ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings of the 15th International Conference on Availability, Reliability and Security
Latest Publications
TOTAL DOCUMENTS
94
(FIVE YEARS 94)
H-INDEX
2
(FIVE YEARS 2)
Published By ACM
9781450388337
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Memory corruption attacks within Android TEEs
Proceedings of the 15th International Conference on Availability, Reliability and Security
◽
10.1145/3407023.3407072
◽
2020
◽
Author(s):
Fabian Fleischer
◽
Marcel Busch
◽
Phillip Kuhrt
Download Full-text
Clust-IT
Proceedings of the 15th International Conference on Availability, Reliability and Security
◽
10.1145/3407023.3409201
◽
2020
◽
Author(s):
Robert P. Markiewicz
◽
Daniele Sgandurra
Download Full-text
Advanced metering infrastructures
Proceedings of the 15th International Conference on Availability, Reliability and Security
◽
10.1145/3407023.3409312
◽
2020
◽
Cited By ~ 1
Author(s):
Gueltoum Bendiab
◽
Konstantinos-Panagiotis Grammatikakis
◽
Ioannis Koufos
◽
Nicholas Kolokotronis
◽
Stavros Shiaeles
Keyword(s):
Advanced Metering
Download Full-text
Detection and classification of slow DoS attacks targeting network servers
Proceedings of the 15th International Conference on Availability, Reliability and Security
◽
10.1145/3407023.3409198
◽
2020
◽
Author(s):
Enrico Cambiaso
◽
Maurizio Aiello
◽
Maurizio Mongelli
◽
Ivan Vaccari
Keyword(s):
Dos Attacks
◽
Network Servers
Download Full-text
Attacker-centric thinking in security
Proceedings of the 15th International Conference on Availability, Reliability and Security
◽
10.1145/3407023.3407082
◽
2020
◽
Author(s):
Caroline Moeckel
Download Full-text
AntiPatterns regarding the application of cryptographic primitives by the example of ransomware
Proceedings of the 15th International Conference on Availability, Reliability and Security
◽
10.1145/3407023.3409182
◽
2020
◽
Author(s):
Michael P. Heinl
◽
Alexander Giehl
◽
Lukas Graif
Keyword(s):
Cryptographic Primitives
Download Full-text
Automated modelling of security incidents to represent logging requirements in software systems
Proceedings of the 15th International Conference on Availability, Reliability and Security
◽
10.1145/3407023.3407081
◽
2020
◽
Author(s):
Fanny Rivera-Ortiz
◽
Liliana Pasquale
Keyword(s):
Software Systems
◽
Security Incidents
Download Full-text
Formalising fault injection and countermeasures
Proceedings of the 15th International Conference on Availability, Reliability and Security
◽
10.1145/3407023.3407049
◽
2020
◽
Author(s):
Thomas Given-Wilson
◽
Axel Legay
Keyword(s):
Fault Injection
Download Full-text
ASAINT
Proceedings of the 15th International Conference on Availability, Reliability and Security
◽
10.1145/3407023.3407076
◽
2020
◽
Author(s):
Mauro Conti
◽
Giulio Rigoni
◽
Flavio Toffalini
Download Full-text
VisualDroid
Proceedings of the 15th International Conference on Availability, Reliability and Security
◽
10.1145/3407023.3407074
◽
2020
◽
Cited By ~ 1
Author(s):
Rosangela Casolare
◽
Carlo De Dominicis
◽
Fabio Martinelli
◽
Francesco Mercaldo
◽
Antonella Santone
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close