Top-Cited Security Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of computer security. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top 100 papers from 1981 to 2016 ⌄

  1. 1
    Laurent Eschenauer, Virgil D. Gligor:
    A key-management scheme for distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    4463 cites at Google Scholar
    1899% above average of year
    Last visited: May-2017
  2. 2
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4396 cites at Google Scholar
    2700% above average of year
    Last visited: Apr-2017
  3. 3
    Dorothy E. Denning:
    An Intrusion-Detection Model.
    IEEE Symposium on Security and Privacy, 1986
    4209 cites at Google Scholar
    1691% above average of year
    Last visited: Mar-2017
  4. 4
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy, 2003
    3599 cites at Google Scholar
    1575% above average of year
    Last visited: May-2017
  5. 5
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3179 cites at Google Scholar
    2599% above average of year
    Last visited: Apr-2017
  6. 6
    Matt Blaze, Joan Feigenbaum, Jack Lacy:
    Decentralized Trust Management.
    IEEE Symposium on Security and Privacy, 1996
    2895 cites at Google Scholar
    2008% above average of year
    Last visited: May-2017
  7. 7
    Vern Paxson:
    Bro: A System for Detecting Network Intruders in Real-Time.
    USENIX Security Symposium, 1998
    2818 cites at Google Scholar
    1539% above average of year
    Last visited: Apr-2017
  8. 8
    John Bethencourt, Amit Sahai, Brent Waters:
    Ciphertext-Policy Attribute-Based Encryption.
    IEEE Symposium on Security and Privacy, 2007
    2668 cites at Google Scholar
    1811% above average of year
    Last visited: Mar-2017
  9. 9
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2196 cites at Google Scholar
    1473% above average of year
    Last visited: Jun-2017
  10. 10
    Donggang Liu, Peng Ning:
    Establishing pairwise keys in distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2171 cites at Google Scholar
    910% above average of year
    Last visited: Mar-2017
  11. 11
    Joseph A. Goguen, José Meseguer:
    Security Policies and Security Models.
    IEEE Symposium on Security and Privacy, 1982
    2162 cites at Google Scholar
    1460% above average of year
    Last visited: Apr-2017
  12. 12
    Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
    LEAP: efficient security mechanisms for large-scale distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2104 cites at Google Scholar
    879% above average of year
    Last visited: Apr-2017
  13. 13
    Dawn Xiaodong Song, David Wagner, Adrian Perrig:
    Practical Techniques for Searches on Encrypted Data.
    IEEE Symposium on Security and Privacy, 2000
    1945 cites at Google Scholar
    1365% above average of year
    Last visited: Mar-2017
  14. 14
    Martín Abadi, Andrew D. Gordon:
    A Calculus for Cryptographic Protocols: The Spi Calculus.
    ACM Conference on Computer and Communications Security (CCS), 1997
    1867 cites at Google Scholar
    1507% above average of year
    Last visited: May-2017
  15. 15
    Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
    A Security Architecture for Computational Grids.
    ACM Conference on Computer and Communications Security (CCS), 1998
    1832 cites at Google Scholar
    966% above average of year
    Last visited: Apr-2017
  16. 16
    Roger M. Needham:
    Denial of Service.
    ACM Conference on Computer and Communications Security (CCS), 1993
    1826 cites at Google Scholar
    1063% above average of year
    Last visited: Mar-2017
  17. 17
    David Moore, Geoffrey M. Voelker, Stefan Savage:
    Inferring Internet Denial-of-Service Activity.
    USENIX Security Symposium, 2001
    1761 cites at Google Scholar
    878% above average of year
    Last visited: May-2017
  18. 18
    D. D. Clark, D. R. Wilson:
    A Comparison of Commercial and Military Computer Security Policies.
    IEEE Symposium on Security and Privacy, 1987
    1675 cites at Google Scholar
    1146% above average of year
    Last visited: Apr-2017
  19. 19
    Steven M. Bellovin, Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy, 1992
    1648 cites at Google Scholar
    2049% above average of year
    Last visited: Apr-2017
  20. 20
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1632 cites at Google Scholar
    1387% above average of year
    Last visited: Mar-2017
  21. 21
    Wenke Lee, Salvatore J. Stolfo:
    Data Mining Approaches for Intrusion Detection.
