Portokalidis}, title = {Large-scale Debloating of Binary Shared Libraries}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {19:1--19:28}, year = {2020}, url = {https://doi.org/10.1145/3414997}, doi = {10.1145/3414997}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/AgadakosDJWASWK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Burton20, author = {Ren{\'{e}}e Burton}, title = {Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS Attacks}, journal = {{DTRAP}}, volume = {1}, number = {3}, pages = {14:1--14:26}, year = {2020}, url = {https://doi.org/10.1145/3377869}, doi = {10.1145/3377869}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Burton20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ChevalierPDH20, author = {Ronny Chevalier and David Plaquin and Chris I. Dalton and Guillaume Hiet}, title = {Intrusion Survivability for Commodity Operating Systems}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {21:1--21:30}, year = {2020}, url = {https://doi.org/10.1145/3419471}, doi = {10.1145/3419471}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ChevalierPDH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ChuaYGL20, author = {Mark Yep{-}Kui Chua and George O. M. Yee and Yuan Xiang Gu and Chung{-}Horng Lung}, title = {Threats to Online Advertising and Countermeasures: {A} Technical Survey}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {11:1--11:27}, year = {2020}, url = {https://doi.org/10.1145/3374136}, doi = {10.1145/3374136}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ChuaYGL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/CormackH20, author = {Andrew Cormack and Jeroen van der Ham}, title = {Introduction to the {FIRST} Special Issue}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {2:1--2:3}, year = {2020}, url = {https://doi.org/10.1145/3380746}, doi = {10.1145/3380746}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/CormackH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/DurvauxD20, author = {Fran{\c{c}}ois Durvaux and Marc Durvaux}, title = {SCA-Pitaya: {A} Practical and Affordable Side-Channel Attack Setup for Power Leakage-Based Evaluations}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {3:1--3:16}, year = {2020}, url = {https://doi.org/10.1145/3371393}, doi = {10.1145/3371393}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/DurvauxD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GajraniTL0ZG20, author = {Jyoti Gajrani and Meenakshi Tripathi and Vijay Laxmi and Gaurav Somani and Akka Zemmari and Manoj Singh Gaur}, title = {\emph{Vulvet}: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {10:1--10:25}, year = {2020}, url = {https://doi.org/10.1145/3376121}, doi = {10.1145/3376121}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GajraniTL0ZG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/GutzwillerDP20, author = {Robert S. Gutzwiller and Josiah Dykstra and Bryan D. Payne}, title = {Gaps and Opportunities in Situational Awareness for Cybersecurity}, journal = {{DTRAP}}, volume = {1}, number = {3}, pages = {18:1--18:6}, year = {2020}, url = {https://doi.org/10.1145/3384471}, doi = {10.1145/3384471}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/GutzwillerDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/KarimCHCB20, author = {Imtiaz Karim and Fabrizio Cicala and Syed Rafiul Hussain and Omar Chowdhury and Elisa Bertino}, title = {ATFuzzer: Dynamic Analysis Framework of {AT} Interface for Android Smartphones}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {23:1--23:29}, year = {2020}, url = {https://doi.org/10.1145/3416125}, doi = {10.1145/3416125}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/KarimCHCB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/KohlrauschB20, author = {Jan Kohlrausch and Eugene A. Brin}, title = {{ARIMA} Supplemented Security Metrics for Quality Assurance and Situational Awareness}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {6:1--6:21}, year = {2020}, url = {https://doi.org/10.1145/3376926}, doi = {10.1145/3376926}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/KohlrauschB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Koot20, author = {Matthijs R. Koot}, title = {Field Note on {CVE-2019-11510:} Pulse Connect Secure {SSL-VPN} in the Netherlands}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {13:1--13:7}, year = {2020}, url = {https://doi.org/10.1145/3382765}, doi = {10.1145/3382765}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Koot20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LakhotiaM20, author = {Arun Lakhotia and Leigh Metcalf}, title = {Digital Threats: Research and Practice Inaugural Issue Editorial}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {1:1--1:3}, year = {2020}, url = {https://doi.org/10.1145/3380320}, doi = {10.1145/3380320}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LakhotiaM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/LaurenzaLM20, author = {Giuseppe Laurenza and Riccardo Lazzeretti and Luca Mazzotti}, title = {Malware Triage for Early Identification of Advanced Persistent Threat Activities}, journal = {{DTRAP}}, volume = {1}, number = {3}, pages = {16:1--16:17}, year = {2020}, url = {https://doi.org/10.1145/3386581}, doi = {10.1145/3386581}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/LaurenzaLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/OsmanMHY20, author = {Tousif Osman and Mohammad Mannan and Urs Hengartner and Amr M. Youssef}, title = {Securing Applications against Side-channel Attacks through Resource Access Veto}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {22:1--22:29}, year = {2020}, url = {https://doi.org/10.1145/3416124}, doi = {10.1145/3416124}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/OsmanMHY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/PalitMP20, author = {Tapti Palit and Fabian Monrose and Michalis Polychronakis}, title = {Mitigating Data-only Attacks by Protecting Memory-resident Sensitive Data}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {20:1--20:26}, year = {2020}, url = {https://doi.org/10.1145/3419475}, doi = {10.1145/3419475}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/PalitMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/PerdisciLDLKS20, author = {Roberto Perdisci and Martina Lindorfer and Adam Doup{\'{e}} and Andrea Lanzi and Alexandros Kapravelos and Gianluca Stringhini}, title = {Introduction to the ACSAC'19 Special Issue - Part 1}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {19e:1--19e:3}, year = {2020}, url = {https://doi.org/10.1145/3437251}, doi = {10.1145/3437251}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/PerdisciLDLKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Sacher20, author = {Desiree Sacher}, title = {Fingerpointing False Positives: How to Better Integrate Continuous Improvement into Security Monitoring}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {7:1--7:7}, year = {2020}, url = {https://doi.org/10.1145/3370084}, doi = {10.1145/3370084}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Sacher20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Sanchez-RolaBS20, author = {Iskander S{\'{a}}nchez{-}Rola and Davide Balzarotti and Igor Santos}, title = {Cookies from the Past: Timing Server-side Request Processing Code for History Sniffing}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {24:1--24:24}, year = {2020}, url = {https://doi.org/10.1145/3419473}, doi = {10.1145/3419473}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Sanchez-RolaBS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ScofieldMK20, author = {Daniel Scofield and Craig Miles and Stephen Kuhn}, title = {Automated Model Learning for Accurate Detection of Malicious Digital Documents}, journal = {{DTRAP}}, volume = {1}, number = {3}, pages = {15:1--15:21}, year = {2020}, url = {https://doi.org/10.1145/3379505}, doi = {10.1145/3379505}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ScofieldMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ShuklaKMPJP20, author = {Diksha Shukla and Partha Pratim Kundu and Ravichandra Malapati and Sujit Poudel and Zhanpeng Jin and Vir V. Phoha}, title = {Thinking Unveiled: An Inference and Correlation Model to Attack {EEG} Biometrics}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {9:1--9:29}, year = {2020}, url = {https://doi.org/10.1145/3374137}, doi = {10.1145/3374137}, timestamp = {Tue, 24 Dec 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ShuklaKMPJP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/Steinhauser020, author = {Anton{\'{\i}}n Steinhauser and Petr Tuma}, title = {Database Traffic Interception for Graybox Detection of Stored and Context-sensitive {XSS}}, journal = {{DTRAP}}, volume = {1}, number = {3}, pages = {17:1--17:23}, year = {2020}, url = {https://doi.org/10.1145/3399668}, doi = {10.1145/3399668}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/Steinhauser020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/TienCBK20, author = {Chin{-}Wei Tien and Shang{-}Wen Chen and Tao Ban and Sy{-}Yen Kuo}, title = {Machine Learning Framework to Analyze IoT Malware Using {ELF} and Opcode Features}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {5:1--5:19}, year = {2020}, url = {https://doi.org/10.1145/3378448}, doi = {10.1145/3378448}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/TienCBK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/ToornS20, author = {Olivier van der Toorn and Anna Sperotto}, title = {Looking Beyond the Horizon: Thoughts on Proactive Detection of Threats}, journal = {{DTRAP}}, volume = {1}, number = {1}, pages = {4:1--4:13}, year = {2020}, url = {https://doi.org/10.1145/3373639}, doi = {10.1145/3373639}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/ToornS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/UkropKM20, author = {Martin Ukrop and Lydia Kraus and Vashek Matyas}, title = {Will You Trust This {TLS} Certificate?: Perceptions of People Working in {IT} (Extended Version)}, journal = {{DTRAP}}, volume = {1}, number = {4}, pages = {25:1--25:29}, year = {2020}, url = {https://doi.org/10.1145/3419472}, doi = {10.1145/3419472}, timestamp = {Tue, 26 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/UkropKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dtrap/WakedMY20, author = {Louis Waked and Mohammad Mannan and Amr M. Youssef}, title = {The Sorry State of {TLS} Security in Enterprise Interception Appliances}, journal = {{DTRAP}}, volume = {1}, number = {2}, pages = {8:1--8:26}, year = {2020}, url = {https://doi.org/10.1145/3372802}, doi = {10.1145/3372802}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dtrap/WakedMY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.