Top-Cited Security Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of computer security. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top 100 papers from 1981 to 2017 ⌄

  1. 1
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4669 cites at Google Scholar
    2778% above average of year
    Last visited: Feb-2018
  2. 2
    Laurent Eschenauer, Virgil D. Gligor:
    A key-management scheme for distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    4628 cites at Google Scholar
    1869% above average of year
    Last visited: Feb-2018
  3. 3
    Dorothy E. Denning:
    An Intrusion-Detection Model.
    IEEE Symposium on Security and Privacy, 1986
    4559 cites at Google Scholar
    1712% above average of year
    Last visited: Feb-2018
  4. 4
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy, 2003
    3725 cites at Google Scholar
    1527% above average of year
    Last visited: Feb-2018
  5. 5
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3653 cites at Google Scholar
    2743% above average of year
    Last visited: Nov-2017
  6. 6
    John Bethencourt, Amit Sahai, Brent Waters:
    Ciphertext-Policy Attribute-Based Encryption.
    IEEE Symposium on Security and Privacy, 2007
    3377 cites at Google Scholar
    2055% above average of year
    Last visited: Mar-2018
  7. 7
    Matt Blaze, Joan Feigenbaum, Jack Lacy:
    Decentralized Trust Management.
    IEEE Symposium on Security and Privacy, 1996
    2924 cites at Google Scholar
    1911% above average of year
    Last visited: Nov-2017
  8. 8
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2464 cites at Google Scholar
    1472% above average of year
    Last visited: Mar-2018
  9. 9
    Dawn Xiaodong Song, David Wagner, Adrian Perrig:
    Practical Techniques for Searches on Encrypted Data.
    IEEE Symposium on Security and Privacy, 2000
    2338 cites at Google Scholar
    1554% above average of year
    Last visited: Dec-2017
  10. 10
    Joseph A. Goguen, José Meseguer:
    Security Policies and Security Models.
    IEEE Symposium on Security and Privacy, 1982
    2294 cites at Google Scholar
    1225% above average of year
    Last visited: Mar-2018
  11. 11
    Donggang Liu, Peng Ning:
    Establishing pairwise keys in distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2281 cites at Google Scholar
    896% above average of year
    Last visited: Mar-2018
  12. 12
    Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
    LEAP: efficient security mechanisms for large-scale distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2254 cites at Google Scholar
    884% above average of year
    Last visited: Mar-2018
  13. 13
    Roger M. Needham:
    Denial of Service.
    ACM Conference on Computer and Communications Security (CCS), 1993
    1980 cites at Google Scholar
    1121% above average of year
    Last visited: Mar-2018
  14. 14
    Martín Abadi, Andrew D. Gordon:
    A Calculus for Cryptographic Protocols: The Spi Calculus.
    ACM Conference on Computer and Communications Security (CCS), 1997
    1891 cites at Google Scholar
    1599% above average of year
    Last visited: Feb-2018
  15. 15
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1889 cites at Google Scholar
    1426% above average of year
    Last visited: Mar-2018
  16. 16
    Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
    A Security Architecture for Computational Grids.
    ACM Conference on Computer and Communications Security (CCS), 1998
    1872 cites at Google Scholar
    1061% above average of year
    Last visited: Mar-2018
  17. 17
    David Moore, Geoffrey M. Voelker, Stefan Savage:
    Inferring Internet Denial-of-Service Activity.
    USENIX Security Symposium, 2001
    1841 cites at Google Scholar
    875% above average of year
    Last visited: Mar-2018
  18. 18
    Ari Juels, Burton S. Kaliski Jr.:
    Pors: proofs of retrievability for large files.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1795 cites at Google Scholar
    1045% above average of year
    Last visited: Mar-2018
  19. 19
    D. D. Clark, D. R. Wilson:
    A Comparison of Commercial and Military Computer Security Policies.
    IEEE Symposium on Security and Privacy, 1987
    1726 cites at Google Scholar
    1136% above average of year
    Last visited: Jan-2018
  20. 20
    Steven M. Bellovin, Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy, 1992
    1717 cites at Google Scholar
    2067% above average of year
    Last visited: Dec-2017
  21. 21
    Wenke Lee, Salvatore J. Stolfo:
    Data Mining Approaches for Intrusion Detection.