    USENIX Security Symposium, 1998
    1626 cites at Google Scholar
    846% above average of year
    Last visited: Apr-2017
  22. 22
    Crispan Cowan:
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
    USENIX Security Symposium, 1998
    1588 cites at Google Scholar
    824% above average of year
    Last visited: Apr-2017
  23. 23
    Ari Juels, Burton S. Kaliski Jr.:
    Pors: proofs of retrievability for large files.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1554 cites at Google Scholar
    1013% above average of year
    Last visited: Apr-2017
  24. 24
    Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
    A Data Mining Framework for Building Intrusion Detection Models.
    IEEE Symposium on Security and Privacy, 1999
    1547 cites at Google Scholar
    930% above average of year
    Last visited: Feb-2017
  25. 25
    Stuart Staniford, Vern Paxson, Nicholas Weaver:
    How to Own the Internet in Your Spare Time.
    USENIX Security Symposium, 2002
    1499 cites at Google Scholar
    572% above average of year
    Last visited: Mar-2017
  26. 26
    Tal Garfinkel, Mendel Rosenblum:
    A Virtual Machine Introspection Based Architecture for Intrusion Detection.
    Network and Distributed System Security Symposium (NDSS), 2003
    1458 cites at Google Scholar
    578% above average of year
    Last visited: Apr-2017
  27. 27
    Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
    Detecting Intrusions using System Calls: Alternative Data Models.
    IEEE Symposium on Security and Privacy, 1999
    1388 cites at Google Scholar
    825% above average of year
    Last visited: Jun-2017
  28. 28
    Ari Juels, Martin Wattenberg:
    A Fuzzy Commitment Scheme.
    ACM Conference on Computer and Communications Security (CCS), 1999
    1385 cites at Google Scholar
    823% above average of year
    Last visited: Mar-2017
  29. 29
    Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
    The Omega Key Management Service.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1334 cites at Google Scholar
    871% above average of year
    Last visited: Sep-2016
  30. 30
    Yajin Zhou, Xuxian Jiang:
    Dissecting Android Malware: Characterization and Evolution.
    IEEE Symposium on Security and Privacy, 2012
    1301 cites at Google Scholar
    1987% above average of year
    Last visited: Jun-2017
  31. 31
    D. F. C. Brewer, Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy, 1989
    1262 cites at Google Scholar
    2581% above average of year
    Last visited: Jun-2017
  32. 32
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
    Design and Implementation of a TCG-based Integrity Measurement Architecture.
    USENIX Security Symposium, 2004
    1210 cites at Google Scholar
    656% above average of year
    Last visited: Jun-2017
  33. 33
    Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:
    Automated Generation and Analysis of Attack Graphs.
    IEEE Symposium on Security and Privacy, 2002
    1187 cites at Google Scholar
    432% above average of year
    Last visited: Mar-2017
  34. 34
    Arvind Narayanan, Vitaly Shmatikov:
    Robust De-anonymization of Large Sparse Datasets.
    IEEE Symposium on Security and Privacy, 2008
    1167 cites at Google Scholar
    1032% above average of year
    Last visited: Apr-2017
  35. 35
    Ari Juels, Ronald L. Rivest, Michael Szydlo:
    The blocker tag: selective blocking of RFID tags for consumer privacy.
    ACM Conference on Computer and Communications Security (CCS), 2003
    1155 cites at Google Scholar
    437% above average of year
    Last visited: Apr-2017
  36. 36
    Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
    Searchable symmetric encryption: improved definitions and efficient constructions.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1155 cites at Google Scholar
    881% above average of year
    Last visited: Apr-2017
  37. 37
    Thomas Beth, Malte Borcherding, Birgit Klein:
    Valuation of Trust in Open Networks.
    European Symposium on Research in Computer Security (ESORICS), 1994
    1116 cites at Google Scholar
    1493% above average of year
    Last visited: May-2017
  38. 38
    Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
    IEEE Symposium on Security and Privacy, 2000
    1115 cites at Google Scholar
    740% above average of year
    Last visited: Apr-2017
  39. 39
    Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
    Network and Distributed System Security Symposium (NDSS), 2005
    1088 cites at Google Scholar
    746% above average of year
    Last visited: Apr-2017
  40. 40
    Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
    Proxy Signatures for Delegating Signing Operation.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1042 cites at Google Scholar
    659% above average of year
    Last visited: Mar-2017
  41. 41
    Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
    Silicon physical random functions.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1010 cites at Google Scholar
    352% above average of year
    Last visited: May-2017
  42. 42
    Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner:
    Android permissions demystified.
