-
Notifications
You must be signed in to change notification settings - Fork 9
/
Copy pathcitation.txt
3803 lines (1902 loc) · 382 KB
/
citation.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
A Day at the Root of the Internet was cited by 68 at https://scholar.google.com/scholar?cites=811334893435739320&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Inferring Internet Denial-of-Service Activity was cited by 1775 at https://scholar.google.com/scholar?cites=7909955153349234772&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Census and Survey of the Visible Internet was cited by 120 at https://scholar.google.com/scholar?cites=13490542110191814510&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Internet Background Radiation Revisited was cited by 112 at https://scholar.google.com/scholar?cites=3437062353707585979&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Selecting Representative IP Addresses for Internet Topology Studies was cited by 18 at https://scholar.google.com/scholar?cites=16151011095905412653&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Analysis of a “/0” Stealth Scan from a Botnet was cited by this title hasn't been cited at no URL with one result was found
Towards Geolocation of Millions of IP Addresses was cited by 25 at https://scholar.google.com/scholar?cites=5623257175792552168&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Taming the 800 Pound Gorilla: The Rise and Decline of NTP DDoS Attacks was cited by 61 at https://scholar.google.com/scholar?cites=1162221029315330587&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
bdrmap: Inference of Borders Between IP Networks was cited by 1 at https://scholar.google.com/scholar?cites=12771159040459437191&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Anycast vs. DDoS: Evaluating the November 2015 Root DNS Event (extended) was cited by 10 at https://scholar.google.com/scholar?cites=7623720216727532254&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Lost in Space: Improving Inference of IPv4 Address Space Utilization was cited by 5 at https://scholar.google.com/scholar?cites=6364276854478530531&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
DARPA-2009 Intrusion Detection Dataset Report was cited by 5 at https://scholar.google.com/scholar?cites=17955441462995863921&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
A Comparison of Traffic from the DNS Root Nameservers as Measured in DITL 2006 and 2007 was cited by 68 at https://scholar.google.com/scholar?cites=811334893435739320&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
The Internet Motion Sensor: A distributed global scoped Internet threat monitoring system was cited by 11 at https://scholar.google.com/scholar?cites=83979710471235738&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
An Organization-Level View of the Internet and its Implications (extended) was cited by 7 at https://scholar.google.com/scholar?cites=1478363228390402432&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Characterizing Anycast in the Domain Name System was cited by this title hasn't been cited at no URL with one result was found
Identifying and Characterizing Anycast in the Domain Name System was cited by 4 at https://scholar.google.com/scholar?cites=15157092477680562513&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Detecting Internet Outages with Precise Active Probing (extended) was cited by 14 at https://scholar.google.com/scholar?cites=17121940186855972648&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Characterization of Blacklists and Tainted Network Traffic was cited by 11 at https://scholar.google.com/scholar?cites=4976021285795308993&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
The Day After Patch Tuesday: Effects Observable in IP Darkspace Traffic was cited by 3 at https://scholar.google.com/scholar?cites=12350256496819106558&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Trinocular: Understanding Internet Reliability Through Adaptive Probing was cited by 55 at https://scholar.google.com/scholar?cites=6855526723048991256&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
InterTubes: A Study of the US Long-haul Fiber-optic Infrastructure was cited by 21 at https://scholar.google.com/scholar?cites=5691944743466630545&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
An Empirical Study of Web Cookies was cited by 9 at https://scholar.google.com/scholar?cites=1063595242777511960&as_sdt=5,37&sciodt=0,37&hl=en with one result was found
Speedtrap: Internet-Scale IPv6 Alias Resolution was cited by 13 at https://scholar.google.com/scholar?cites=6572572659651859614&as_sdt=5,37&sciodt=0,37&hl=en with one result
Understanding IPv6 Internet Background Radiation was cited by 18 at https://scholar.google.com/scholar?cites=345011578045252893&as_sdt=5,37&sciodt=0,37&hl=en with one result
Understanding the Domain Registration Behavior of Spammers was cited by 32 at https://scholar.google.com/scholar?cites=7512202623210997718&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names was cited by 257 at https://scholar.google.com/scholar?cites=15356404460122698060&as_sdt=5,37&sciodt=0,37&hl=en with one result
Follow the Money was cited by 141 at https://scholar.google.com/scholar?cites=9435841502106039381&as_sdt=5,37&sciodt=0,37&hl=en with one result
Unauthorized origin crossing on mobile platforms: threats and mitigation was cited by 64 at https://scholar.google.com/scholar?cites=9803433073359103443&as_sdt=5,37&sciodt=0,37&hl=en with one result
Practical Anonymous Password Authentication and TLS with Anonymous Client Authentication was cited by 4 at https://scholar.google.com/scholar?cites=17683294442551306737&as_sdt=5,37&sciodt=0,37&hl=en with one result
Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments was cited by 2 at https://scholar.google.com/scholar?cites=2941354440701728623&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Comprehensive Formal Security Analysis of OAuth 2.0 was cited by 14 at https://scholar.google.com/scholar?cites=13718226096832448571&as_sdt=5,37&sciodt=0,37&hl=en with one result
An Empirical Study of Mnemonic Sentence-based Password Generation Strategies was cited by 1 at https://scholar.google.com/scholar?cites=28888078417666027&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the Security of Cracking-Resistant Password Vaults was cited by 5 at https://scholar.google.com/scholar?cites=17208346990266801320&as_sdt=5,37&sciodt=0,37&hl=en with one result
Targeted Online Password Guessing: An Underestimated Threat was cited by 21 at https://scholar.google.com/scholar?cites=4175894818658723848&as_sdt=5,37&sciodt=0,37&hl=en with one result
PIPSEA: A Practical IPsec Gateway on Embedded APUs was cited by 1 at https://scholar.google.com/scholar?cites=8706466493503941543&as_sdt=5,37&sciodt=0,37&hl=en with one result
MiddlePolice: Toward Enforcing Destination-Defined Policies in the Middle of the Internet was cited by this title hasn't been cited at no URL with one result
Protecting Insecure Communications with Topology-aware Network Tunnels was cited by this title hasn't been cited at no URL with one result
Function Secret Sharing: Improvements and Extensions was cited by 5 at https://scholar.google.com/scholar?cites=14147689856456578327&as_sdt=5,37&sciodt=0,37&hl=en with one result
Hash First, Argue Later was cited by 4 at https://scholar.google.com/scholar?cites=1809801648792914256&as_sdt=5,37&sciodt=0,37&hl=en with one result
Practical Non-Malleable Codes from `-more Extractable Hash Functions was cited by 1 at https://scholar.google.com/scholar?cites=3780300863869104719&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Surfeit of SSH Cipher Suites was cited by 2 at https://scholar.google.com/scholar?cites=4188305243377358241&as_sdt=5,37&sciodt=0,37&hl=en with one result
Systematic Fuzzing and Testing of TLS Libraries was cited by 9 at https://scholar.google.com/scholar?cites=10407271842162555608&as_sdt=5,37&sciodt=0,37&hl=en with one result
Attacking OpenSSL Implementation of ECDSA with a Few Signatures was cited by 1 at https://scholar.google.com/scholar?cites=4664754276862177150&as_sdt=5,37&sciodt=0,37&hl=en with one result
Content Security Problems? was cited by 3 at https://scholar.google.com/scholar?cites=4766706908800850857&as_sdt=5,37&sciodt=0,37&hl=en with one result
CSP Is Dead, Long Live CSP! On the Insecurity of Whitelists and the Future of Content Security Policy was cited by 3 at https://scholar.google.com/scholar?cites=914192711504016624&as_sdt=5,37&sciodt=0,37&hl=en with one result
Online Tracking: A 1-million-site Measurement and Analysis was cited by 52 at https://scholar.google.com/scholar?cites=13642398715811800049&as_sdt=5,37&sciodt=0,37&hl=en with one result
PhishEye: Live Monitoring of Sandboxed Phishing Kits was cited by 3 at https://scholar.google.com/scholar?cites=15013951061059876324&as_sdt=5,37&sciodt=0,37&hl=en with one result
All Your DNS Records Point to Us was cited by this title hasn't been cited at no URL with one result
Identifying the Scan and Attack Infrastructures Behind Amplification DDoS Attacks was cited by 3 at https://scholar.google.com/scholar?cites=5093482519369155380&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Unilateral-to-Mutual Authentication Compiler for Key Exchange (with Applications to Client Authentication in TLS 1.3) ∗ was cited by 3 at https://scholar.google.com/scholar?cites=9686584501732298423&as_sdt=5,37&sciodt=0,37&hl=en with one result
Attribute-based Key Exchange with General Policies was cited by 3 at https://scholar.google.com/scholar?cites=17941479139769087353&as_sdt=5,37&sciodt=0,37&hl=en with one result
Identity-Concealed Authenticated Encryption and Key Exchange was cited by 1 at https://scholar.google.com/scholar?cites=7524772657274036271&as_sdt=5,37&sciodt=0,37&hl=en with one result
Generic Attacks on Secure Outsourced Databases was cited by 11 at https://scholar.google.com/scholar?cites=11870367699876238884&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Shadow Nemesis: Inference Attacks on Efficiently Deployable, Efficiently Searchable Encryption was cited by 6 at https://scholar.google.com/scholar?cites=10943916844477869956&as_sdt=5,37&sciodt=0,37&hl=en with one result
Breaking Web Applications Built On Top of Encrypted Data was cited by 10 at https://scholar.google.com/scholar?cites=3612130915180424473&as_sdt=5,37&sciodt=0,37&hl=en with one result
Host of Troubles: Multiple Host Ambiguities in HTTP Implementations was cited by this title hasn't been cited at no URL with one result
Accessorize to a Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition was cited by 32 at https://scholar.google.com/scholar?cites=10006479087737690195&as_sdt=5,37&sciodt=0,37&hl=en with one result
Lurking Malice in the Cloud: Understanding and Detecting Cloud Repository as a Malicious Service was cited by this title hasn't been cited at no URL with one result
Safely Measuring Tor was cited by 10 at https://scholar.google.com/scholar?cites=12518142941683452046&as_sdt=5,37&sciodt=0,37&hl=en with one result
PREDATOR: Proactive Recognition and Elimination of Domain Abuse at Time-Of-Registration was cited by 9 at https://scholar.google.com/scholar?cites=7879985184850770311&as_sdt=5,37&sciodt=0,37&hl=en with one result
Stemming Downlink Leakage from Training Sequences in Multi-User MIMO Networks was cited by this title hasn't been cited at no URL with one result
A Protocol for Privately Reporting Ad Impressions at Scale was cited by this title hasn't been cited at no URL with one result