    USENIX Security Symposium, 1998
    1708 cites at Google Scholar
    959% above average of year
    Last visited: Feb-2018
  22. 22
    Crispan Cowan:
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
    USENIX Security Symposium, 1998
    1700 cites at Google Scholar
    954% above average of year
    Last visited: Apr-2018
  23. 23
    Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
    A Data Mining Framework for Building Intrusion Detection Models.
    IEEE Symposium on Security and Privacy, 1999
    1650 cites at Google Scholar
    880% above average of year
    Last visited: Jan-2018
  24. 24
    Tal Garfinkel, Mendel Rosenblum:
    A Virtual Machine Introspection Based Architecture for Intrusion Detection.
    Network and Distributed System Security Symposium (NDSS), 2003
    1631 cites at Google Scholar
    612% above average of year
    Last visited: Apr-2018
  25. 25
    Stuart Staniford, Vern Paxson, Nicholas Weaver:
    How to Own the Internet in Your Spare Time.
    USENIX Security Symposium, 2002
    1561 cites at Google Scholar
    564% above average of year
    Last visited: Feb-2018
  26. 26
    Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
    Searchable symmetric encryption: improved definitions and efficient constructions.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1548 cites at Google Scholar
    1105% above average of year
    Last visited: Mar-2018
  27. 27
    James Newsome, Dawn Xiaodong Song:
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
    Network and Distributed System Security Symposium (NDSS), 2005
    1536 cites at Google Scholar
    926% above average of year
    Last visited: Apr-2018
  28. 28
    Yajin Zhou, Xuxian Jiang:
    Dissecting Android Malware: Characterization and Evolution.
    IEEE Symposium on Security and Privacy, 2012
    1533 cites at Google Scholar
    1870% above average of year
    Last visited: Mar-2018
  29. 29
    Ari Juels, Martin Wattenberg:
    A Fuzzy Commitment Scheme.
    ACM Conference on Computer and Communications Security (CCS), 1999
    1506 cites at Google Scholar
    795% above average of year
    Last visited: Feb-2018
  30. 30
    Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
    Detecting Intrusions using System Calls: Alternative Data Models.
    IEEE Symposium on Security and Privacy, 1999
    1397 cites at Google Scholar
    730% above average of year
    Last visited: Feb-2018
  31. 31
    Arvind Narayanan, Vitaly Shmatikov:
    Robust De-anonymization of Large Sparse Datasets.
    IEEE Symposium on Security and Privacy, 2008
    1351 cites at Google Scholar
    1096% above average of year
    Last visited: Dec-2017
  32. 32
    Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
    The Omega Key Management Service.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1334 cites at Google Scholar
    818% above average of year
    Last visited: Sep-2016
  33. 33
    Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
    Network and Distributed System Security Symposium (NDSS), 2005
    1321 cites at Google Scholar
    782% above average of year
    Last visited: Apr-2018
  34. 34
    D. F. C. Brewer, Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy, 1989
    1301 cites at Google Scholar
    2636% above average of year
    Last visited: Jan-2018
  35. 35
    Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:
    Automated Generation and Analysis of Attack Graphs.
    IEEE Symposium on Security and Privacy, 2002
    1298 cites at Google Scholar
    452% above average of year
    Last visited: Feb-2018
  36. 36
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
    Design and Implementation of a TCG-based Integrity Measurement Architecture.
    USENIX Security Symposium, 2004
    1267 cites at Google Scholar
    627% above average of year
    Last visited: Mar-2018
  37. 37
    Yao Liu, Michael K. Reiter, Peng Ning:
    False data injection attacks against state estimation in electric power grids.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1261 cites at Google Scholar
    918% above average of year
    Last visited: Mar-2018
  38. 38
    Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner:
    Android permissions demystified.
    ACM Conference on Computer and Communications Security (CCS), 2011
    1232 cites at Google Scholar
    1321% above average of year
    Last visited: Jan-2018
  39. 39
    Ari Juels, Ronald L. Rivest, Michael Szydlo:
    The blocker tag: selective blocking of RFID tags for consumer privacy.
    ACM Conference on Computer and Communications Security (CCS), 2003
    1199 cites at Google Scholar
    424% above average of year
    Last visited: Feb-2018
  40. 40
    Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
    IEEE Symposium on Security and Privacy, 2000
    1171 cites at Google Scholar
    728% above average of year
    Last visited: Apr-2018
  41. 41
    Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
    Silicon physical random functions.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1155 cites at Google Scholar
    391% above average of year
    Last visited: Mar-2018
  42. 42
    Thomas Beth, Malte Borcherding, Birgit Klein:
    Valuation of Trust in Open Networks.