    ACM Conference on Computer and Communications Security (CCS), 2011
    1007 cites at Google Scholar
    1300% above average of year
    Last visited: Mar-2017
  43. 43
    Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
    European Symposium on Research in Computer Security (ESORICS), 2009
    1007 cites at Google Scholar
    818% above average of year
    Last visited: Jun-2017
  44. 44
    Cliff Changchun Zou, Weibo Gong, Donald F. Towsley:
    Code red worm propagation modeling and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1004 cites at Google Scholar
    350% above average of year
    Last visited: Apr-2017
  45. 45
    J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
    Lest We Remember: Cold Boot Attacks on Encryption Keys.
    USENIX Security Symposium, 2008
    992 cites at Google Scholar
    862% above average of year
    Last visited: Jun-2017
  46. 46
    Kevin D. Bowers, Ari Juels, Alina Oprea:
    HAIL: a high-availability and integrity layer for cloud storage.
    ACM Conference on Computer and Communications Security (CCS), 2009
    973 cites at Google Scholar
    787% above average of year
    Last visited: Apr-2017
  47. 47
    Ninghui Li, John C. Mitchell, William H. Winsborough:
    Design of a Role-Based Trust-Management Framework.
    IEEE Symposium on Security and Privacy, 2002
    973 cites at Google Scholar
    336% above average of year
    Last visited: Apr-2017
  48. 48
    Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
    USENIX Security Symposium, 2008
    960 cites at Google Scholar
    831% above average of year
    Last visited: May-2017
  49. 49
    Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
    EXE: automatically generating inputs of death.
    ACM Conference on Computer and Communications Security (CCS), 2006
    960 cites at Google Scholar
    715% above average of year
    Last visited: May-2017
  50. 50
    Yao Liu, Michael K. Reiter, Peng Ning:
    False data injection attacks against state estimation in electric power grids.
    ACM Conference on Computer and Communications Security (CCS), 2009
    949 cites at Google Scholar
    765% above average of year
    Last visited: Mar-2017
  51. 51
    Rachna Dhamija, Adrian Perrig:
    Deja Vu-A User Study: Using Images for Authentication.
    USENIX Security Symposium, 2000
    927 cites at Google Scholar
    598% above average of year
    Last visited: Jun-2017
  52. 52
    Frédéric Cuppens, Alexandre Miège:
    Alert Correlation in a Cooperative Intrusion Detection Framework.
    IEEE Symposium on Security and Privacy, 2002
    924 cites at Google Scholar
    314% above average of year
    Last visited: May-2017
  53. 53
    Michael Steiner, Gene Tsudik, Michael Waidner:
    Diffie-Hellman Key Distribution Extended to Group Communication.
    ACM Conference on Computer and Communications Security (CCS), 1996
    923 cites at Google Scholar
    572% above average of year
    Last visited: May-2017
  54. 54
    Alfonso Valdes, Keith Skinner:
    Probabilistic Alert Correlation.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    914 cites at Google Scholar
    407% above average of year
    Last visited: May-2017
  55. 55
    C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
    Dynamic provable data possession.
    ACM Conference on Computer and Communications Security (CCS), 2009
    907 cites at Google Scholar
    727% above average of year
    Last visited: Apr-2017
  56. 56
    Charles Lynn:
    Secure Border Gateway Protocol (S-BGP).
    Network and Distributed System Security Symposium (NDSS), 1999
    902 cites at Google Scholar
    501% above average of year
    Last visited: Apr-2017
  57. 57
    Hyang-Ah Kim, Brad Karp:
    Autograph: Toward Automated, Distributed Worm Signature Detection.
    USENIX Security Symposium, 2004
    889 cites at Google Scholar
    456% above average of year
    Last visited: Mar-2017
  58. 58
    Ernest F. Brickell, Jan Camenisch, Liqun Chen:
    Direct anonymous attestation.
    ACM Conference on Computer and Communications Security (CCS), 2004
    880 cites at Google Scholar
    450% above average of year
    Last visited: Apr-2017
  59. 59
    David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
    Network and Distributed System Security Symposium (NDSS), 2000
    879 cites at Google Scholar
    562% above average of year
    Last visited: May-2017
  60. 60
    Martín Abadi, Roger M. Needham:
    Prudent engineering practice for cryptographic protocols.
    IEEE Symposium on Security and Privacy, 1994
    878 cites at Google Scholar
    1153% above average of year
    Last visited: May-2017
  61. 61
    David Molnar, David Wagner:
    Privacy and security in library RFID: issues, practices, and architectures.
    ACM Conference on Computer and Communications Security (CCS), 2004
    878 cites at Google Scholar
    449% above average of year
    Last visited: Apr-2017
  62. 62
    James Newsome, Brad Karp, Dawn Xiaodong Song:
    Polygraph: Automatically Generating Signatures for Polymorphic Worms.