Secure Stable Matching at Scale was cited by 3 at https://scholar.google.com/scholar?cites=5939152554837528243&as_sdt=5,37&sciodt=0,37&hl=en with one result
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme was cited by 4 at https://scholar.google.com/scholar?cites=5603548024341653417&as_sdt=5,37&sciodt=0,37&hl=en with one result
ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels was cited by 24 at https://scholar.google.com/scholar?cites=3176078557830167958&as_sdt=5,37&sciodt=0,37&hl=en with one result
Make Sure DSA Signing Exponentiations Really are Constant-Time was cited by 13 at https://scholar.google.com/scholar?cites=16725086919804612439&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the Provable Security of (EC)DSA Signatures was cited by this title hasn't been cited at no URL with one result
Android ION Hazard: the Curse of Customizable Memory Management System was cited by 3 at https://scholar.google.com/scholar?cites=2571854760041895611&as_sdt=5,37&sciodt=0,37&hl=en with one result
Drammer: Deterministic Rowhammer Attacks on Mobile Platforms was cited by 19 at https://scholar.google.com/scholar?cites=15710660060966945497&as_sdt=5,37&sciodt=0,37&hl=en with one result
SFADiff: Automated Evasion Attacks and Fingerprinting Using Black-box Differential Automata Learning was cited by 4 at https://scholar.google.com/scholar?cites=17951637873951307503&as_sdt=5,37&sciodt=0,37&hl=en with one result
Slitheen: Perfectly Imitated Decoy Routing through Traffic Replacement was cited by 3 at https://scholar.google.com/scholar?cites=17782747322558598513&as_sdt=5,37&sciodt=0,37&hl=en with one result
Practical Censorship Evasion Leveraging Content Delivery Networks was cited by 1 at https://scholar.google.com/scholar?cites=15213622667537727388&as_sdt=5,37&sciodt=0,37&hl=en with one result
GAME OF DECOYS: Optimal Decoy Routing Through Game Theory was cited by 2 at https://scholar.google.com/scholar?cites=895386819995597386&as_sdt=5,37&sciodt=0,37&hl=en with one result
Metric tree-like structures in real-life networks: an empirical study was cited by 32 at https://scholar.google.com/scholar?cites=1363791946363880785&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Novel Methodology of Router-To-AS Mapping inspired by Community Discovery was cited by this title hasn't been cited at no URL with one result
Timeouts: Beware Surprisingly High Delay was cited by 4 at https://scholar.google.com/scholar?cites=15842470697307725020&as_sdt=5,37&sciodt=0,37&hl=en with one result
A polyscale autonomous sliding window for cognitive machine classification of malicious Internet traffic was cited by 3 at https://scholar.google.com/scholar?cites=15029819035945694034&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Cognitive Multifractal Approach to Characterize Complexity of Non-Stationary and Malicious DNS Data Traffic Using Adaptive Sliding Window was cited by 2 at https://scholar.google.com/scholar?cites=4380344902522720510&as_sdt=5,37&sciodt=0,37&hl=en with one result
Feature Selection for Robust Backscatter DDoS Detection was cited by 1 at https://scholar.google.com/scholar?cites=9741070899653022220&as_sdt=5,37&sciodt=0,37&hl=en with one result
Router-level community structure of the Internet Autonomous Systems was cited by this title hasn't been cited at no URL with one result
Entropy-Based Characterization of Internet Background Radiation was cited by 4 at https://scholar.google.com/scholar?cites=8739178151487223077&as_sdt=5,37&sciodt=0,37&hl=en with one result
Lost in Space: Improving Inference of IPv4 Address Space Utilization was cited by 6 at https://scholar.google.com/scholar?cites=6364276854478530531&as_sdt=5,37&sciodt=0,37&hl=en with one result
Evidence of spatial embedding in the IPv4 router-level Internet network was cited by this title hasn't been cited at no URL with one result
Detection of Low-Rate Attacks in Computer Networks was cited by 21 at https://scholar.google.com/scholar?cites=5168482587314092425&as_sdt=5,37&sciodt=0,37&hl=en with one result
Seeing through Network-Protocol Obfuscation was cited by 14 at https://scholar.google.com/scholar?cites=15416292495714512043&as_sdt=5,37&sciodt=0,37&hl=en with one result
Maneuvering Around Clouds: Bypassing Cloud-based Security Providers was cited by 14 at https://scholar.google.com/scholar?cites=9692940902353914491&as_sdt=5,37&sciodt=0,37&hl=en with one result
Making Smart Contracts Smarter was cited by 38 at https://scholar.google.com/scholar?cites=6432151063640337580&as_sdt=5,37&sciodt=0,37&hl=en with one result
Coverage-based Greybox Fuzzing as Markov Chain was cited by 10 at https://scholar.google.com/scholar?cites=17906571063200023248&as_sdt=5,37&sciodt=0,37&hl=en with one result
Twice the Bits, Twice the Trouble: Vulnerabilities Induced by Migrating to 64-Bit Platforms was cited by 1 at https://scholar.google.com/scholar?cites=5751124182054159362&as_sdt=5,37&sciodt=0,37&hl=en with one result
Chainsaw: Chained Automated Workflow-based Exploit Generation was cited by this title hasn't been cited at no URL with one result
An In-Depth Study of More Than Ten Years of Java Exploitation was cited by 2 at https://scholar.google.com/scholar?cites=17190152291480177134&as_sdt=5,37&sciodt=0,37&hl=en with one result
Spectral Fractal Dimension Trajectory to Measure Cognitive Complexity of Malicious DNS Traffic was cited by this title hasn't been cited at no URL with one result
Uncovering Network Tarpits with Degreaser was cited by 10 at https://scholar.google.com/scholar?cites=2370849298691459979&as_sdt=5,37&sciodt=0,37&hl=en with one result
An Empirical Comparison of Botnet Detection Methods was cited by 70 at https://scholar.google.com/scholar?cites=1129484356263965816&as_sdt=5,37&sciodt=0,37&hl=en with one result
Toward Understanding Distributed Blackhole Placement was cited by 157 at https://scholar.google.com/scholar?cites=12858176813220407124&as_sdt=5,37&sciodt=0,37&hl=en with one result
Measuring IPv6 Adoption was cited by 92 at https://scholar.google.com/scholar?cites=18156266556939716254&as_sdt=5,37&sciodt=0,37&hl=en with one result
Understanding Address Usage in the Visible Internet was cited by 4 at https://scholar.google.com/scholar?cites=6805061838576732448&as_sdt=5,37&sciodt=0,37&hl=en with one result
Deep Learning with Differential Privacy was cited by 64 at https://scholar.google.com/scholar?cites=11431158613977668861&as_sdt=5,37&sciodt=0,37&hl=en with one result
Membership Privacy in MicroRNA-based Studies was cited by 4 at https://scholar.google.com/scholar?cites=1968860974928925325&as_sdt=5,37&sciodt=0,37&hl=en with one result
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime was cited by 9 at https://scholar.google.com/scholar?cites=14808735743924094460&as_sdt=5,37&sciodt=0,37&hl=en with one result
Statistical Deobfuscation of Android Applications was cited by 7 at https://scholar.google.com/scholar?cites=2636419894504604670&as_sdt=5,37&sciodt=0,37&hl=en with one result
Robot check failed at Reliable Third-Party Library Detection in Android and its Security Applications 3832.61924291
Reliable Third-Party Library Detection in Android and its Security Applications was cited by 11 at https://scholar.google.com/scholar?cites=13311274328101323432&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Systematic Analysis of the Juniper Dual EC Incident was cited by 9 at https://scholar.google.com/scholar?cites=1466646686394876905&as_sdt=5,37&sciodt=0,37&hl=en with one result
Measurement and Analysis of Private Key Sharing in the HTTPS Ecosystem was cited by 5 at https://scholar.google.com/scholar?cites=1554851145918694564&as_sdt=5,37&sciodt=0,37&hl=en with one result
Towards Characterizing International Routing Detours was cited by this title hasn't been cited at no URL with one result
How and How Much Traceroute Confuses Our Understanding of Network Paths was cited by 2 at https://scholar.google.com/scholar?cites=14170039588853192043&as_sdt=5,37&sciodt=0,37&hl=en with one result
Robot check failed at Network Topology Inference With Partial Information 1112.80744314
Robot check failed at Network Topology Inference With Partial Information 29.296200037
Network Topology Inference With Partial Information was cited by 2 at https://scholar.google.com/scholar?cites=17508517276108127209&as_sdt=5,37&sciodt=0,37&hl=en with one result
Detecting Malicious Activity with DNS Backscatter was cited by 2 at https://scholar.google.com/scholar?cites=14424491298128092478&as_sdt=5,37&sciodt=0,37&hl=en with one result
Revealing Middlebox Interference with Tracebox was cited by 72 at https://scholar.google.com/scholar?cites=15627506762952195333&as_sdt=5,37&sciodt=0,37&hl=en with one result
Speedtrap: Internet-Scale IPv6 Alias Resolution was cited by 13 at https://scholar.google.com/scholar?cites=6572572659651859614&as_sdt=5,37&sciodt=0,37&hl=en with one result
Understanding IPv6 Internet Background Radiation was cited by 18 at https://scholar.google.com/scholar?cites=345011578045252893&as_sdt=5,37&sciodt=0,37&hl=en with one result
Understanding the Domain Registration Behavior of Spammers was cited by 32 at https://scholar.google.com/scholar?cites=7512202623210997718&as_sdt=5,37&sciodt=0,37&hl=en with one result
UniSan: Proactive Kernel Memory Initialization to Eliminate Data Leakages was cited by 5 at https://scholar.google.com/scholar?cites=16748633301892932343&as_sdt=5,37&sciodt=0,37&hl=en with one result
Using Reflexive Eye Movements for Fast Challenge-Response Authentication was cited by 3 at https://scholar.google.com/scholar?cites=17005877688545749808&as_sdt=5,37&sciodt=0,37&hl=en with one result
When CSI Meets Public WiFi: Inferring Your Mobile Phone Password via WiFi Signals was cited by 8 at https://scholar.google.com/scholar?cites=11918389866628987432&as_sdt=5,37&sciodt=0,37&hl=en with one result
VoiceLive: A Phoneme Localization based Liveness Detection for Voice Authentication on Smartphones was cited by 3 at https://scholar.google.com/scholar?cites=6745503258938001037&as_sdt=5,37&sciodt=0,37&hl=en with one result
New Security Threats Caused by IMS-based SMS Service in 4G LTE Networks was cited by 1 at https://scholar.google.com/scholar?cites=4816624783289078192&as_sdt=5,37&sciodt=0,37&hl=en with one result
Draco: A System for Uniform and Fine-grained Access Control for Web Code on Android was cited by 6 at https://scholar.google.com/scholar?cites=4086055585823884635&as_sdt=5,37&sciodt=0,37&hl=en with one result
Limiting the Impact of Stealthy Attacks on Industrial Control Systems was cited by 16 at https://scholar.google.com/scholar?cites=13850802314636514540&as_sdt=5,37&sciodt=0,37&hl=en with one result
DPSense: Differentially Private Crowdsourced Spectrum Sensing was cited by 3 at https://scholar.google.com/scholar?cites=6329550579838428872&as_sdt=5,37&sciodt=0,37&hl=en with one result
High Fidelity Data Reduction for Big Data Security Dependency Analyses was cited by 1 at https://scholar.google.com/scholar?cites=12498813409400778977&as_sdt=5,37&sciodt=0,37&hl=en with one result
How I Learned to be Secure: a Census-Representative Survey of Security Advice Sources and Behavior was cited by 9 at https://scholar.google.com/scholar?cites=18010245584436559758&as_sdt=5,37&sciodt=0,37&hl=en with one result
Acing the IOC Game: Toward Automatic Discovery and Analysis of Open-Source Cyber Threat Intelligence was cited by 5 at https://scholar.google.com/scholar?cites=11814194932048585230&as_sdt=5,37&sciodt=0,37&hl=en with one result
On Measuring the Geographic Diversity of Internet Routes was cited by this title hasn't been cited at no URL with one result
