Top-Cited Security Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of computer security. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top 100 papers from 1981 to 2017 ⌄

  1. 1
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4662 cites at Google Scholar
    2774% above average of year
    Last visited: Feb-2018
  2. 2
    Laurent Eschenauer, Virgil D. Gligor:
    A key-management scheme for distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    4628 cites at Google Scholar
    1868% above average of year
    Last visited: Feb-2018
  3. 3
    Dorothy E. Denning:
    An Intrusion-Detection Model.
    IEEE Symposium on Security and Privacy, 1986
    4516 cites at Google Scholar
    1710% above average of year
    Last visited: Jan-2018
  4. 4
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy, 2003
    3725 cites at Google Scholar
    1536% above average of year
    Last visited: Feb-2018
  5. 5
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3653 cites at Google Scholar
    2777% above average of year
    Last visited: Nov-2017
  6. 6
    John Bethencourt, Amit Sahai, Brent Waters:
    Ciphertext-Policy Attribute-Based Encryption.
    IEEE Symposium on Security and Privacy, 2007
    3200 cites at Google Scholar
    1983% above average of year
    Last visited: Dec-2017
  7. 7
    Matt Blaze, Joan Feigenbaum, Jack Lacy:
    Decentralized Trust Management.
    IEEE Symposium on Security and Privacy, 1996
    2924 cites at Google Scholar
    1921% above average of year
    Last visited: Nov-2017
  8. 8
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2438 cites at Google Scholar
    1487% above average of year
    Last visited: Jan-2018
  9. 9
    Dawn Xiaodong Song, David Wagner, Adrian Perrig:
    Practical Techniques for Searches on Encrypted Data.
    IEEE Symposium on Security and Privacy, 2000
    2338 cites at Google Scholar
    1556% above average of year
    Last visited: Dec-2017
  10. 10
    Joseph A. Goguen, José Meseguer:
    Security Policies and Security Models.
    IEEE Symposium on Security and Privacy, 1982
    2272 cites at Google Scholar
    1225% above average of year
    Last visited: Jan-2018
  11. 11
    Donggang Liu, Peng Ning:
    Establishing pairwise keys in distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2270 cites at Google Scholar
    897% above average of year
    Last visited: Jan-2018
  12. 12
    Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
    LEAP: efficient security mechanisms for large-scale distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2234 cites at Google Scholar
    881% above average of year
    Last visited: Jan-2018
  13. 13
    Roger M. Needham:
    Denial of Service.
    ACM Conference on Computer and Communications Security (CCS), 1993
    1958 cites at Google Scholar
    1107% above average of year
    Last visited: Feb-2018
  14. 14
    Martín Abadi, Andrew D. Gordon:
    A Calculus for Cryptographic Protocols: The Spi Calculus.
    ACM Conference on Computer and Communications Security (CCS), 1997
    1895 cites at Google Scholar
    1497% above average of year
    Last visited: Nov-2017
  15. 15
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1877 cites at Google Scholar
    1440% above average of year
    Last visited: Feb-2018
  16. 16
    Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
    A Security Architecture for Computational Grids.
    ACM Conference on Computer and Communications Security (CCS), 1998
    1871 cites at Google Scholar
    1064% above average of year
    Last visited: Dec-2017
  17. 17
    David Moore, Geoffrey M. Voelker, Stefan Savage:
    Inferring Internet Denial-of-Service Activity.
    USENIX Security Symposium, 2001
    1818 cites at Google Scholar
    868% above average of year
    Last visited: Jan-2018
  18. 18
    Ari Juels, Burton S. Kaliski Jr.:
    Pors: proofs of retrievability for large files.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1740 cites at Google Scholar
    1033% above average of year
    Last visited: Jan-2018
  19. 19
    D. D. Clark, D. R. Wilson:
    A Comparison of Commercial and Military Computer Security Policies.
    IEEE Symposium on Security and Privacy, 1987
    1726 cites at Google Scholar
    1152% above average of year
    Last visited: Jan-2018
  20. 20
    Steven M. Bellovin, Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy, 1992
    1717 cites at Google Scholar
    2072% above average of year
    Last visited: Dec-2017
  21. 21
    Wenke Lee, Salvatore J. Stolfo:
    Data Mining Approaches for Intrusion Detection.