    European Symposium on Research in Computer Security (ESORICS), 1994
    1145 cites at Google Scholar
    1497% above average of year
    Last visited: Feb-2018
  43. 43
    Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
    Proxy Signatures for Delegating Signing Operation.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1130 cites at Google Scholar
    677% above average of year
    Last visited: Mar-2018
  44. 44
    Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
    European Symposium on Research in Computer Security (ESORICS), 2009
    1101 cites at Google Scholar
    789% above average of year
    Last visited: Jan-2018
  45. 45
    Kevin D. Bowers, Ari Juels, Alina Oprea:
    HAIL: a high-availability and integrity layer for cloud storage.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1075 cites at Google Scholar
    768% above average of year
    Last visited: Dec-2017
  46. 46
    J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
    Lest We Remember: Cold Boot Attacks on Encryption Keys.
    USENIX Security Symposium, 2008
    1063 cites at Google Scholar
    841% above average of year
    Last visited: Dec-2017
  47. 47
    Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
    USENIX Security Symposium, 2008
    1050 cites at Google Scholar
    829% above average of year
    Last visited: Jan-2018
  48. 48
    Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
    EXE: automatically generating inputs of death.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1048 cites at Google Scholar
    716% above average of year
    Last visited: Apr-2018
  49. 49
    Cliff Changchun Zou, Weibo Gong, Donald F. Towsley:
    Code red worm propagation modeling and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1046 cites at Google Scholar
    345% above average of year
    Last visited: Feb-2018
  50. 50
    C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
    Dynamic provable data possession.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1040 cites at Google Scholar
    740% above average of year
    Last visited: Mar-2018
  51. 51
    Arvind Narayanan, Vitaly Shmatikov:
    De-anonymizing Social Networks.
    IEEE Symposium on Security and Privacy, 2009
    1027 cites at Google Scholar
    729% above average of year
    Last visited: Mar-2018
  52. 52
    Rachna Dhamija, Adrian Perrig:
    Deja Vu-A User Study: Using Images for Authentication.
    USENIX Security Symposium, 2000
    1019 cites at Google Scholar
    621% above average of year
    Last visited: Mar-2018
  53. 53
    Ninghui Li, John C. Mitchell, William H. Winsborough:
    Design of a Role-Based Trust-Management Framework.
    IEEE Symposium on Security and Privacy, 2002
    1004 cites at Google Scholar
    327% above average of year
    Last visited: Feb-2018
  54. 54
    Michael Steiner, Gene Tsudik, Michael Waidner:
    Diffie-Hellman Key Distribution Extended to Group Communication.
    ACM Conference on Computer and Communications Security (CCS), 1996
    970 cites at Google Scholar
    567% above average of year
    Last visited: Feb-2018
  55. 55
    Rafail Ostrovsky, Amit Sahai, Brent Waters:
    Attribute-based encryption with non-monotonic access structures.
    ACM Conference on Computer and Communications Security (CCS), 2007
    965 cites at Google Scholar
    516% above average of year
    Last visited: Mar-2018
  56. 56
    Patrice Godefroid, Michael Y. Levin, David A. Molnar:
    Automated Whitebox Fuzz Testing.
    Network and Distributed System Security Symposium (NDSS), 2008
    962 cites at Google Scholar
    751% above average of year
    Last visited: Jan-2018
  57. 57
    Hyang-Ah Kim, Brad Karp:
    Autograph: Toward Automated, Distributed Worm Signature Detection.
    USENIX Security Symposium, 2004
    959 cites at Google Scholar
    450% above average of year
    Last visited: Mar-2018
  58. 58
    Frédéric Cuppens, Alexandre Miège:
    Alert Correlation in a Cooperative Intrusion Detection Framework.
    IEEE Symposium on Security and Privacy, 2002
    956 cites at Google Scholar
    307% above average of year
    Last visited: Dec-2017
  59. 59
    Charles Lynn:
    Secure Border Gateway Protocol (S-BGP).
    Network and Distributed System Security Symposium (NDSS), 1999
    955 cites at Google Scholar
    467% above average of year
    Last visited: Apr-2018
  60. 60
    William Enck, Machigar Ongtang, Patrick Drew McDaniel:
    On lightweight mobile phone application certification.
    ACM Conference on Computer and Communications Security (CCS), 2009
    953 cites at Google Scholar
    670% above average of year
    Last visited: Mar-2018
  61. 61
    Ernest F. Brickell, Jan Camenisch, Liqun Chen:
    Direct anonymous attestation.