    IEEE Symposium on Security and Privacy, 2005
    877 cites at Google Scholar
    582% above average of year
    Last visited: Apr-2017
  63. 63
    Patrice Godefroid, Michael Y. Levin, David A. Molnar:
    Automated Whitebox Fuzz Testing.
    Network and Distributed System Security Symposium (NDSS), 2008
    875 cites at Google Scholar
    749% above average of year
    Last visited: Apr-2017
  64. 64
    David Wagner, Drew Dean:
    Intrusion Detection via Static Analysis.
    IEEE Symposium on Security and Privacy, 2001
    862 cites at Google Scholar
    379% above average of year
    Last visited: Jun-2017
  65. 65
    Arvind Narayanan, Vitaly Shmatikov:
    De-anonymizing Social Networks.
    IEEE Symposium on Security and Privacy, 2009
    862 cites at Google Scholar
    686% above average of year
    Last visited: Mar-2017
  66. 66
    John F. Canny:
    Collaborative Filtering with Privacy.
    IEEE Symposium on Security and Privacy, 2002
    859 cites at Google Scholar
    285% above average of year
    Last visited: Mar-2017
  67. 67
    Ke Wang, Salvatore J. Stolfo:
    Anomalous Payload-Based Network Intrusion Detection.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2004
    852 cites at Google Scholar
    433% above average of year
    Last visited: May-2017
  68. 68
    Michael J. Freedman, Robert Morris:
    Tarzan: a peer-to-peer anonymizing network layer.
    ACM Conference on Computer and Communications Security (CCS), 2002
    847 cites at Google Scholar
    279% above average of year
    Last visited: May-2017
  69. 69
    Rafail Ostrovsky, Amit Sahai, Brent Waters:
    Attribute-based encryption with non-monotonic access structures.
    ACM Conference on Computer and Communications Security (CCS), 2007
    847 cites at Google Scholar
    507% above average of year
    Last visited: Jun-2017
  70. 70
    William Enck, Machigar Ongtang, Patrick Drew McDaniel:
    On lightweight mobile phone application certification.
    ACM Conference on Computer and Communications Security (CCS), 2009
    845 cites at Google Scholar
    670% above average of year
    Last visited: Jun-2017
  71. 71
    John Bellardo, Stefan Savage:
    802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.
    USENIX Security Symposium, 2003
    842 cites at Google Scholar
    292% above average of year
    Last visited: Jun-2017
  72. 72
    Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante:
    A reputation-based approach for choosing reliable resources in peer-to-peer networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    833 cites at Google Scholar
    273% above average of year
    Last visited: Feb-2017
  73. 73
    Ross J. Anderson:
    Why Information Security is Hard-An Economic Perspective.
    Annual Computer Security Applications Conference (ACSAC), 2001
    832 cites at Google Scholar
    362% above average of year
    Last visited: Apr-2017
  74. 74
    Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
    The Design and Analysis of Graphical Passwords.
    USENIX Security Symposium, 1999
    830 cites at Google Scholar
    453% above average of year
    Last visited: Apr-2017
  75. 75
    Guofei Gu, Junjie Zhang, Wenke Lee:
    BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
    Network and Distributed System Security Symposium (NDSS), 2008
    825 cites at Google Scholar
    700% above average of year
    Last visited: Jun-2017
  76. 76
    Li Gong, Roger M. Needham, Raphael Yahalom:
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy, 1990
    824 cites at Google Scholar
    1132% above average of year
    Last visited: Jun-2017
  77. 77
    Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer:
    A Secure Environment for Untrusted Helper Applications.
    USENIX Security Symposium, 1996
    822 cites at Google Scholar
    498% above average of year
    Last visited: Apr-2017
  78. 78
    Hovav Shacham:
    The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
    ACM Conference on Computer and Communications Security (CCS), 2007
    817 cites at Google Scholar
    485% above average of year
    Last visited: May-2017
  79. 79
    Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar:
    Efficient and Secure Source Authentication for Multicast.
    Network and Distributed System Security Symposium (NDSS), 2001
    816 cites at Google Scholar
    353% above average of year
    Last visited: Jun-2017
  80. 80
    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
    Control-flow integrity.
    ACM Conference on Computer and Communications Security (CCS), 2005
    811 cites at Google Scholar
    530% above average of year
    Last visited: May-2017
  81. 81
    Jeffrey O. Kephart, Steve R. White:
    Directed-Graph Epidemiological Models of Computer Viruses.
