Author of the publication

An auctioning reputation system based on anomaly.

, , , , , , and . ACM Conference on Computer and Communications Security, page 270-279. ACM, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Virtual Cache Line: A New Technique to Improve Cache Exploitation for Recursive Data Structures., , and . CC, volume 1575 of Lecture Notes in Computer Science, page 259-273. Springer, (1999)On the Completeness of Attack Mutation Algorithms., , and . CSFW, page 43-56. IEEE Computer Society, (2006)An Auctioning Reputation System Based on Anomaly Detection, , , , , and . in the Proceedings of the 12 th ACM Conference on Computer and Communications Security (CCS, page 270--279. (2005)An efficient profile-analysis framework for data-layout optimizations., , and . POPL, page 140-153. ACM, (2002)ACM SIGPLAN Notices 37(1), January 2002.Foundations for Intrusion Prevention., , and . Prax. Inf.verarb. Kommun., 27 (4): 209-218 (2004)Fast construction of test-program generators for digital signal processors., , , and . ICASSP, page 1989-1992. IEEE Computer Society, (1999)Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?, and . Malware Detection, volume 27 of Advances in Information Security, Springer, (2007)Focusing processor policies via critical-path prediction., , and . ISCA, page 74-85. ACM, (2001)Foundations for Intrusion Prevention., , , and . DIMVA, volume P-46 of LNI, page 143-160. GI, (2004)Language-Based Generation and Evaluation of NIDS Signatures., , and . S&P, page 3-17. IEEE Computer Society, (2005)