Shades of Grey: On the effectiveness of reputation-based “blacklists” was cited by 102 at https://scholar.google.com/scholar?cites=9103410351490413847&as_sdt=5,37&sciodt=0,37&hl=en with one result
VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits was cited by 13 at https://scholar.google.com/scholar?cites=16884142676570073831&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Misuse of Android Unix Domain Sockets and Security Implications was cited by 3 at https://scholar.google.com/scholar?cites=7864868936943673446&as_sdt=5,37&sciodt=0,37&hl=en with one result
Call Me Back! Attacks on System Server and System Apps in Android through Synchronous Callback was cited by 2 at https://scholar.google.com/scholar?cites=1449798913162140505&as_sdt=5,37&sciodt=0,37&hl=en with one result
Over-The-Top Bypass: Study of a Recent Telephony Fraud was cited by 1 at https://scholar.google.com/scholar?cites=8743831489877529407&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the Practical (In-)Security of 64-bit Block Ciphers Collision Attacks on HTTP over TLS and OpenVPN was cited by 17 at https://scholar.google.com/scholar?cites=14256953318701896648&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Blaster Worm: Then and Now was cited by 146 at https://scholar.google.com/scholar?cites=17872539676055773633&as_sdt=5,37&sciodt=0,37&hl=en with one result
Remote Detection of Bottleneck Links Using Spectral and Statistical Methods was cited by 25 at https://scholar.google.com/scholar?cites=14540473357807873698&as_sdt=5,37&sciodt=0,37&hl=en with one result
Data Reduction for the Scalable Automated Analysis of Distributed Darknet Traffic was cited by 72 at https://scholar.google.com/scholar?cites=12935228111567812558&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Internet Motion Sensor: A Distributed Blackhole Monitoring System was cited by 321 at https://scholar.google.com/scholar?cites=13881688031439320398&as_sdt=5,37&sciodt=0,37&hl=en with one result
Scalable Graph-based Bug Search for Firmware Images was cited by 6 at https://scholar.google.com/scholar?cites=18422740073759351945&as_sdt=5,37&sciodt=0,37&hl=en with one result
On Code Execution Tracking via Power Side-Channe was cited by 1 at https://scholar.google.com/scholar?cites=10628127186142140601&as_sdt=5,37&sciodt=0,37&hl=en with one result
POPE: Partial Order Preserving Encoding was cited by 11 at https://scholar.google.com/scholar?cites=985810776726263824&as_sdt=5,37&sciodt=0,37&hl=en with one result
Σoφoς– Forward Secure Searchable Encryption was cited by 10 at https://scholar.google.com/scholar?cites=3284050798733755105&as_sdt=5,37&sciodt=0,37&hl=en with one result
What Else is Revealed by Order-Revealing Encryption? was cited by 9 at https://scholar.google.com/scholar?cites=16924615591575494641&as_sdt=5,37&sciodt=0,37&hl=en with one result
EpicRec: Towards Practical Differentially Private Framework for Personalized Recommendation was cited by 4 at https://scholar.google.com/scholar?cites=5190071631465271075&as_sdt=5,37&sciodt=0,37&hl=en with one result
MPC-Friendly Symmetric Key Primitives was cited by 6 at https://scholar.google.com/scholar?cites=993494670680074981&as_sdt=5,37&sciodt=0,37&hl=en with one result
SmartWalk: Enhancing Social Network Security via Adaptive Random Walks was cited by 2 at https://scholar.google.com/scholar?cites=10076505028915726192&as_sdt=5,37&sciodt=0,37&hl=en with one result
CREDAL: Towards Locating a Memory Corruption Vulnerability with Your Core Dump was cited by 2 at https://scholar.google.com/scholar?cites=12137480242139900548&as_sdt=5,37&sciodt=0,37&hl=en with one result
CSPAutoGen: Black-box Enforcement of Content Security Policy upon Real-world Websites was cited by 2 at https://scholar.google.com/scholar?cites=12449557987455156263&as_sdt=5,37&sciodt=0,37&hl=en with one result
Practical Detection of Entropy Loss in Pseudo-Random Number Generators was cited by 3 at https://scholar.google.com/scholar?cites=2473471604726456845&as_sdt=5,37&sciodt=0,37&hl=en with one result
SandScout: Automatic Detection of Flaws in iOS Sandbox Profiles was cited by this title hasn't been cited at no URL with one result
C-FLAT: Control-Flow Attestation for Embedded Systems Software was cited by 13 at https://scholar.google.com/scholar?cites=6784708804180011693&as_sdt=5,37&sciodt=0,37&hl=en with one result
FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature was cited by 3 at https://scholar.google.com/scholar?cites=9216497378408790540&as_sdt=5,37&sciodt=0,37&hl=en with one result
The “Web/Local” Boundary Is Fuzzy: A Security Study of Chrome’s Process-based Sandboxing was cited by 3 at https://scholar.google.com/scholar?cites=4652258651316906860&as_sdt=5,37&sciodt=0,37&hl=en with one result
Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy was cited by 5 at https://scholar.google.com/scholar?cites=13428871693276097949&as_sdt=5,37&sciodt=0,37&hl=en with one result
Detecting Advanced Persistent Threats using Fractal Dimension based Machine Learning Classification was cited by 5 at https://scholar.google.com/scholar?cites=4919244207351490976&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Software Approach to Defeating Side Channels in Last-Level Caches was cited by 14 at https://scholar.google.com/scholar?cites=18252288386536292940&as_sdt=5,37&sciodt=0,37&hl=en with one result
iLock: Immediate and Automatic Locking of Mobile Devices against Data Theft was cited by 2 at https://scholar.google.com/scholar?cites=1658253308409220493&as_sdt=5,37&sciodt=0,37&hl=en with one result
Hypnoguard: Protecting Secrets across Sleep-wake Cycles was cited by 1 at https://scholar.google.com/scholar?cites=12727742757463322152&as_sdt=5,37&sciodt=0,37&hl=en with one result
5Gen: A Framework for Prototyping Applications Using Multilinear Maps and Matrix Branching Programs was cited by 6 at https://scholar.google.com/scholar?cites=10406770715666369003&as_sdt=5,37&sciodt=0,37&hl=en with one result
Functional Lattice Cryptography was cited by 2 at https://scholar.google.com/scholar?cites=6732246328086187067&as_sdt=5,37&sciodt=0,37&hl=en with one result
Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE was cited by 44 at https://scholar.google.com/scholar?cites=4518169679750590211&as_sdt=5,37&sciodt=0,37&hl=en with one result
Error Handling of In-vehicle Networks Makes Them Vulnerable was cited by 5 at https://scholar.google.com/scholar?cites=12178658502923327210&as_sdt=5,37&sciodt=0,37&hl=en with one result
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds was cited by 13 at https://scholar.google.com/scholar?cites=8194892015309537258&as_sdt=5,37&sciodt=0,37&hl=en with one result
MERS: Statistical Test Generation for Side-Channel Analysis based Trojan Detection was cited by 8 at https://scholar.google.com/scholar?cites=16543879572253575458&as_sdt=5,37&sciodt=0,37&hl=en with one result
ProvUSB: Block-level Provenance-Based Data Protection for USB Storage Devices was cited by 1 at https://scholar.google.com/scholar?cites=11726387752619007184&as_sdt=5,37&sciodt=0,37&hl=en with one result
Security by Any Other Name: On the Effectiveness of Provider Based Email Security was cited by 13 at https://scholar.google.com/scholar?cites=16857448615877238770&as_sdt=5,37&sciodt=0,37&hl=en with one result
AUTOREB: Automatically Understanding the Review-to-Behavior Fidelity in Android Applications was cited by 21 at https://scholar.google.com/scholar?cites=14144801979430222831&as_sdt=5,37&sciodt=0,37&hl=en with one result
Exploiting Temporal Dynamics in Sybil Defenses was cited by 4 at https://scholar.google.com/scholar?cites=10601384572183577647&as_sdt=5,37&sciodt=0,37&hl=en with one result
Cross-Site Search Attacks was cited by 8 at https://scholar.google.com/scholar?cites=7710396175263603871&as_sdt=5,37&sciodt=0,37&hl=en with one result
Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research was cited by 4 at https://scholar.google.com/scholar?cites=359173218753909516&as_sdt=5,37&sciodt=0,37&hl=en with one result
Practical Darknet Measurement was cited by 84 at https://scholar.google.com/scholar?cites=10342174490121044356&as_sdt=5,37&sciodt=0,37&hl=en with one result
Search + Seizure: The Effectiveness of Interventions on SEO Campaigns was cited by 22 at https://scholar.google.com/scholar?cites=16938416511600546535&as_sdt=5,37&sciodt=0,37&hl=en with one result
The MALICIA Dataset: Identification and Analysis of Drive-by Download Operations. was cited by 13 at https://scholar.google.com/scholar?cites=4092709111807042043&as_sdt=5,37&sciodt=0,37&hl=en with one result
Friendship and mobility: User movement in location-based social networks. was cited by 1395 at https://scholar.google.com/scholar?cites=2821687454408122477&as_sdt=5,37&sciodt=0,37&hl=en with one result
Predicting Users’ Motivations behind Location Check-Ins and Utility Implications of Privacy Protection Mechanisms was cited by 16 at https://scholar.google.com/scholar?cites=1799137484510010075&as_sdt=5,37&sciodt=0,37&hl=en with one result
One size does not fit all: 10 years of applying context-aware security was cited by 6 at https://scholar.google.com/scholar?cites=7363347209272549612&as_sdt=5,37&sciodt=0,37&hl=en with one result
Evilcohort: detecting communities of malicious accounts on online services was cited by 17 at https://scholar.google.com/scholar?cites=16231407166308501884&as_sdt=5,37&sciodt=0,37&hl=en with one result
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS was cited by 36 at https://scholar.google.com/scholar?cites=7526931689013806980&as_sdt=5,37&sciodt=0,37&hl=en with one result
Automatic Generation of Data-Oriented Exploits was cited by 33 at https://scholar.google.com/scholar?cites=7845497040418529902&as_sdt=5,37&sciodt=0,37&hl=en with one result
Protocol State Fuzzing of TLS Implementations was cited by 40 at https://scholar.google.com/scholar?cites=16015745330068978792&as_sdt=5,37&sciodt=0,37&hl=en with one result
To Pin or Not to Pin—Helping App Developers Bullet Proof Their TLS Connections was cited by 16 at https://scholar.google.com/scholar?cites=7779084601567917535&as_sdt=5,37&sciodt=0,37&hl=en with one result
De-anonymizing Programmers via Code Stylometry was cited by 27 at https://scholar.google.com/scholar?cites=4317946476021108745&as_sdt=5,37&sciodt=0,37&hl=en with one result
Trustworthy Whole-System Provenance for the Linux Kernel was cited by 38 at https://scholar.google.com/scholar?cites=14633765960424456584&as_sdt=5,37&sciodt=0,37&hl=en with one result
Securing Self-Virtualizing Ethernet Devices was cited by 7 at https://scholar.google.com/scholar?cites=29438520397485147&as_sdt=5,37&sciodt=0,37&hl=en with one result
EASEAndroid: Automatic Policy Analysis and Refinement for Security Enhanced Android via Large-Scale Semi-Supervised Learning was cited by 22 at https://scholar.google.com/scholar?cites=4560861324813254521&as_sdt=5,37&sciodt=0,37&hl=en with one result
Investigating the Computer Security Practices and Needs of Journalists was cited by 19 at https://scholar.google.com/scholar?cites=6790961412663442732&as_sdt=5,37&sciodt=0,37&hl=en with one result
Robot check failed at Measuring Real-World Accuracies and Biases in Modeling Password Guessability 3276.87371278
Robot check failed at Measuring Real-World Accuracies and Biases in Modeling Password Guessability 2.1086499691
Robot check failed at Measuring Real-World Accuracies and Biases in Modeling Password Guessability 2.07220005989
Measuring Real-World Accuracies and Biases in Modeling Password Guessability was cited by 44 at https://scholar.google.com/scholar?cites=14216825133468072844&as_sdt=5,37&sciodt=0,37&hl=en with one result