    IEEE Symposium on Security and Privacy, 1991
    801 cites at Google Scholar
    892% above average of year
    Last visited: Mar-2017
  82. 82
    Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:
    Fast Portscan Detection Using Sequential Hypothesis Testing.
    IEEE Symposium on Security and Privacy, 2004
    789 cites at Google Scholar
    393% above average of year
    Last visited: Apr-2017
  83. 83
    William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri:
    A Study of Android Application Security.
    USENIX Security Symposium, 2011
    787 cites at Google Scholar
    994% above average of year
    Last visited: Feb-2017
  84. 84
    Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong:
    BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
    USENIX Security Symposium, 2007
    778 cites at Google Scholar
    457% above average of year
    Last visited: Apr-2017
  85. 85
    Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo:
    Data Mining Methods for Detection of New Malicious Executables.
    IEEE Symposium on Security and Privacy, 2001
    775 cites at Google Scholar
    330% above average of year
    Last visited: Apr-2017
  86. 86
    Ross J. Anderson:
    Why Cryptosystems Fail.
    ACM Conference on Computer and Communications Security (CCS), 1993
    773 cites at Google Scholar
    392% above average of year
    Last visited: Mar-2017
  87. 87
    Hervé Debar, Andreas Wespi:
    Aggregation and Correlation of Intrusion-Detection Alerts.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    768 cites at Google Scholar
    326% above average of year
    Last visited: May-2017
  88. 88
    Paul Ammann, Duminda Wijesekera, Saket Kaushik:
    Scalable, graph-based network vulnerability analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    767 cites at Google Scholar
    244% above average of year
    Last visited: May-2017
  89. 89
    Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
    On the effectiveness of address-space randomization.
    ACM Conference on Computer and Communications Security (CCS), 2004
    764 cites at Google Scholar
    378% above average of year
    Last visited: Apr-2017
  90. 90
    J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni:
    An Architecture for Intrusion Detection Using Autonomous Agents.
    Annual Computer Security Applications Conference (ACSAC), 1998
    758 cites at Google Scholar
    341% above average of year
    Last visited: May-2017
  91. 91
    Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong:
    Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.
    Network and Distributed System Security Symposium (NDSS), 2002
    757 cites at Google Scholar
    239% above average of year
    Last visited: Jun-2017
  92. 92
    John Ioannidis, Steven M. Bellovin:
    Implementing Pushback: Router-Based Defense Against DDoS Attacks.
    Network and Distributed System Security Symposium (NDSS), 2002
    750 cites at Google Scholar
    236% above average of year
    Last visited: Apr-2017
  93. 93
    Niels Provos:
    A Virtual Honeypot Framework.
    USENIX Security Symposium, 2004
    744 cites at Google Scholar
    365% above average of year
    Last visited: May-2017
  94. 94
    Bryan Parno, Adrian Perrig, Virgil D. Gligor:
    Distributed Detection of Node Replication Attacks in Sensor Networks.
    IEEE Symposium on Security and Privacy, 2005
    741 cites at Google Scholar
    476% above average of year
    Last visited: Apr-2017
  95. 95
    Ari Juels, John G. Brainard:
    Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
    Network and Distributed System Security Symposium (NDSS), 1999
    735 cites at Google Scholar
    390% above average of year
    Last visited: Apr-2017
  96. 96
    Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella:
    Fairplay - Secure Two-Party Computation System.
    USENIX Security Symposium, 2004
    730 cites at Google Scholar
    356% above average of year
    Last visited: Apr-2017
  97. 97
    William A. Arbaugh, David J. Farber, Jonathan M. Smith:
    A Secure and Reliable Bootstrap Architecture.
    IEEE Symposium on Security and Privacy, 1997
    722 cites at Google Scholar
    521% above average of year
    Last visited: Apr-2017
  98. 98
    Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
    Panorama: capturing system-wide information flow for malware detection and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2007
    721 cites at Google Scholar
    417% above average of year
    Last visited: Jun-2017
  99. 99
    Niels Provos:
    Defending Against Statistical Steganalysis.
    USENIX Security Symposium, 2001
    717 cites at Google Scholar
    298% above average of year
    Last visited: Apr-2017
  100. 100
    George Danezis, Roger Dingledine, Nick Mathewson:
    Mixminion: Design of a Type III Anonymous Remailer Protocol.
    IEEE Symposium on Security and Privacy, 2003
    714 cites at Google Scholar
    232% above average of year
    Last visited: Apr-2017