ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Proceedings 2002 IEEE Symposium on Security and Privacy
Latest Publications
TOTAL DOCUMENTS
23
(FIVE YEARS 0)
H-INDEX
16
(FIVE YEARS 0)
Published By IEEE
0769515436
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Partitioning attacks: or how to rapidly clone some GSM cards
Proceedings 2002 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.2002.1004360
◽
2005
◽
Cited By ~ 30
Author(s):
J.R. Rao
◽
P. Rohatgi
◽
H. Scherzer
◽
S. Tinguely
Download Full-text
Alert correlation in a cooperative intrusion detection framework
Proceedings 2002 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.2002.1004372
◽
2005
◽
Cited By ~ 264
Author(s):
F. Cuppens
◽
A. Miege
Keyword(s):
Intrusion Detection
◽
Alert Correlation
Download Full-text
Improving computer security using extended static checking
Proceedings 2002 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.2002.1004369
◽
2005
◽
Cited By ~ 23
Author(s):
B.V. Chess
Keyword(s):
Computer Security
◽
Static Checking
Download Full-text
Automated generation and analysis of attack graphs
Proceedings 2002 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.2002.1004377
◽
2005
◽
Cited By ~ 411
Author(s):
O. Sheyner
◽
J. Haines
◽
S. Jha
◽
R. Lippmann
◽
J.M. Wing
Keyword(s):
Attack Graphs
◽
Automated Generation
Download Full-text
Methods and limitations of security policy reconciliation
Proceedings 2002 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.2002.1004363
◽
2005
◽
Cited By ~ 4
Author(s):
P. MDaniel
◽
A. Prakash
Keyword(s):
Security Policy
Download Full-text
Self-healing key distribution with revocation
Proceedings 2002 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.2002.1004375
◽
2005
◽
Cited By ~ 102
Author(s):
J. Staddon
◽
S. Miner
◽
M. Franklin
◽
D. Balfanz
◽
M. Malkin
◽
...
Keyword(s):
Key Distribution
◽
Self Healing
Download Full-text
Binder, a logic-based security language
Proceedings 2002 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.2002.1004365
◽
2005
◽
Cited By ~ 85
Author(s):
J. DeTreville
Download Full-text
Using programmer-written compiler extensions to catch security holes
Proceedings 2002 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.2002.1004368
◽
2005
◽
Cited By ~ 56
Author(s):
K. Ashcraft
◽
D. Engler
Download Full-text
Optical time-domain eavesdropping risks of CRT displays
Proceedings 2002 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.2002.1004358
◽
2005
◽
Cited By ~ 53
Author(s):
M.G. Kuhn
Keyword(s):
Time Domain
◽
Optical Time
Download Full-text
Noninterference and intrusion detection
Proceedings 2002 IEEE Symposium on Security and Privacy
◽
10.1109/secpri.2002.1004370
◽
2005
◽
Cited By ~ 12
Author(s):
C. Ko
◽
T. Redmond
Keyword(s):
Intrusion Detection
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close