AUDACIOUS: User-Driven Access Control with Unmodified Operating Systems was cited by 8 at https://scholar.google.com/scholar?cites=2393794270913825344&as_sdt=5,37&sciodt=0,37&hl=en with one result
Build It, Break It, Fix It: Contesting Secure Development was cited by 1 at https://scholar.google.com/scholar?cites=17480020536822186049&as_sdt=5,37&sciodt=0,37&hl=en with one result
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets was cited by 4 at https://scholar.google.com/scholar?cites=18248665171212110921&as_sdt=5,37&sciodt=0,37&hl=en with one result
Robot check failed at My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers 775.991934061
Robot check failed at My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers 2.11852788925
Robot check failed at My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers 1.91077399254
My Smartphone Knows What You Print: Exploring Smartphone-based Side-channel Attacks Against 3D Printers was cited by 7 at https://scholar.google.com/scholar?cites=16675131588970068950&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Sounds of the Phones: Dangers of Zero-Effort Second Factor Login based on Ambient Audio was cited by 2 at https://scholar.google.com/scholar?cites=9759372347394181419&as_sdt=5,37&sciodt=0,37&hl=en with one result
Geolife: A collaborative social networking service among user, location and trajectory. was cited by 492 at https://scholar.google.com/scholar?cites=15381845468137457669&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the Security and Performance of Proof of Work Blockchains was cited by 24 at https://scholar.google.com/scholar?cites=2633281357893947888&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Secure Sharding Protocol For Open Blockchains was cited by 27 at https://scholar.google.com/scholar?cites=17825265946194512669&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Honey Badger of BFT Protocols was cited by 32 at https://scholar.google.com/scholar?cites=5781514024753827632&as_sdt=5,37&sciodt=0,37&hl=en with one result
Differential Privacy as a Mutual Information Constraint was cited by 8 at https://scholar.google.com/scholar?cites=12478996295143697436&as_sdt=5,37&sciodt=0,37&hl=en with one result
Advanced Probabilistic Couplings for Differential Privacy was cited by 7 at https://scholar.google.com/scholar?cites=12392908192297162634&as_sdt=5,37&sciodt=0,37&hl=en with one result
Differentially Private Bayesian Programming was cited by 6 at https://scholar.google.com/scholar?cites=15158036066301075611&as_sdt=5,37&sciodt=0,37&hl=en with one result
Strong Non-Interference and Type-Directed Higher-Order Masking was cited by 10 at https://scholar.google.com/scholar?cites=3671246920526284460&as_sdt=5,37&sciodt=0,37&hl=en with one result
Private Circuits III: Hardware Trojan-Resilience via Testing Amplification was cited by 2 at https://scholar.google.com/scholar?cites=1169747911632469833&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the Instability of Bitcoin Without the Block Reward was cited by 11 at https://scholar.google.com/scholar?cites=3280650553566905428&as_sdt=5,37&sciodt=0,37&hl=en with one result
Transparency Overlays and Applications was cited by 5 at https://scholar.google.com/scholar?cites=7084731136129418303&as_sdt=5,37&sciodt=0,37&hl=en with one result
Mix&Slice: Efficient Access Revocation in the Cloud was cited by 3 at https://scholar.google.com/scholar?cites=9353512134959778607&as_sdt=5,37&sciodt=0,37&hl=en with one result
Safe Serializable Secure Scheduling: Transactions and the Trade-Off Between Security and Consistency was cited by 3 at https://scholar.google.com/scholar?cites=10859760069868559669&as_sdt=5,37&sciodt=0,37&hl=en with one result
Town Crier: An Authenticated Data Feed for Smart Contracts was cited by 30 at https://scholar.google.com/scholar?cites=4144149945077327814&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Ring of Gyges: Investigating the Future of Criminal Smart Contracts was cited by 17 at https://scholar.google.com/scholar?cites=9557461122064646220&as_sdt=5,37&sciodt=0,37&hl=en with one result
Prefetch Side-Channel Attacks: Bypassing SMAP and Kernel ASLR was cited by 18 at https://scholar.google.com/scholar?cites=1268432101771132095&as_sdt=5,37&sciodt=0,37&hl=en with one result
Breaking Kernel Address Space Layout Randomization with Intel TSX was cited by 18 at https://scholar.google.com/scholar?cites=6316962239088258331&as_sdt=5,37&sciodt=0,37&hl=en with one result
Enforcing Least Privilege Memory Views for Multithreaded Applications was cited by 2 at https://scholar.google.com/scholar?cites=448426229953069387&as_sdt=5,37&sciodt=0,37&hl=en with one result
Improvements to Secure Computation with Penalties was cited by 6 at https://scholar.google.com/scholar?cites=5605163557243156486&as_sdt=5,37&sciodt=0,37&hl=en with one result
Amortizing Secure Computation with Penalties was cited by 5 at https://scholar.google.com/scholar?cites=9616987317695640052&as_sdt=5,37&sciodt=0,37&hl=en with one result
Message-Recovery Attacks on Feistel-Based Format Preserving Encryption was cited by 4 at https://scholar.google.com/scholar?cites=1951882085713621418&as_sdt=5,37&sciodt=0,37&hl=en with one result
TypeSan: Practical Type Confusion Detection was cited by 5 at https://scholar.google.com/scholar?cites=8824405150896625185&as_sdt=5,37&sciodt=0,37&hl=en with one result
Alternative Implementations of Secure Real Numbers was cited by this title hasn't been cited at no URL with one result
Garbling Gadgets for Boolean and Arithmetic Circuits was cited by 6 at https://scholar.google.com/scholar?cites=11821585684238732230&as_sdt=5,37&sciodt=0,37&hl=en with one result
Optimizing Semi-Honest Secure Multiparty Computation for the Internet was cited by 9 at https://scholar.google.com/scholar?cites=5456365860748048624&as_sdt=5,37&sciodt=0,37&hl=en with one result
MEMS Gyroscopes as Physical Unclonable Functions was cited by 2 at https://scholar.google.com/scholar?cites=16297292059497965410&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the Security and Usability of Segment-based Visual Cryptographic Authentication Protocols was cited by this title hasn't been cited at no URL with one result
Instant and Robust Authentication and Key Agreement among Mobile Devices was cited by 1 at https://scholar.google.com/scholar?cites=18004536812299776170&as_sdt=5,37&sciodt=0,37&hl=en with one result
Computational Soundness for Dalvik Bytecode was cited by 2 at https://scholar.google.com/scholar?cites=10440831429107172340&as_sdt=5,37&sciodt=0,37&hl=en with one result
SANA: Secure and Scalable Aggregate Network Attestation was cited by 11 at https://scholar.google.com/scholar?cites=15091651473546165530&as_sdt=5,37&sciodt=0,37&hl=en with one result
High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority was cited by 15 at https://scholar.google.com/scholar?cites=4131787824404238774&as_sdt=5,37&sciodt=0,37&hl=en with one result
Efficient Batched Oblivious PRF with Applications to Private Set Intersection was cited by 11 at https://scholar.google.com/scholar?cites=5495345015533221027&as_sdt=5,37&sciodt=0,37&hl=en with one result
MASCOT: Faster Malicious Arithmetic Secure Computation with Oblivious Transfer was cited by 25 at https://scholar.google.com/scholar?cites=18216266162885474735&as_sdt=5,37&sciodt=0,37&hl=en with one result
Covert Channels through Random Number Generator: Mechanisms, Capacity Estimation and Mitigations was cited by 4 at https://scholar.google.com/scholar?cites=15015499929623296078&as_sdt=5,37&sciodt=0,37&hl=en with one result
Return-Oriented Flush-Reload Side Channels on ARM and Their Implications for Android Devices was cited by 8 at https://scholar.google.com/scholar?cites=695355290216019437&as_sdt=5,37&sciodt=0,37&hl=en with one result
Sharing Mobile Code Securely with Information Flow Control was cited by 48 at https://scholar.google.com/scholar?cites=11792742376703030187&as_sdt=5,37&sciodt=0,37&hl=en with one result
LASTor: A Low-Latency AS-Aware Tor Client was cited by 77 at https://scholar.google.com/scholar?cites=1911143879949414377&as_sdt=5,37&sciodt=0,37&hl=en with one result
ObliviAd: Provably Secure and Practical Online Behavioral Advertising was cited by 83 at https://scholar.google.com/scholar?cites=3614309023950806769&as_sdt=5,37&sciodt=0,37&hl=en with one result
OB-PWS: Obfuscation-Based Private Web Search was cited by 45 at https://scholar.google.com/scholar?cites=2444392242035598545&as_sdt=5,37&sciodt=0,37&hl=en with one result
Foundations of Logic-Based Trust Management was cited by 13 at https://scholar.google.com/scholar?cites=1609895474948515720&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords was cited by 386 at https://scholar.google.com/scholar?cites=14707764720080544425&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes was cited by 446 at https://scholar.google.com/scholar?cites=3856041901605060077&as_sdt=5,37&sciodt=0,37&hl=en with one result
Unleashing Mayhem on Binary Code was cited by 153 at https://scholar.google.com/scholar?cites=7842769811816455423&as_sdt=5,37&sciodt=0,37&hl=en with one result
Distance Hijacking Attacks on Distance Bounding Protocols was cited by 102 at https://scholar.google.com/scholar?cites=16305809885342672888&as_sdt=5,37&sciodt=0,37&hl=en with one result
Hummingbird: Privacy at the Time of Twitter was cited by 108 at https://scholar.google.com/scholar?cites=12424173646949306873&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Framework to Eliminate Backdoors from Response-Computable Authentication was cited by 11 at https://scholar.google.com/scholar?cites=3944096057878610344&as_sdt=5,37&sciodt=0,37&hl=en with one result
Don't Trust Satellite Phones: A Security Analysis of Two Satphone Standards was cited by 36 at https://scholar.google.com/scholar?cites=8473116549615713273&as_sdt=5,37&sciodt=0,37&hl=en with one result
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail was cited by 164 at https://scholar.google.com/scholar?cites=3449114986509764354&as_sdt=5,37&sciodt=0,37&hl=en with one result
Space Traveling across VM: Automatically Bridging the Semantic Gap in Virtual Machine Introspection via Online Kernel Data Redirection was cited by 133 at https://scholar.google.com/scholar?cites=14299246839324469098&as_sdt=5,37&sciodt=0,37&hl=en with one result
ILR: Where'd My Gadgets Go? was cited by 148 at https://scholar.google.com/scholar?cites=3299506437036511607&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Psychology of Security for the Home Computer User was cited by 67 at https://scholar.google.com/scholar?cites=7188099698985789637&as_sdt=5,37&sciodt=0,37&hl=en with one result
LAP: Lightweight Anonymity and Privacy was cited by 38 at https://scholar.google.com/scholar?cites=10185209921127062135&as_sdt=5,37&sciodt=0,37&hl=en with one result
Quid-Pro-Quo-tocols: Strengthening Semi-honest Protocols with Dual Execution was cited by 70 at https://scholar.google.com/scholar?cites=8537845236331607018&as_sdt=5,37&sciodt=0,37&hl=en with one result
EvilSeed: A Guided Approach to Finding Malicious Web Pages was cited by 120 at https://scholar.google.com/scholar?cites=10259258252646134174&as_sdt=5,37&sciodt=0,37&hl=en with one result
Abusing File Processing in Malware Detectors for Fun and Profit was cited by 55 at https://scholar.google.com/scholar?cites=9675642844160959342&as_sdt=5,37&sciodt=0,37&hl=en with one result
Memento: Learning Secrets from Process Footprints was cited by 92 at https://scholar.google.com/scholar?cites=2120521479832414440&as_sdt=5,37&sciodt=0,37&hl=en with one result
