在好例子网,分享、交流、成长!
您当前所在位置:首页Others 开发实例一般编程问题 → NDSS 2011论文集.rar

NDSS 2011论文集.rar

一般编程问题

下载此实例
  • 开发语言:Others
  • 实例大小:42.75M
  • 下载次数:1
  • 浏览次数:105
  • 发布时间:2021-12-11
  • 实例类别:一般编程问题
  • 发 布 人:js2021
  • 文件格式:.rar
  • 所需积分:2
 

实例介绍

【实例简介】
rank1 的安全会议 NDSS Symposium2011论文集
【实例截图】
【核心代码】
4744300845215831889.rar
└── NDSS2011
├── Network Malware
│   ├── Finding Malicious Domains Using Passive DNS Analysis.pdf
│   ├── Finding Malicious Domains Using Passive DNS Analysis ps.pdf
│   └── Losing Control of the Internet Using the Data Plane to Attack the Control Plane.jpdf.pdf
├── Network Security
│   ├── Accurate and Provably Secure Latency Estimation with Treeple.pdf
│   ├── A Scalable Watermark to Detect Correlated Network Flows.pdf
│   └── On Measuring the Similarity of Network Hosts
│   └── Pitfalls, New Metrics, and Empirical Analyses.pdf.crdownload
├── OS Security
│   ├── Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.pdf
│   ├── Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures ps.pdf
│   ├── Efficient Monitoring of Untrusted Kernel-Mode Execution.pdf
│   ├── Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions.pdf
│   ├── Practical Protection of Kernel Integrity for Commodity OS from Untrusted Extensions ps.pdf
│   └── SigGraph
│   ├── Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures.pdf.crdownload
│   └── Brute Force Scanning of Kernel Data Structure Instances Using Graph-based Signatures ps.pdf.crdownload
├── Privacy
│   ├── Detecting Privacy Leaks in iOS Applications.pdf
│   ├── Detecting Privacy Leaks in iOS Applications ps.pdf
│   ├── Privacy-Preserving Aggregation of Time-Series Data.pdf
│   ├── Privacy-Preserving Aggregation of Time-Series Data ps.pdf
│   ├── Security and Privacy for RFID-based Supply Chains.pdf
│   └── Security and Privacy for RFID-based Supply Chains ps.pdf
├── Real-World Security Cloud Computing, Biometrics, and Humans
│   ├── Efficient Privacy-Preserving Biometric Identification.pdf
│   ├── Efficient Privacy-Preserving Biometric Identification ps.pdf
│   ├── Replicas on Hold.pdf
│   ├── Usability Testing a Malware-Resistant Input Mechanism.pdf
│   └── Usability Testing a Malware-Resistant Input Mechanism ps.pdf
├── Secure Emerging Applications Social Networks and Smartphones
│   ├── A Security API for Distributed Social Networks paper.pdf
│   ├── A Security API for Distributed Social Networks presentation slide.pdf
│   ├── A Stealthy and Context-Aware Sound Trojan for Smartphones.pdf
│   ├── Location Privacy via Private Proximity Testing paper.pdf
│   └── Location Privacy via Private Proximity Testing ps.pdf
├── Software Security Code Analysis
│   ├── A Dynamic Excavator for Reverse Engineering Data Structures.pdf
│   ├── A Dynamic Excavator for Reverse Engineering Data Structures ps.pdf
│   ├── Automatic Exploit Generation.pdf
│   ├── Automatic Exploit Generation ps.pdf
│   ├── Dynamic Taint Analysis with Targeted Control-Flow Propagation.pdf
│   ├── Dynamic Taint Analysis with Targeted Control-Flow Propagation ps.pdf
│   ├── Exploiting Lingering Vulnerabilities in Default COM Objects.pdf
│   ├── Exploiting Lingering Vulnerabilities in Default COM Objects ps.pdf
│   ├── Principled Reverse Engineering of Types in Binary Programs.pdf
│   └── Principled Reverse Engineering of Types in Binary Programs ps.pdf
├── Web Security
│   ├── Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications.pdf
│   ├── Automated Discovery of Parameter Pollution Vulnerabilities in Web Applications ps.pdf
│   ├── Enabling Various Web Defense Techniques without Client Side Modifications.pdf
│   ├── Enabling Various Web Defense Techniques without Client Side Modifications ps.pdf
│   ├── Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows.pdf
│   └── Sealing Information Leaks with Browser-side Obfuscation of Encrypted Flows ps.pdf
└── Wireless Attacks!
├── Good Neighbor
│   ├── Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.pdf.crdownload
│   └── Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas ps.pdf.crdownload
├── Good Neighbor Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas.pdf
├── Good Neighbor_ Ad hoc Pairing of Nearby Wireless Devices by Multiple Antennas ps.pdf
├── Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars .pdf
├── Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars ps.pdf
├── Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks.pdf
└── Using Classification to Protect the Integrity of Spectrum Measurements in White Space Networks ps.pdf

13 directories, 53 files

标签:

实例下载地址

NDSS 2011论文集.rar

不能下载?内容有错? 点击这里报错 + 投诉 + 提问

好例子网口号:伸出你的我的手 — 分享

网友评论

发表评论

(您的评论需要经过审核才能显示)

查看所有0条评论>>

小贴士

感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。

  • 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  • 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
  • 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  • 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。

关于好例子网

本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明

;
报警