    ACM Conference on Computer and Communications Security (CCS), 2004
    951 cites at Google Scholar
    445% above average of year
    Last visited: Feb-2018
  62. 62
    Alfonso Valdes, Keith Skinner:
    Probabilistic Alert Correlation.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    942 cites at Google Scholar
    399% above average of year
    Last visited: Jan-2018
  63. 63
    James Newsome, Brad Karp, Dawn Xiaodong Song:
    Polygraph: Automatically Generating Signatures for Polymorphic Worms.
    IEEE Symposium on Security and Privacy, 2005
    941 cites at Google Scholar
    529% above average of year
    Last visited: Jan-2018
  64. 64
    Hovav Shacham:
    The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
    ACM Conference on Computer and Communications Security (CCS), 2007
    939 cites at Google Scholar
    499% above average of year
    Last visited: Feb-2018
  65. 65
    David Molnar, David Wagner:
    Privacy and security in library RFID: issues, practices, and architectures.
    ACM Conference on Computer and Communications Security (CCS), 2004
    939 cites at Google Scholar
    438% above average of year
    Last visited: Mar-2018
  66. 66
    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
    Control-flow integrity.
    ACM Conference on Computer and Communications Security (CCS), 2005
    932 cites at Google Scholar
    523% above average of year
    Last visited: Mar-2018
  67. 67
    Ke Wang, Salvatore J. Stolfo:
    Anomalous Payload-Based Network Intrusion Detection.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2004
    930 cites at Google Scholar
    433% above average of year
    Last visited: Apr-2018
  68. 68
    John F. Canny:
    Collaborative Filtering with Privacy.
    IEEE Symposium on Security and Privacy, 2002
    929 cites at Google Scholar
    295% above average of year
    Last visited: Feb-2018
  69. 69
    William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri:
    A Study of Android Application Security.
    USENIX Security Symposium, 2011
    923 cites at Google Scholar
    965% above average of year
    Last visited: Nov-2017
  70. 70
    Jeffrey O. Kephart, Steve R. White:
    Directed-Graph Epidemiological Models of Computer Viruses.
    IEEE Symposium on Security and Privacy, 1991
    906 cites at Google Scholar
    957% above average of year
    Last visited: Mar-2018
  71. 71
    David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
    Network and Distributed System Security Symposium (NDSS), 2000
    898 cites at Google Scholar
    535% above average of year
    Last visited: Apr-2018
  72. 72
    Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
    The Design and Analysis of Graphical Passwords.
    USENIX Security Symposium, 1999
    897 cites at Google Scholar
    433% above average of year
    Last visited: Mar-2018
  73. 73
    Martín Abadi, Roger M. Needham:
    Prudent engineering practice for cryptographic protocols.
    IEEE Symposium on Security and Privacy, 1994
    894 cites at Google Scholar
    1147% above average of year
    Last visited: Feb-2018
  74. 74
    Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo:
    Data Mining Methods for Detection of New Malicious Executables.
    IEEE Symposium on Security and Privacy, 2001
    893 cites at Google Scholar
    373% above average of year
    Last visited: Mar-2018
  75. 75
    Ross J. Anderson:
    Why Information Security is Hard-An Economic Perspective.
    Annual Computer Security Applications Conference (ACSAC), 2001
    886 cites at Google Scholar
    369% above average of year
    Last visited: Apr-2018
  76. 76
    Guofei Gu, Junjie Zhang, Wenke Lee:
    BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
    Network and Distributed System Security Symposium (NDSS), 2008
    885 cites at Google Scholar
    683% above average of year
    Last visited: Feb-2018
  77. 77
    David Wagner, Drew Dean:
    Intrusion Detection via Static Analysis.
    IEEE Symposium on Security and Privacy, 2001
    883 cites at Google Scholar
    368% above average of year
    Last visited: Jan-2018
  78. 78
    Michael J. Freedman, Robert Morris:
    Tarzan: a peer-to-peer anonymizing network layer.
    ACM Conference on Computer and Communications Security (CCS), 2002
    871 cites at Google Scholar
    271% above average of year
    Last visited: Feb-2018
  79. 79
    John Bellardo, Stefan Savage:
    802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.
    USENIX Security Symposium, 2003
    867 cites at Google Scholar
    279% above average of year
    Last visited: Feb-2018
  80. 80
    Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
    On the effectiveness of address-space randomization.