ReDeBug: Finding Unpatched Code Clones in Entire OS Distributions was cited by 53 at https://scholar.google.com/scholar?cites=7063774968007232264&as_sdt=5,37&sciodt=0,37&hl=en with one result
Guess Again (and Again and Again): Measuring Password Strength by Simulating Password-Cracking Algorithms was cited by 229 at https://scholar.google.com/scholar?cites=13121710142778026940&as_sdt=5,37&sciodt=0,37&hl=en with one result
Robot check failed at Rozzle: De-cloaking Internet Malware 2.12057209015
Rozzle: De-cloaking Internet Malware was cited by 140 at https://scholar.google.com/scholar?cites=7157887807210488866&as_sdt=5,37&sciodt=0,37&hl=en with one result
New Results for Timing-Based Attestation was cited by 54 at https://scholar.google.com/scholar?cites=10161375336835608577&as_sdt=5,37&sciodt=0,37&hl=en with one result
Clash Attacks on the Verifiability of E-Voting Systems was cited by 64 at https://scholar.google.com/scholar?cites=12271537022034879749&as_sdt=5,37&sciodt=0,37&hl=en with one result
Third-Party Web Tracking: Policy and Technology was cited by 301 at https://scholar.google.com/scholar?cites=9215021988262763297&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the Feasibility of Internet-Scale Author Identification was cited by 171 at https://scholar.google.com/scholar?cites=15491730477496747981&as_sdt=5,37&sciodt=0,37&hl=en with one result
Smashing the Gadgets: Hindering Return-Oriented Programming Using In-place Code Randomization was cited by 227 at https://scholar.google.com/scholar?cites=11513918301688572873&as_sdt=5,37&sciodt=0,37&hl=en with one result
Safe Loading - A Foundation for Secure Execution of Untrusted Programs was cited by 30 at https://scholar.google.com/scholar?cites=12890114595841233951&as_sdt=5,37&sciodt=0,37&hl=en with one result
Off-path TCP Sequence Number Inference Attack - How Firewall Middleboxes Reduce Security was cited by 57 at https://scholar.google.com/scholar?cites=9213820991694524776&as_sdt=5,37&sciodt=0,37&hl=en with one result
User-Driven Access Control: Rethinking Permission Granting in Modern Operating Systems was cited by 181 at https://scholar.google.com/scholar?cites=6587947491164854986&as_sdt=5,37&sciodt=0,37&hl=en with one result
Prudent Practices for Designing Malware Experiments: Status Quo and Outlook was cited by 90 at https://scholar.google.com/scholar?cites=17903718550423653744&as_sdt=5,37&sciodt=0,37&hl=en with one result
Formalizing and Enforcing Purpose Restrictions in Privacy Policies was cited by 32 at https://scholar.google.com/scholar?cites=4166717836048852932&as_sdt=5,37&sciodt=0,37&hl=en with one result
Signing Me onto Your Accounts through Facebook and Google: A Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services was cited by 184 at https://scholar.google.com/scholar?cites=16130896962431094643&as_sdt=5,37&sciodt=0,37&hl=en with one result
Flash Memory for Ubiquitous Hardware Security Functions: True Random Number Generation and Device Fingerprints was cited by 41 at https://scholar.google.com/scholar?cites=18039452264781556993&as_sdt=5,37&sciodt=0,37&hl=en with one result
Secure and Scalable Fault Localization under Dynamic Traffic Patterns was cited by 12 at https://scholar.google.com/scholar?cites=15734829472339010653&as_sdt=5,37&sciodt=0,37&hl=en with one result
Robot check failed at Building Verifiable Trusted Path on Commodity x86 Computers 2873.49967313
Building Verifiable Trusted Path on Commodity x86 Computers was cited by 91 at https://scholar.google.com/scholar?cites=14916554230864813432&as_sdt=5,37&sciodt=0,37&hl=en with one result
Dissecting Android Malware: Characterization and Evolution was cited by 1385 at https://scholar.google.com/scholar?cites=7105679043960397826&as_sdt=5,37&sciodt=0,37&hl=en with one result
Robot check failed at Mixcoin: Anonymity for Bitcoin with Accountable Mixes 357.846615791
Robot check failed at Mixcoin: Anonymity for Bitcoin with Accountable Mixes 1.80110788345
Robot check failed at Mixcoin: Anonymity for Bitcoin with Accountable Mixes 2.13589191437
Mixcoin: Anonymity for Bitcoin with Accountable Mixes was cited by 87 at https://scholar.google.com/scholar?cites=11203180290145773287&as_sdt=5,37&sciodt=0,37&hl=en with one result
Elliptic Curve Cryptography in Practice was cited by 88 at https://scholar.google.com/scholar?cites=15432142951090426009&as_sdt=5,37&sciodt=0,37&hl=en with one result
Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents was cited by 14 at https://scholar.google.com/scholar?cites=6543748062966457042&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the (In)Security of Mobile Two-Factor Authentication was cited by 24 at https://scholar.google.com/scholar?cites=17640259991788064135&as_sdt=5,37&sciodt=0,37&hl=en with one result
Majority Is Not Enough: Bitcoin Mining Is Vulnerable was cited by 307 at https://scholar.google.com/scholar?cites=8155309254911461712&as_sdt=5,37&sciodt=0,37&hl=en with one result
Efficient Non-Interactive Zero Knowledge Arguments for Set Operations was cited by 5 at https://scholar.google.com/scholar?cites=13689973451475931305&as_sdt=5,37&sciodt=0,37&hl=en with one result
Digital Check Forgery Attacks on Client Check Truncation Systems was cited by 7 at https://scholar.google.com/scholar?cites=14145221861624170713&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Short Paper on How to Improve U-Prove Using Self-Blindable Certificates was cited by 6 at https://scholar.google.com/scholar?cites=16325305998367701198&as_sdt=5,37&sciodt=0,37&hl=en with one result
Attack on U-Prove Revocation Scheme from FC'13 - Passing Verification by Revoked Users was cited by 4 at https://scholar.google.com/scholar?cites=522472873494553136&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the Awareness, Control and Privacy of Shared Photo Metadata was cited by this title hasn't been cited at no URL with one result
Robot check failed at Practical Secure Decision Tree Learning in a Teletreatment Application 1935.64007998
Robot check failed at Practical Secure Decision Tree Learning in a Teletreatment Application 2.05507898331
Practical Secure Decision Tree Learning in a Teletreatment Application was cited by 2 at https://scholar.google.com/scholar?cites=16703854291446133519&as_sdt=5,37&sciodt=0,37&hl=en with one result
Challenges in Protecting Tor Hidden Services from Botnet Abuse was cited by 16 at https://scholar.google.com/scholar?cites=18347547209282687767&as_sdt=5,37&sciodt=0,37&hl=en with one result
Scaling Private Set Intersection to Billion-Element Sets was cited by 43 at https://scholar.google.com/scholar?cites=5297907852752610595&as_sdt=5,37&sciodt=0,37&hl=en with one result
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic was cited by 64 at https://scholar.google.com/scholar?cites=16859466758783458882&as_sdt=5,37&sciodt=0,37&hl=en with one result
Garbled Searchable Symmetric Encryption was cited by 15 at https://scholar.google.com/scholar?cites=1124246031831435531&as_sdt=5,37&sciodt=0,37&hl=en with one result
Estimating Systematic Risk in Real-World Networks was cited by 9 at https://scholar.google.com/scholar?cites=5737586193577236774&as_sdt=5,37&sciodt=0,37&hl=en with one result
Confidentiality Issues on a GPU in a Virtualized Environment was cited by 24 at https://scholar.google.com/scholar?cites=12778908261528101798&as_sdt=5,37&sciodt=0,37&hl=en with one result
Hawk and Aucitas: e-Auction Schemes from the Helios and Civitas e-Voting Schemes was cited by 5 at https://scholar.google.com/scholar?cites=15050668663051366666&as_sdt=5,37&sciodt=0,37&hl=en with one result
Outsmarting Proctors with Smartwatches: A Case Study on Wearable Computing Security was cited by 15 at https://scholar.google.com/scholar?cites=44433167107583589&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Ghosts of Banking Past: Empirical Analysis of Closed Bank Websites was cited by 5 at https://scholar.google.com/scholar?cites=7861095765334013017&as_sdt=5,37&sciodt=0,37&hl=en with one result
Security Protocols and Evidence: Where Many Payment Systems Fail was cited by 16 at https://scholar.google.com/scholar?cites=2354284541968609434&as_sdt=5,37&sciodt=0,37&hl=en with one result
Sample or Random Security - A Security Model for Segment-Based Visual Cryptography was cited by this title hasn't been cited at no URL with one result
You Won't Be Needing These Any More: On Removing Unused Certificates from Trust Stores was cited by 15 at https://scholar.google.com/scholar?cites=811560138121612536&as_sdt=5,37&sciodt=0,37&hl=en with one result
Sex, Lies, or Kittens? Investigating the Use of Snapchat's Self-Destructing Messages was cited by 53 at https://scholar.google.com/scholar?cites=8218209166134330039&as_sdt=5,37&sciodt=0,37&hl=en with one result
MoP-2-MoP - Mobile Private Microblogging was cited by this title hasn't been cited at no URL with one result
Drone to the Rescue: Relay-Resilient Authentication using Ambient Multi-sensing was cited by 32 at https://scholar.google.com/scholar?cites=11732359519241960945&as_sdt=5,37&sciodt=0,37&hl=en with one result
BitIodine: Extracting Intelligence from the Bitcoin Network was cited by 45 at https://scholar.google.com/scholar?cites=15389816517519007463&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Secure Data Deduplication Scheme for Cloud Storage was cited by 137 at https://scholar.google.com/scholar?cites=4860870366483487222&as_sdt=5,37&sciodt=0,37&hl=en with one result
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings was cited by 14 at https://scholar.google.com/scholar?cites=16408609539851870263&as_sdt=5,37&sciodt=0,37&hl=en with one result
Identifying Risk Factors for Webserver Compromise was cited by 17 at https://scholar.google.com/scholar?cites=1404962278409899868&as_sdt=5,37&sciodt=0,37&hl=en with one result
Privacy Preserving Tâtonnement - A Cryptographic Construction of an Incentive Compatible Market was cited by this title hasn't been cited at no URL with one result
Computational verification of C protocol implementations by symbolic execution. was cited by 21 at https://scholar.google.com/scholar?cites=1604032370409094311&as_sdt=5,37&sciodt=0,37&hl=en with one result
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. was cited by 19 at https://scholar.google.com/scholar?cites=12485307046559969588&as_sdt=5,37&sciodt=0,37&hl=en with one result
Non-tracking web analytics. was cited by 42 at https://scholar.google.com/scholar?cites=8093478753328521339&as_sdt=5,37&sciodt=0,37&hl=en with one result
Enhancing Tor's performance using real-time traffic classification. was cited by 38 at https://scholar.google.com/scholar?cites=6923789910351863099&as_sdt=5,37&sciodt=0,37&hl=en with one result
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols. was cited by 25 at https://scholar.google.com/scholar?cites=4285477062874835893&as_sdt=5,37&sciodt=0,37&hl=en with one result
New privacy issues in mobile telephony: fix and verification. was cited by 80 at https://scholar.google.com/scholar?cites=11366409715329474839&as_sdt=5,37&sciodt=0,37&hl=en with one result
PERM: practical reputation-based blacklisting without TTPS. was cited by 27 at https://scholar.google.com/scholar?cites=11995070535310905333&as_sdt=5,37&sciodt=0,37&hl=en with one result
PScout: analyzing the Android permission specification. was cited by 418 at https://scholar.google.com/scholar?cites=11797199729762432138&as_sdt=5,37&sciodt=0,37&hl=en with one result
Computational soundness without protocol restrictions. was cited by 23 at https://scholar.google.com/scholar?cites=17912835067886879370&as_sdt=5,37&sciodt=0,37&hl=en with one result
