96
Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, and Edward W. Felten:
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies.
IEEE Symposium on Security and Privacy, 2015
1172% above average of year
Last visited: Dec-2020
97
David A. Wagner, Jeffrey S. Foster, Eric A. Brewer, and Alexander Aiken:
A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
Network and Distributed System Security Symposium (NDSS), 2000
522% above average of year
Last visited: Dec-2020
98
Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, and Randal E. Bryant:
Semantics-Aware Malware Detection.
IEEE Symposium on Security and Privacy, 2005
472% above average of year
Last visited: Dec-2020
99
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, and Engin Kirda:
Panorama: capturing system-wide information flow for malware detection and analysis.
ACM Conference on Computer and Communications Security (CCS), 2007
421% above average of year
Last visited: Jan-2021
100
Úlfar Erlingsson, Vasyl Pihur, and Aleksandra Korolova:
RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Response.
ACM Conference on Computer and Communications Security (CCS), 2014
940% above average of year
Last visited: Dec-2020