    ACM Conference on Computer and Communications Security (CCS), 2004
    865 cites at Google Scholar
    396% above average of year
    Last visited: Feb-2018
  81. 81
    Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante:
    A reputation-based approach for choosing reliable resources in peer-to-peer networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    864 cites at Google Scholar
    268% above average of year
    Last visited: Dec-2017
  82. 82
    Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
    Experimental Security Analysis of a Modern Automobile.
    IEEE Symposium on Security and Privacy, 2010
    862 cites at Google Scholar
    907% above average of year
    Last visited: Feb-2018
  83. 83
    Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer:
    A Secure Environment for Untrusted Helper Applications.
    USENIX Security Symposium, 1996
    848 cites at Google Scholar
    483% above average of year
    Last visited: Mar-2018
  84. 84
    Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong:
    BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
    USENIX Security Symposium, 2007
    843 cites at Google Scholar
    438% above average of year
    Last visited: Dec-2017
  85. 85
    Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar:
    Efficient and Secure Source Authentication for Multicast.
    Network and Distributed System Security Symposium (NDSS), 2001
    842 cites at Google Scholar
    346% above average of year
    Last visited: Jan-2018
  86. 86
    Paul Ammann, Duminda Wijesekera, Saket Kaushik:
    Scalable, graph-based network vulnerability analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    821 cites at Google Scholar
    249% above average of year
    Last visited: Mar-2018
  87. 87
    Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:
    Fast Portscan Detection Using Sequential Hypothesis Testing.
    IEEE Symposium on Security and Privacy, 2004
    815 cites at Google Scholar
    367% above average of year
    Last visited: Jan-2018
  88. 88
    Ross J. Anderson:
    Why Cryptosystems Fail.
    ACM Conference on Computer and Communications Security (CCS), 1993
    810 cites at Google Scholar
    399% above average of year
    Last visited: Feb-2018
  89. 89
    Li Gong, Roger M. Needham, Raphael Yahalom:
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy, 1990
    810 cites at Google Scholar
    1075% above average of year
    Last visited: Mar-2018
  90. 90
    Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella:
    Fairplay - Secure Two-Party Computation System.
    USENIX Security Symposium, 2004
    806 cites at Google Scholar
    362% above average of year
    Last visited: Feb-2018
  91. 91
    Bryan Parno, Adrian Perrig, Virgil D. Gligor:
    Distributed Detection of Node Replication Attacks in Sensor Networks.
    IEEE Symposium on Security and Privacy, 2005
    800 cites at Google Scholar
    434% above average of year
    Last visited: Feb-2018
  92. 92
    Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant:
    Semantics-Aware Malware Detection.
    IEEE Symposium on Security and Privacy, 2005
    791 cites at Google Scholar
    428% above average of year
    Last visited: Mar-2018
  93. 93
    Hervé Debar, Andreas Wespi:
    Aggregation and Correlation of Intrusion-Detection Alerts.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    786 cites at Google Scholar
    316% above average of year
    Last visited: Feb-2018
  94. 94
    Niels Provos:
    A Virtual Honeypot Framework.
    USENIX Security Symposium, 2004
    780 cites at Google Scholar
    347% above average of year
    Last visited: Mar-2018
  95. 95
    J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni:
    An Architecture for Intrusion Detection Using Autonomous Agents.
    Annual Computer Security Applications Conference (ACSAC), 1998
    777 cites at Google Scholar
    382% above average of year
    Last visited: Jan-2018
  96. 96
    Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
    Panorama: capturing system-wide information flow for malware detection and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2007
    777 cites at Google Scholar
    396% above average of year
    Last visited: Apr-2018
  97. 97
    Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong:
    Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.
    Network and Distributed System Security Symposium (NDSS), 2002
    774 cites at Google Scholar
    229% above average of year
    Last visited: Dec-2017
  98. 98
    Niels Provos:
    Defending Against Statistical Steganalysis.
    USENIX Security Symposium, 2001
    773 cites at Google Scholar
    309% above average of year
    Last visited: Mar-2018
  99. 99
    Ari Juels, John G. Brainard:
    Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
    Network and Distributed System Security Symposium (NDSS), 1999
    762 cites at Google Scholar
    353% above average of year
    Last visited: Jan-2018
  100. 100
    George Danezis, Roger Dingledine, Nick Mathewson:
    Mixminion: Design of a Type III Anonymous Remailer Protocol.
    IEEE Symposium on Security and Privacy, 2003
    756 cites at Google Scholar
    230% above average of year
    Last visited: Dec-2017