Verified security of redundancy-free encryption from Rabin and RSA. was cited by 13 at https://scholar.google.com/scholar?cites=9688791267149430471&as_sdt=5,37&sciodt=0,37&hl=en with one result
Foundations of garbled circuits. was cited by 230 at https://scholar.google.com/scholar?cites=11322412435255386469&as_sdt=5,37&sciodt=0,37&hl=en with one result
Measuring vote privacy, revisited. was cited by 14 at https://scholar.google.com/scholar?cites=3503823909557975927&as_sdt=5,37&sciodt=0,37&hl=en with one result
Blacksheep: detecting compromised hosts in homogeneous crowds. was cited by 35 at https://scholar.google.com/scholar?cites=15379715234310029213&as_sdt=5,37&sciodt=0,37&hl=en with one result
Before we knew it: an empirical study of zero-day attacks in the real world. was cited by 238 at https://scholar.google.com/scholar?cites=4810393209308580932&as_sdt=5,37&sciodt=0,37&hl=en with one result
Provable security of S-BGP and other path vector protocols: model, analysis and extensions. was cited by 21 at https://scholar.google.com/scholar?cites=2835162416806755934&as_sdt=5,37&sciodt=0,37&hl=en with one result
Operating system framed in case of mistaken identity: measuring the success of web-based spoofing attacks on OS password-entry dialogs. was cited by 7 at https://scholar.google.com/scholar?cites=9982601112710022631&as_sdt=5,37&sciodt=0,37&hl=en with one result
Self-service cloud computing. was cited by 105 at https://scholar.google.com/scholar?cites=16177538375423710431&as_sdt=5,37&sciodt=0,37&hl=en with one result
Touching from a distance: website fingerprinting attacks and defenses. was cited by 137 at https://scholar.google.com/scholar?cites=3908767666146077144&as_sdt=5,37&sciodt=0,37&hl=en with one result
Aligot: cryptographic function identification in obfuscated binary programs. was cited by 57 at https://scholar.google.com/scholar?cites=13860219555053496126&as_sdt=5,37&sciodt=0,37&hl=en with one result
Practical yet universally composable two-server password-authenticated secret sharing. was cited by 47 at https://scholar.google.com/scholar?cites=14207664981378905455&as_sdt=5,37&sciodt=0,37&hl=en with one result
Differentially private sequential data publication via variable-length n-grams. was cited by 95 at https://scholar.google.com/scholar?cites=16785026711734724952&as_sdt=5,37&sciodt=0,37&hl=en with one result
A software-hardware architecture for self-protecting data. was cited by 53 at https://scholar.google.com/scholar?cites=18374480256741530550&as_sdt=5,37&sciodt=0,37&hl=en with one result
How secure are power network signature based time stamps? was cited by 16 at https://scholar.google.com/scholar?cites=9183788536155534999&as_sdt=5,37&sciodt=0,37&hl=en with one result
Revoke and let live: a secure key revocation api for cryptographic devices. was cited by 11 at https://scholar.google.com/scholar?cites=14286094421482001642&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the parameterized complexity of the workflow satisfiability problem. was cited by 14 at https://scholar.google.com/scholar?cites=283472974747310887&as_sdt=5,37&sciodt=0,37&hl=en with one result
Strengthening user authentication through opportunistic cryptographic identity assertions. was cited by 55 at https://scholar.google.com/scholar?cites=7731625281269213494&as_sdt=5,37&sciodt=0,37&hl=en with one result
TreeDroid: a tree automaton based approach to enforcing data processing policies. was cited by 16 at https://scholar.google.com/scholar?cites=3366375485177850137&as_sdt=5,37&sciodt=0,37&hl=en with one result
Hourglass schemes: how to prove that cloud files are encrypted. was cited by 46 at https://scholar.google.com/scholar?cites=11820321234124663699&as_sdt=5,37&sciodt=0,37&hl=en with one result
An historical examination of open source releases and their vulnerabilities. was cited by 10 at https://scholar.google.com/scholar?cites=1849686844880310704&as_sdt=5,37&sciodt=0,37&hl=en with one result
Intransitive noninterference in nondeterministic systems. was cited by 13 at https://scholar.google.com/scholar?cites=18293779267066744599&as_sdt=5,37&sciodt=0,37&hl=en with one result
Why eve and mallory love android: an analysis of android SSL (in)security. was cited by 299 at https://scholar.google.com/scholar?cites=2000018815752343008&as_sdt=5,37&sciodt=0,37&hl=en with one result
Publicly verifiable delegation of large polynomials and matrix computations, with applications. was cited by 135 at https://scholar.google.com/scholar?cites=5178179731925116701&as_sdt=5,37&sciodt=0,37&hl=en with one result
Adaptive defenses for commodity software through virtual application partitioning. was cited by 13 at https://scholar.google.com/scholar?cites=16832128639274778097&as_sdt=5,37&sciodt=0,37&hl=en with one result
The most dangerous code in the world: validating SSL certificates in non-browser software. was cited by 280 at https://scholar.google.com/scholar?cites=3396420199116128010&as_sdt=5,37&sciodt=0,37&hl=en with one result
Secure two-party computation in sublinear (amortized) time. was cited by 89 at https://scholar.google.com/scholar?cites=13730877425723099316&as_sdt=5,37&sciodt=0,37&hl=en with one result
Manufacturing compromise: the emergence of exploit-as-a-service. was cited by 158 at https://scholar.google.com/scholar?cites=3974861238120270100&as_sdt=5,37&sciodt=0,37&hl=en with one result
FlowFox: a web browser with flexible and precise information flow control. was cited by 119 at https://scholar.google.com/scholar?cites=17864775648044121582&as_sdt=5,37&sciodt=0,37&hl=en with one result
Privacy-aware personalization for mobile advertising. was cited by 75 at https://scholar.google.com/scholar?cites=8471735865057265319&as_sdt=5,37&sciodt=0,37&hl=en with one result
Scriptless attacks: stealing the pie without touching the sill. was cited by 73 at https://scholar.google.com/scholar?cites=750776335494187543&as_sdt=5,37&sciodt=0,37&hl=en with one result
Secure two-party computations in ANSI C. was cited by 71 at https://scholar.google.com/scholar?cites=12555475750018687338&as_sdt=5,37&sciodt=0,37&hl=en with one result
Populated IP addresses: classification and applications. was cited by 14 at https://scholar.google.com/scholar?cites=9854320484204608568&as_sdt=5,37&sciodt=0,37&hl=en with one result
Kargus: a highly-scalable software-based intrusion detection system. was cited by 92 at https://scholar.google.com/scholar?cites=13297367401835219339&as_sdt=5,37&sciodt=0,37&hl=en with one result
Salus: a system for server-aided secure function evaluation. was cited by 55 at https://scholar.google.com/scholar?cites=973710206897691539&as_sdt=5,37&sciodt=0,37&hl=en with one result
Dynamic searchable symmetric encryption. was cited by 388 at https://scholar.google.com/scholar?cites=17804660712873641386&as_sdt=5,37&sciodt=0,37&hl=en with one result
Vanity, cracks and malware: insights into the anti-copy protection ecosystem. was cited by 16 at https://scholar.google.com/scholar?cites=5876615460898883555&as_sdt=5,37&sciodt=0,37&hl=en with one result
Double-spending fast payments in bitcoin. was cited by 117 at https://scholar.google.com/scholar?cites=3799277467212614203&as_sdt=5,37&sciodt=0,37&hl=en with one result
OTO: online trust oracle for user-centric trust establishment. was cited by 15 at https://scholar.google.com/scholar?cites=563663903731257280&as_sdt=5,37&sciodt=0,37&hl=en with one result
Knowing your enemy: understanding and detecting malicious web advertising. was cited by 103 at https://scholar.google.com/scholar?cites=10061217907513529589&as_sdt=5,37&sciodt=0,37&hl=en with one result
CHEX: statically vetting Android apps for component hijacking vulnerabilities. was cited by 424 at https://scholar.google.com/scholar?cites=15528391678076701633&as_sdt=5,37&sciodt=0,37&hl=en with one result
A cross-protocol attack on the TLS protocol. was cited by 42 at https://scholar.google.com/scholar?cites=3097979959791071159&as_sdt=5,37&sciodt=0,37&hl=en with one result
Priceless: the role of payments in abuse-advertised goods. was cited by 41 at https://scholar.google.com/scholar?cites=10539245352825400187&as_sdt=5,37&sciodt=0,37&hl=en with one result
SABOT: specification-based payload generation for programmable logic controllers. was cited by 35 at https://scholar.google.com/scholar?cites=12272672630384813036&as_sdt=5,37&sciodt=0,37&hl=en with one result
On significance of the least significant bits for differential privacy. was cited by 43 at https://scholar.google.com/scholar?cites=15905082862749369153&as_sdt=5,37&sciodt=0,37&hl=en with one result
SkypeMorph: protocol obfuscation for Tor bridges. was cited by 137 at https://scholar.google.com/scholar?cites=5919558331876991788&as_sdt=5,37&sciodt=0,37&hl=en with one result
Vigilare: toward snoop-based kernel integrity monitor. was cited by 51 at https://scholar.google.com/scholar?cites=7617924454445254429&as_sdt=5,37&sciodt=0,37&hl=en with one result
Precise enforcement of progress-sensitive security. was cited by 19 at https://scholar.google.com/scholar?cites=11267502459362699850&as_sdt=5,37&sciodt=0,37&hl=en with one result
Leveraging choice" to automate authorization hook placement." was cited by 16 at https://scholar.google.com/scholar?cites=3860061944876976990&as_sdt=5,37&sciodt=0,37&hl=en with one result
GPS software attacks. was cited by 49 at https://scholar.google.com/scholar?cites=13579323687148635386&as_sdt=5,37&sciodt=0,37&hl=en with one result
You are what you include: large-scale evaluation of remote javascript inclusions. was cited by 164 at https://scholar.google.com/scholar?cites=9124722648998760198&as_sdt=5,37&sciodt=0,37&hl=en with one result
Using probabilistic generative models for ranking risks of Android apps. was cited by 261 at https://scholar.google.com/scholar?cites=18160832480372024379&as_sdt=5,37&sciodt=0,37&hl=en with one result
Mobile data charging: new attacks and countermeasures. was cited by 32 at https://scholar.google.com/scholar?cites=3701562563650625050&as_sdt=5,37&sciodt=0,37&hl=en with one result
Collaborative TCP sequence number inference attack: how to crack sequence number under a second. was cited by 45 at https://scholar.google.com/scholar?cites=8012575314428080462&as_sdt=5,37&sciodt=0,37&hl=en with one result
Neighborhood watch: security and privacy analysis of automatic meter reading systems. was cited by 67 at https://scholar.google.com/scholar?cites=11672803355285888422&as_sdt=5,37&sciodt=0,37&hl=en with one result
Verifiable data streaming. was cited by 31 at https://scholar.google.com/scholar?cites=15602548656668003412&as_sdt=5,37&sciodt=0,37&hl=en with one result
Routing around decoys. was cited by 52 at https://scholar.google.com/scholar?cites=9563395652315064050&as_sdt=5,37&sciodt=0,37&hl=en with one result
Protecting location privacy: optimal strategy against localization attacks. was cited by 183 at https://scholar.google.com/scholar?cites=12498660940877841366&as_sdt=5,37&sciodt=0,37&hl=en with one result
Deanonymizing mobility traces: using social network as a side-channel. was cited by 134 at https://scholar.google.com/scholar?cites=5889465663711643648&as_sdt=5,37&sciodt=0,37&hl=en with one result
Fides: selectively hardening software application components against kernel-level or process-level malware. was cited by 81 at https://scholar.google.com/scholar?cites=5142302851276142023&as_sdt=5,37&sciodt=0,37&hl=en with one result
The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems. was cited by 124 at https://scholar.google.com/scholar?cites=15890235978359865569&as_sdt=5,37&sciodt=0,37&hl=en with one result
