资源简介
整理NDSS2014论文,NDSS为安全界比较重要的会议
代码片段和文件信息
属性 大小 日期 时间 名称
----------- --------- ---------- ----- ----
目录 0 2015-07-29 15:14 2014\
目录 0 2015-07-29 15:14 2014\Session 1 Network Security\
文件 339767 2015-07-29 14:37 2014\Session 1 Network Security\01_1_1.pdf
文件 476668 2015-07-29 14:40 2014\Session 1 Network Security\01_5.Amplification Hel Revisiting Network Protocols for DDoS Abuse.pdf
文件 641906 2015-07-29 14:39 2014\Session 1 Network Security\4.CyberProbe Towards Internet-Scale Active Detection of Malicious Servers.pdf
文件 1692661 2015-07-29 14:39 2014\Session 1 Network Security\Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission.pdf
文件 1115373 2015-07-29 14:38 2014\Session 1 Network Security\No Direction Home The True Cost of Routing Around Decoys.pdf
目录 0 2015-07-29 15:05 2014\Session 10 Security of Mobile Devices II\
文件 346335 2015-07-29 15:04 2014\Session 10 Security of Mobile Devices II\A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.pdf
文件 909497 2015-07-29 15:04 2014\Session 10 Security of Mobile Devices II\AirBag Boosting Smartphone Resistance to Malware Infection.pdf
文件 632870 2015-07-29 15:05 2014\Session 10 Security of Mobile Devices II\AppSealer Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.pdf
文件 626301 2015-07-29 15:05 2014\Session 10 Security of Mobile Devices II\Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.pdf
文件 312559 2015-07-29 15:04 2014\Session 10 Security of Mobile Devices II\SMV-HUNTER Large Scale Automated Detection of SSL TLS Man-in-the-Middle Vulnerabilities in Android Apps.pdf
目录 0 2015-07-29 15:09 2014\Session 11 Malware\
文件 1044164 2015-07-29 15:08 2014\Session 11 Malware\Drebin Effective and Explainable Detection of Android Malware in Your Pocket.pdf
文件 1120278 2015-07-29 15:08 2014\Session 11 Malware\Gyrus A framework for User-Intent Monitoring of Text-based Networked Applications.pdf
文件 6513325 2015-07-29 15:07 2014\Session 11 Malware\Nazca Detecting Malware Distribution in Large-Scale Networks.pdf
文件 2035095 2015-07-29 15:09 2014\Session 11 Malware\Neural Signatures of User-Centered Security An fMRI Study of Phishing and Malware Warnings (1).pdf
文件 2035095 2015-07-29 15:09 2014\Session 11 Malware\Neural Signatures of User-Centered Security An fMRI Study of Phishing and Malware Warnings.pdf
文件 485862 2015-07-29 15:07 2014\Session 11 Malware\Persistent Data-only Malware Function Hooks without Code.pdf
目录 0 2015-07-29 15:11 2014\Session 12 Crypto II\
文件 531017 2015-07-29 15:11 2014\Session 12 Crypto II\Efficient Private File Retrieval by Combining ORAM and PIR.pdf
文件 536000 2015-07-29 15:11 2014\Session 12 Crypto II\Practical Issues with TLS Client Certificate Authentication.pdf
文件 1982639 2015-07-29 15:11 2014\Session 12 Crypto II\Practical Known-Plaintext Attacks against Physical layer Security in Wireless MIMO Systems.pdf
文件 1595018 2015-07-29 15:10 2014\Session 12 Crypto II\Web PKI Closing the Gap between Guidelines and Practices.pdf
目录 0 2015-07-29 14:50 2014\Session 2 Software and System Security\
文件 737232 2015-07-29 14:42 2014\Session 2 Software and System Security\02_1_ROPecker A Generic and Practical Approach for Defending Against ROP Attacks.pdf
文件 584977 2015-07-29 14:42 2014\Session 2 Software and System Security\02_2_A Trusted Safety Verifier for Process Controller Code.pdf
文件 1680221 2015-07-29 14:43 2014\Session 2 Software and System Security\02_3_AVATAR A framework to Support Dynamic Security Analysis of embedded Systems Firmwares.pdf
文件 402148 2015-07-29 14:44 2014\Session 2 Software and System Security\02_4_SafeDispatch Securing C++ Virtual Calls from Memory Corruption Attacks.pdf
文件 882674 2015-07-29 14:44 2014\Session 2 Software and System Security\02_5_Hybrid-Bridge Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.pdf
............此处省略38个文件信息
----------- --------- ---------- ----- ----
目录 0 2015-07-29 15:14 2014\
目录 0 2015-07-29 15:14 2014\Session 1 Network Security\
文件 339767 2015-07-29 14:37 2014\Session 1 Network Security\01_1_1.pdf
文件 476668 2015-07-29 14:40 2014\Session 1 Network Security\01_5.Amplification Hel Revisiting Network Protocols for DDoS Abuse.pdf