Resource-freeing attacks: improve your cloud performance (at your neighbor's expense). was cited by 112 at https://scholar.google.com/scholar?cites=17336636262011558136&as_sdt=5,37&sciodt=0,37&hl=en with one result
CensorSpoofer: asymmetric communication using IP spoofing for censorship-resistant web browsing. was cited by 60 at https://scholar.google.com/scholar?cites=11469838012063565104&as_sdt=5,37&sciodt=0,37&hl=en with one result
Binary stirring: self-randomizing instruction addresses of legacy x86 binary code. was cited by 205 at https://scholar.google.com/scholar?cites=12668603615118602275&as_sdt=5,37&sciodt=0,37&hl=en with one result
StegoTorus: a camouflage proxy for the Tor anonymity system. was cited by 113 at https://scholar.google.com/scholar?cites=4526087820861834436&as_sdt=5,37&sciodt=0,37&hl=en with one result
Single round access privacy on outsourced storage. was cited by 86 at https://scholar.google.com/scholar?cites=11608710506703828663&as_sdt=5,37&sciodt=0,37&hl=en with one result
PrivateFS: a parallel oblivious file system. was cited by 99 at https://scholar.google.com/scholar?cites=12992146281055388970&as_sdt=5,37&sciodt=0,37&hl=en with one result
Innocent by association: early recognition of legitimate users. was cited by 35 at https://scholar.google.com/scholar?cites=3899371672819950527&as_sdt=5,37&sciodt=0,37&hl=en with one result
PeerPress: utilizing enemies' P2P strength against them. was cited by 18 at https://scholar.google.com/scholar?cites=16812865867243928625&as_sdt=5,37&sciodt=0,37&hl=en with one result
Towards a bayesian network game framework for evaluating DDoS attacks and defense. was cited by 30 at https://scholar.google.com/scholar?cites=18102710665323485578&as_sdt=5,37&sciodt=0,37&hl=en with one result
Minimizing private data disclosures in the smart grid. was cited by 77 at https://scholar.google.com/scholar?cites=4119756841825065696&as_sdt=5,37&sciodt=0,37&hl=en with one result
DCast: sustaining collaboration in overlay multicast despite rational collusion. was cited by 3 at https://scholar.google.com/scholar?cites=2942962080950863210&as_sdt=5,37&sciodt=0,37&hl=en with one result
Cross-VM side channels and their use to extract private keys. was cited by 456 at https://scholar.google.com/scholar?cites=16249448586717406393&as_sdt=5,37&sciodt=0,37&hl=en with one result
Improving malware classification: bridging the static/dynamic gap. was cited by 55 at https://scholar.google.com/scholar?cites=2458932567198760298&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the effectiveness of using state-of-the-art machine learning techniques to launch cryptographic distinguishing attacks. was cited by this title hasn't been cited at no URL with one result
Robust detection of comment spam using entropy rate. was cited by 29 at https://scholar.google.com/scholar?cites=6639386365116959445&as_sdt=5,37&sciodt=0,37&hl=en with one result
Learning stateful models for network honeypots. was cited by 26 at https://scholar.google.com/scholar?cites=12345646444040145086&as_sdt=5,37&sciodt=0,37&hl=en with one result
Understanding the time-series behavioral characteristics of evolutionally advanced email spammers. was cited by 1 at https://scholar.google.com/scholar?cites=15534042001465169495&as_sdt=5,37&sciodt=0,37&hl=en with one result
Early detection of malicious behavior in JavaScript code. was cited by 11 at https://scholar.google.com/scholar?cites=6325279628757203048&as_sdt=5,37&sciodt=0,37&hl=en with one result
Autonomous learning for detection of JavaScript attacks: vision or reality? was cited by 11 at https://scholar.google.com/scholar?cites=15852803641396081622&as_sdt=5,37&sciodt=0,37&hl=en with one result
Tracking concept drift in malware families. was cited by 12 at https://scholar.google.com/scholar?cites=1908564879499871682&as_sdt=5,37&sciodt=0,37&hl=en with one result
Nonparametric semi-supervised learning for network intrusion detection: combining performance improvements with realistic in-situ training. was cited by 23 at https://scholar.google.com/scholar?cites=2926331399770280769&as_sdt=5,37&sciodt=0,37&hl=en with one result
An information theoretic framework for web inference detection. was cited by 3 at https://scholar.google.com/scholar?cites=17728651664717135808&as_sdt=5,37&sciodt=0,37&hl=en with one result
Privilege Separation in HTML5 Applications. was cited by 62 at https://scholar.google.com/scholar?cites=12322453828613717600&as_sdt=5,37&sciodt=0,37&hl=en with one result
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. was cited by 223 at https://scholar.google.com/scholar?cites=1009360998040509356&as_sdt=5,37&sciodt=0,37&hl=en with one result
I Forgot Your Password: Randomness Attacks Against PHP Applications. was cited by 16 at https://scholar.google.com/scholar?cites=3875581291712176023&as_sdt=5,37&sciodt=0,37&hl=en with one result
Neuroscience Meets Cryptography: Designing Crypto Primitives Secure Against Rubber Hose Attacks. was cited by 42 at https://scholar.google.com/scholar?cites=255740117836784817&as_sdt=5,37&sciodt=0,37&hl=en with one result
Chimera: A Declarative Language for Streaming Network Traffic Analysis. was cited by 19 at https://scholar.google.com/scholar?cites=2457822455834087484&as_sdt=5,37&sciodt=0,37&hl=en with one result
An Evaluation of the Google Chrome Extension Security Architecture. was cited by 69 at https://scholar.google.com/scholar?cites=13272704107645754841&as_sdt=5,37&sciodt=0,37&hl=en with one result
Tracking Rootkit Footprints with a Practical Memory Analysis System. was cited by 31 at https://scholar.google.com/scholar?cites=4364102095177821299&as_sdt=5,37&sciodt=0,37&hl=en with one result
Impact of Spam Exposure on User Engagement. was cited by 8 at https://scholar.google.com/scholar?cites=7173168786419477825&as_sdt=5,37&sciodt=0,37&hl=en with one result
Optimally Robust Private Information Retrieval. was cited by 60 at https://scholar.google.com/scholar?cites=6284656034613532256&as_sdt=5,37&sciodt=0,37&hl=en with one result
Origin-Bound Certificates: A Fresh Approach to Strong Client Authentication for the Web. was cited by 66 at https://scholar.google.com/scholar?cites=16633741655324153291&as_sdt=5,37&sciodt=0,37&hl=en with one result
Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner. was cited by 72 at https://scholar.google.com/scholar?cites=15644735933810005707&as_sdt=5,37&sciodt=0,37&hl=en with one result
Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider. was cited by 53 at https://scholar.google.com/scholar?cites=6293602707873561331&as_sdt=5,37&sciodt=0,37&hl=en with one result
Enhanced Operating System Security Through Efficient and Fine-grained Address Space Randomization. was cited by 148 at https://scholar.google.com/scholar?cites=18021702445630943475&as_sdt=5,37&sciodt=0,37&hl=en with one result
Mining Your Ps and Qs: Detection of Widespread Weak Keys in Network Devices. was cited by 248 at https://scholar.google.com/scholar?cites=4768933826282184277&as_sdt=5,37&sciodt=0,37&hl=en with one result
Fuzzing with Code Fragments. was cited by 71 at https://scholar.google.com/scholar?cites=6407248667757366355&as_sdt=5,37&sciodt=0,37&hl=en with one result
Clickjacking: Attacks and Defenses. was cited by 109 at https://scholar.google.com/scholar?cites=11135199778810009802&as_sdt=5,37&sciodt=0,37&hl=en with one result
PUBCRAWL: Protecting Users and Businesses from CRAWLers. was cited by 21 at https://scholar.google.com/scholar?cites=16806936615760924195&as_sdt=5,37&sciodt=0,37&hl=en with one result
Establishing Browser Security Guarantees through Formal Shim Verification. was cited by 39 at https://scholar.google.com/scholar?cites=10122611810095685168&as_sdt=5,37&sciodt=0,37&hl=en with one result
Throttling Tor Bandwidth Parasites. was cited by 31 at https://scholar.google.com/scholar?cites=14682766495667076851&as_sdt=5,37&sciodt=0,37&hl=en with one result
kGuard: Lightweight Kernel Protection against Return-to-User Attacks. was cited by 61 at https://scholar.google.com/scholar?cites=4085218568264668143&as_sdt=5,37&sciodt=0,37&hl=en with one result
STEALTHMEM: System-Level Protection Against Cache-Based Side Channel Attacks in the Cloud. was cited by 138 at https://scholar.google.com/scholar?cites=13797301980205885031&as_sdt=5,37&sciodt=0,37&hl=en with one result
Billion-Gate Secure Computation with Malicious Adversaries. was cited by 177 at https://scholar.google.com/scholar?cites=7517415790811933797&as_sdt=5,37&sciodt=0,37&hl=en with one result
New Attacks on Timing-based Network Flow Watermarks. was cited by 12 at https://scholar.google.com/scholar?cites=11765170290966556727&as_sdt=5,37&sciodt=0,37&hl=en with one result
On the Feasibility of Side-Channel Attacks with Brain-Computer Interfaces. was cited by 54 at https://scholar.google.com/scholar?cites=5560423267366304893&as_sdt=5,37&sciodt=0,37&hl=en with one result
Tachyon: Tandem Execution for Efficient Live Patch Testing. was cited by 29 at https://scholar.google.com/scholar?cites=15024873410196248923&as_sdt=5,37&sciodt=0,37&hl=en with one result
PharmaLeaks: Understanding the Business of Online Pharmaceutical Affiliate Programs. was cited by 98 at https://scholar.google.com/scholar?cites=7407482510679331281&as_sdt=5,37&sciodt=0,37&hl=en with one result
Privacy-Preserving Social Plugins. was cited by 33 at https://scholar.google.com/scholar?cites=8191683985087614765&as_sdt=5,37&sciodt=0,37&hl=en with one result
Efficient and Scalable Socware Detection in Online Social Networks. was cited by 70 at https://scholar.google.com/scholar?cites=11314053290861984602&as_sdt=5,37&sciodt=0,37&hl=en with one result
TARDIS: Time and Remanence Decay in SRAM to Implement Secure Protocols on Embedded Devices without Clocks. was cited by 39 at https://scholar.google.com/scholar?cites=17495279181808907390&as_sdt=5,37&sciodt=0,37&hl=en with one result
Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory. was cited by 53 at https://scholar.google.com/scholar?cites=2740355174634596050&as_sdt=5,37&sciodt=0,37&hl=en with one result
Progressive Authentication: Deciding When to Authenticate on Mobile Phones. was cited by 120 at https://scholar.google.com/scholar?cites=10479099910052409301&as_sdt=5,37&sciodt=0,37&hl=en with one result
Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services. was cited by 125 at https://scholar.google.com/scholar?cites=9508591868400999670&as_sdt=5,37&sciodt=0,37&hl=en with one result
Taking Proof-Based Verified Computation a Few Steps Closer to Practicality. was cited by 93 at https://scholar.google.com/scholar?cites=2719476571283221011&as_sdt=5,37&sciodt=0,37&hl=en with one result
AdSplit: Separating Smartphone Advertising from Applications. was cited by 209 at https://scholar.google.com/scholar?cites=14609537374491600727&as_sdt=5,37&sciodt=0,37&hl=en with one result
On Breaking SAML: Be Whoever You Want to Be. was cited by 78 at https://scholar.google.com/scholar?cites=13159963890845779408&as_sdt=5,37&sciodt=0,37&hl=en with one result
B@bel: Leveraging Email Delivery for Spam Mitigation. was cited by 30 at https://scholar.google.com/scholar?cites=11427556480100829413&as_sdt=5,37&sciodt=0,37&hl=en with one result
How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. was cited by 155 at https://scholar.google.com/scholar?cites=10607100578268948420&as_sdt=5,37&sciodt=0,37&hl=en with one result
Gone in 360 Seconds: Hijacking with Hitag2. was cited by 75 at https://scholar.google.com/scholar?cites=15143579726914155455&as_sdt=5,37&sciodt=0,37&hl=en with one result
STING: Finding Name Resolution Vulnerabilities in Programs. was cited by 11 at https://scholar.google.com/scholar?cites=17959485099698441038&as_sdt=5,37&sciodt=0,37&hl=en with one result
Whispers in the Hyper-space: High-speed Covert Channel Attacks in the Cloud. was cited by 143 at https://scholar.google.com/scholar?cites=7520222749055421279&as_sdt=5,37&sciodt=0,37&hl=en with one result
Security and Usability Challenges of Moving-Object CAPTCHAs: Decoding Codewords in Motion. was cited by 36 at https://scholar.google.com/scholar?cites=11454391315039396367&as_sdt=5,37&sciodt=0,37&hl=en with one result
Aurasium: Practical Policy Enforcement for Android Applications. was cited by 370 at https://scholar.google.com/scholar?cites=2783103671767328499&as_sdt=5,37&sciodt=0,37&hl=en with one result
DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis. was cited by 460 at https://scholar.google.com/scholar?cites=6329678960504784123&as_sdt=5,37&sciodt=0,37&hl=en with one result
ShortMAC: Efficient Data-Plane Fault Localization. was cited by 11 at https://scholar.google.com/scholar?cites=14691203483845990289&as_sdt=5,37&sciodt=0,37&hl=en with one result
You are what you like! Information leakage through users' Interests. was cited by 86 at https://scholar.google.com/scholar?cites=3494949058796846691&as_sdt=5,37&sciodt=0,37&hl=en with one result
Charm: A Framework for Rapidly Prototyping Cryptosystems. was cited by 141 at https://scholar.google.com/scholar?cites=9777459091335472408&as_sdt=5,37&sciodt=0,37&hl=en with one result
BLACR: TTP-Free Blacklistable Anonymous Credentials with Reputation. was cited by 44 at https://scholar.google.com/scholar?cites=2435943904930821185&as_sdt=5,37&sciodt=0,37&hl=en with one result
Automated Synthesis of Secure Distributed Applications. was cited by 10 at https://scholar.google.com/scholar?cites=1135426740740092148&as_sdt=5,37&sciodt=0,37&hl=en with one result
Accountable Wiretapping -or- I know they can hear you now. was cited by 5 at https://scholar.google.com/scholar?cites=4308179836633591318&as_sdt=5,37&sciodt=0,37&hl=en with one result
Track Me If You Can: On the Effectiveness of Context-based Identifier Changes in Deployed Mobile Networks. was cited by 23 at https://scholar.google.com/scholar?cites=10115305156278594014&as_sdt=5,37&sciodt=0,37&hl=en with one result
Towards Taming Privilege-Escalation Attacks on Android. was cited by 344 at https://scholar.google.com/scholar?cites=17960948496473144115&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Latent Community Model for Detecting Sybils in Social Networks. was cited by 131 at https://scholar.google.com/scholar?cites=7537420994299088416&as_sdt=5,37&sciodt=0,37&hl=en with one result
PathCutter: Severing the Self-Propagation Path of XSS JavaScript Worms in Social Web Networks. was cited by 39 at https://scholar.google.com/scholar?cites=2620718184682357677&as_sdt=5,37&sciodt=0,37&hl=en with one result
Adaptive Password-Strength Meters from Markov Models. was cited by 97 at https://scholar.google.com/scholar?cites=2651598637929585266&as_sdt=5,37&sciodt=0,37&hl=en with one result
Abuse Detection and Prevention Systems at a Large Scale Video Sharing Website. was cited by this title hasn't been cited at no URL with one result
Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds. was cited by 61 at https://scholar.google.com/scholar?cites=11736374253902040947&as_sdt=5,37&sciodt=0,37&hl=en with one result
Distance Hijacking Attacks on Distance Bounding Protocols. was cited by 103 at https://scholar.google.com/scholar?cites=16305809885342672888&as_sdt=5,37&sciodt=0,37&hl=en with one result
MoCFI: A Framework to Mitigate Control-Flow Attacks on Smartphones. was cited by 112 at https://scholar.google.com/scholar?cites=4388429974087324030&as_sdt=5,37&sciodt=0,37&hl=en with one result
Static detection of C++ vtable escape vulnerabilities in binary code. was cited by 22 at https://scholar.google.com/scholar?cites=12087143409768186771&as_sdt=5,37&sciodt=0,37&hl=en with one result
ANDaNA: Anonymous Named Data Networking Application. was cited by 86 at https://scholar.google.com/scholar?cites=16613123201984676438&as_sdt=5,37&sciodt=0,37&hl=en with one result
SMART: Secure and Minimal Architecture for (Establishing Dynamic) Root of Trust. was cited by 109 at https://scholar.google.com/scholar?cites=6946503817366616162&as_sdt=5,37&sciodt=0,37&hl=en with one result
Towards Online Spam Filtering in Social Networks. was cited by 145 at https://scholar.google.com/scholar?cites=10029611128479502009&as_sdt=5,37&sciodt=0,37&hl=en with one result
Weaponizing Femtocells: The Effect of Rogue Devices on Mobile Telecommunications. was cited by 49 at https://scholar.google.com/scholar?cites=2221909745466360179&as_sdt=5,37&sciodt=0,37&hl=en with one result
Systematic Detection of Capability Leaks in Stock Android Smartphones. was cited by 416 at https://scholar.google.com/scholar?cites=14002971234098270282&as_sdt=5,37&sciodt=0,37&hl=en with one result
Private Set Intersection: Are Garbled Circuits Better than Custom Protocols? was cited by 161 at https://scholar.google.com/scholar?cites=2281419742196859364&as_sdt=5,37&sciodt=0,37&hl=en with one result
Access Pattern disclosure on Searchable Encryption: Ramification, Attack and Mitigation. was cited by 214 at https://scholar.google.com/scholar?cites=8580076803415303936&as_sdt=5,37&sciodt=0,37&hl=en with one result
Shadow: Running Tor in a Box for Accurate and Efficient Experimentation. was cited by 81 at https://scholar.google.com/scholar?cites=12341442653770148265&as_sdt=5,37&sciodt=0,37&hl=en with one result
Throttling Tor Bandwidth Parasites. was cited by 31 at https://scholar.google.com/scholar?cites=14682766495667076851&as_sdt=5,37&sciodt=0,37&hl=en with one result
A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware. was cited by 34 at https://scholar.google.com/scholar?cites=1059970925160991265&as_sdt=5,37&sciodt=0,37&hl=en with one result
Ghost Domain Names: Revoked Yet Still Resolvable. was cited by 14 at https://scholar.google.com/scholar?cites=17715766597214569595&as_sdt=5,37&sciodt=0,37&hl=en with one result
Location leaks over the GSM air interface. was cited by 2 at https://scholar.google.com/scholar?cites=11524020590713878751&as_sdt=5,37&sciodt=0,37&hl=en with one result
WarningBird: Detecting Suspicious URLs in Twitter Stream. was cited by 121 at https://scholar.google.com/scholar?cites=17081673280305516926&as_sdt=5,37&sciodt=0,37&hl=en with one result
Gatling: Automatic Attack Discovery in Large-Scale Distributed Systems. was cited by 15 at https://scholar.google.com/scholar?cites=2928197001365691073&as_sdt=5,37&sciodt=0,37&hl=en with one result
Discovering Semantic Data of Interest from Un-mappable Memory with Confidence. was cited by 2 at https://scholar.google.com/scholar?cites=2831976887662925099&as_sdt=5,37&sciodt=0,37&hl=en with one result
Chrome Extensions: Threat Analysis and Countermeasures. was cited by 58 at https://scholar.google.com/scholar?cites=8787215981389313087&as_sdt=5,37&sciodt=0,37&hl=en with one result
Privacy-preserving Logarithmic-time Search on Encrypted Data in Cloud. was cited by 69 at https://scholar.google.com/scholar?cites=4980916730862251406&as_sdt=5,37&sciodt=0,37&hl=en with one result
X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks. was cited by 15 at https://scholar.google.com/scholar?cites=12707435726866944612&as_sdt=5,37&sciodt=0,37&hl=en with one result
Persistent OSPF Attacks. was cited by 11 at https://scholar.google.com/scholar?cites=11787844821161149619&as_sdt=5,37&sciodt=0,37&hl=en with one result
Insights into User Behavior in Dealing with Internet Attacks. was cited by 29 at https://scholar.google.com/scholar?cites=2772788237637523051&as_sdt=5,37&sciodt=0,37&hl=en with one result
Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems. was cited by 13 at https://scholar.google.com/scholar?cites=8262582167568750502&as_sdt=5,37&sciodt=0,37&hl=en with one result
Plaintext-Recovery Attacks Against Datagram TLS. was cited by 45 at https://scholar.google.com/scholar?cites=14333833918888111743&as_sdt=5,37&sciodt=0,37&hl=en with one result
You Can Run, but You Can't Hide: Exposing Network Location for Targeted DoS Attacks in Cellular Networks. was cited by 20 at https://scholar.google.com/scholar?cites=16739513134932088532&as_sdt=5,37&sciodt=0,37&hl=en with one result
FreeMarket: Shopping for free in Android applications. was cited by 13 at https://scholar.google.com/scholar?cites=6221763074734327397&as_sdt=5,37&sciodt=0,37&hl=en with one result
Guess Who's Texting You? Evaluating the Security of Smartphone Messaging Applications. was cited by 93 at https://scholar.google.com/scholar?cites=7266383334602062617&as_sdt=5,37&sciodt=0,37&hl=en with one result
Taking Routers Off Their Meds: Why Assumptions Of Router Stability Are Dangerous. was cited by 4 at https://scholar.google.com/scholar?cites=10857488792704848354&as_sdt=5,37&sciodt=0,37&hl=en with one result
Newton Meets Vivaldi: Using Physical Laws to Secure Virtual Coordinate Systems. was cited by this title hasn't been cited at no URL with one result
Making argument systems for outsourced computation practical (sometimes). was cited by 104 at https://scholar.google.com/scholar?cites=8401665984063119513&as_sdt=5,37&sciodt=0,37&hl=en with one result
The Case for Prefetching and Prevalidating TLS Server Certificates. was cited by 20 at https://scholar.google.com/scholar?cites=13124898520357102085&as_sdt=5,37&sciodt=0,37&hl=en with one result
Towards Practical Oblivious RAM. was cited by 212 at https://scholar.google.com/scholar?cites=3526689044172334447&as_sdt=5,37&sciodt=0,37&hl=en with one result
SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes. was cited by 39 at https://scholar.google.com/scholar?cites=8193307172416973890&as_sdt=5,37&sciodt=0,37&hl=en with one result
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring. was cited by 17 at https://scholar.google.com/scholar?cites=6289317075412170125&as_sdt=5,37&sciodt=0,37&hl=en with one result
Using replicated execution for a more secure and reliable web browser. was cited by 10 at https://scholar.google.com/scholar?cites=12734081417597617720&as_sdt=5,37&sciodt=0,37&hl=en with one result
On Limitations of Designing Leakage-Resilient Password Systems: Attacks, Principals and Usability. was cited by 32 at https://scholar.google.com/scholar?cites=4660355945062938781&as_sdt=5,37&sciodt=0,37&hl=en with one result
Hubble: Transparent and Extensible Malware Analysis by Combining Hardware Virtualization and Software Emulation. was cited by 2 at https://scholar.google.com/scholar?cites=12387553131198832056&as_sdt=5,37&sciodt=0,37&hl=en with one result
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications. was cited by 115 at https://scholar.google.com/scholar?cites=15831842579880013548&as_sdt=5,37&sciodt=0,37&hl=en with one result
Identifying and Analyzing Pointer Misuses for Sophisticated Memory-corruption Exploit Diagnosis. was cited by 16 at https://scholar.google.com/scholar?cites=14201782111002033686&as_sdt=5,37&sciodt=0,37&hl=en with one result
Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets. was cited by 681 at https://scholar.google.com/scholar?cites=9066894817333289905&as_sdt=5,37&sciodt=0,37&hl=en with one result
A Refined Ethical Impact Assessment Tool and a Case Study of Its Application. was cited by 4 at https://scholar.google.com/scholar?cites=2434726929916552548&as_sdt=5,37&sciodt=0,37&hl=en with one result
Linguistic Properties of Multi-word Passphrases. was cited by 34 at https://scholar.google.com/scholar?cites=3730651955293970951&as_sdt=5,37&sciodt=0,37&hl=en with one result