文件 641906 2015-07-29 14:39 2014\Session 1 Network Security\4.CyberProbe Towards Internet-Scale Active Detection of Malicious Servers.pdf
文件 1692661 2015-07-29 14:39 2014\Session 1 Network Security\Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission.pdf
文件 1115373 2015-07-29 14:38 2014\Session 1 Network Security\No Direction Home The True Cost of Routing Around Decoys.pdf
目录 0 2015-07-29 15:05 2014\Session 10 Security of Mobile Devices II\
文件 346335 2015-07-29 15:04 2014\Session 10 Security of Mobile Devices II\A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks.pdf
文件 909497 2015-07-29 15:04 2014\Session 10 Security of Mobile Devices II\AirBag Boosting Smartphone Resistance to Malware Infection.pdf
文件 632870 2015-07-29 15:05 2014\Session 10 Security of Mobile Devices II\AppSealer Automatic Generation of Vulnerability-Specific Patches for Preventing Component Hijacking Attacks in Android Applications.pdf
文件 626301 2015-07-29 15:05 2014\Session 10 Security of Mobile Devices II\Execute This! Analyzing Unsafe and Malicious Dynamic Code Loading in Android Applications.pdf
文件 312559 2015-07-29 15:04 2014\Session 10 Security of Mobile Devices II\SMV-HUNTER Large Scale Automated Detection of SSL TLS Man-in-the-Middle Vulnerabilities in Android Apps.pdf
目录 0 2015-07-29 15:09 2014\Session 11 Malware\
文件 1044164 2015-07-29 15:08 2014\Session 11 Malware\Drebin Effective and Explainable Detection of Android Malware in Your Pocket.pdf
文件 1120278 2015-07-29 15:08 2014\Session 11 Malware\Gyrus A fr
文件 6513325 2015-07-29 15:07 2014\Session 11 Malware\Nazca Detecting Malware Distribution in Large-Scale Networks.pdf
文件 2035095 2015-07-29 15:09 2014\Session 11 Malware\Neural Signatures of User-Centered Security An fMRI Study of Phishing and Malware Warnings (1).pdf
文件 2035095 2015-07-29 15:09 2014\Session 11 Malware\Neural Signatures of User-Centered Security An fMRI Study of Phishing and Malware Warnings.pdf
文件 485862 2015-07-29 15:07 2014\Session 11 Malware\Persistent Data-only Malware Function Hooks without Code.pdf
目录 0 2015-07-29 15:11 2014\Session 12 Crypto II\
文件 531017 2015-07-29 15:11 2014\Session 12 Crypto II\Efficient Private File Retrieval by Combining ORAM and PIR.pdf
文件 536000 2015-07-29 15:11 2014\Session 12 Crypto II\Practical Issues with TLS Client Certificate Authentication.pdf
文件 1982639 2015-07-29 15:11 2014\Session 12 Crypto II\Practical Known-Plaintext Attacks against Physical la
文件 1595018 2015-07-29 15:10 2014\Session 12 Crypto II\Web PKI Closing the Gap between Guidelines and Practices.pdf
目录 0 2015-07-29 14:50 2014\Session 2 Software and System Security\
文件 737232 2015-07-29 14:42 2014\Session 2 Software and System Security\02_1_ROPecker A Generic and Practical Approach for Defending Against ROP Attacks.pdf
文件 584977 2015-07-29 14:42 2014\Session 2 Software and System Security\02_2_A Trusted Safety Verifier for Process Controller Code.pdf
文件 1680221 2015-07-29 14:43 2014\Session 2 Software and System Security\02_3_AVATAR A fr
文件 402148 2015-07-29 14:44 2014\Session 2 Software and System Security\02_4_SafeDispatch Securing C++ Virtual Calls from Memory Corruption Attacks.pdf
文件 882674 2015-07-29 14:44 2014\Session 2 Software and System Security\02_5_Hybrid-Bridge Efficiently Bridging the Semantic-Gap in VMI via Decoupled Execution and Training Memoization.pdf
............此处省略38个文件信息
相关资源
- labview2014模块和破解文件
- SOPTOOL2014 V3.0
- 汉王考勤机开发指南HANVON SDK 20141119
- 北京航空航天大学研究生数值分析计
- search methodologies 2014
- 人民日报2014语料库(全)
- USENIX OSDI 2014年论文集Proceedings of USE
- 2014BDTC大会资料
- 免费的2014ftp暴力破解扫描工具可自动
- 2014英伟达校招笔试真题_嵌入式_软件
- 抽象代数简明教程 [李慧陵,周胜林,
- GG2014版源码。仿QQ聊天软件
- 最简单的基于FFMPEG+SDL的视频播放器
- 电力自动化通讯规约精解 [王顺江 主
- WS 445-2014电子病历基本数据集1-17全集
- 黑客防线2014合集.part2.rar
- 广工软件工程复习资料2016年6月(20
- 北京地图2014shp文件 GIS开发必备
- 2014年人民日报数据
- 北京地图2014shp
- people_daily_2014_corpus.zip
- 卫生部WS 445-2014电子病历基本数据集
- U盘数据恢复大师含注册码 2014版new
- 2014年信息系统项目管理师考试重点难
- MDCC 2014 乐元素CTO凌聪——移动游戏防
- 电路分析导论(原书第12版)2014-10 鲍
- 2014年数字影视后期制作试题
- 2014年最新最好的Unity3d圣典之中文脚本
- 2014年我国大气污染物的时空分布特征
- 2014年全国数学建模大赛a题资料
评论
共有 条评论