    USENIX Security Symposium, 1998
    1712 cites at Google Scholar
    965% above average of year
    Last visited: Jan-2018
  22. 22
    Crispan Cowan:
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
    USENIX Security Symposium, 1998
    1694 cites at Google Scholar
    954% above average of year
    Last visited: Jan-2018
  23. 23
    Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
    A Data Mining Framework for Building Intrusion Detection Models.
    IEEE Symposium on Security and Privacy, 1999
    1650 cites at Google Scholar
    881% above average of year
    Last visited: Jan-2018
  24. 24
    Tal Garfinkel, Mendel Rosenblum:
    A Virtual Machine Introspection Based Architecture for Intrusion Detection.
    Network and Distributed System Security Symposium (NDSS), 2003
    1598 cites at Google Scholar
    602% above average of year
    Last visited: Jan-2018
  25. 25
    Stuart Staniford, Vern Paxson, Nicholas Weaver:
    How to Own the Internet in Your Spare Time.
    USENIX Security Symposium, 2002
    1554 cites at Google Scholar
    561% above average of year
    Last visited: Nov-2017
  26. 26
    James Newsome, Dawn Xiaodong Song:
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
    Network and Distributed System Security Symposium (NDSS), 2005
    1515 cites at Google Scholar
    923% above average of year
    Last visited: Jan-2018
  27. 27
    Ari Juels, Martin Wattenberg:
    A Fuzzy Commitment Scheme.
    ACM Conference on Computer and Communications Security (CCS), 1999
    1506 cites at Google Scholar
    795% above average of year
    Last visited: Feb-2018
  28. 28
    Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
    Searchable symmetric encryption: improved definitions and efficient constructions.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1502 cites at Google Scholar
    1083% above average of year
    Last visited: Feb-2018
  29. 29
    Yajin Zhou, Xuxian Jiang:
    Dissecting Android Malware: Characterization and Evolution.
    IEEE Symposium on Security and Privacy, 2012
    1500 cites at Google Scholar
    1870% above average of year
    Last visited: Jan-2018
  30. 30
    Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
    Detecting Intrusions using System Calls: Alternative Data Models.
    IEEE Symposium on Security and Privacy, 1999
    1442 cites at Google Scholar
    757% above average of year
    Last visited: Jan-2018
  31. 31
    Arvind Narayanan, Vitaly Shmatikov:
    Robust De-anonymization of Large Sparse Datasets.
    IEEE Symposium on Security and Privacy, 2008
    1351 cites at Google Scholar
    1107% above average of year
    Last visited: Dec-2017
  32. 32
    Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
    The Omega Key Management Service.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1334 cites at Google Scholar
    822% above average of year
    Last visited: Sep-2016
  33. 33
    D. F. C. Brewer, Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy, 1989
    1301 cites at Google Scholar
    2645% above average of year
    Last visited: Jan-2018
  34. 34
    Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:
    Automated Generation and Analysis of Attack Graphs.
    IEEE Symposium on Security and Privacy, 2002
    1283 cites at Google Scholar
    446% above average of year
    Last visited: Dec-2017
  35. 35
    Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
    Network and Distributed System Security Symposium (NDSS), 2005
    1258 cites at Google Scholar
    750% above average of year
    Last visited: Dec-2017
  36. 36
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
    Design and Implementation of a TCG-based Integrity Measurement Architecture.
    USENIX Security Symposium, 2004
    1258 cites at Google Scholar
    625% above average of year
    Last visited: Nov-2017
  37. 37
    Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner:
    Android permissions demystified.
    ACM Conference on Computer and Communications Security (CCS), 2011
    1232 cites at Google Scholar
    1351% above average of year
    Last visited: Jan-2018
  38. 38
    Yao Liu, Michael K. Reiter, Peng Ning:
    False data injection attacks against state estimation in electric power grids.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1209 cites at Google Scholar
    892% above average of year
    Last visited: Feb-2018
  39. 39
    Ari Juels, Ronald L. Rivest, Michael Szydlo:
    The blocker tag: selective blocking of RFID tags for consumer privacy.
    ACM Conference on Computer and Communications Security (CCS), 2003
    1199 cites at Google Scholar
    427% above average of year
    Last visited: Feb-2018
  40. 40
    Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
    IEEE Symposium on Security and Privacy, 2000
    1165 cites at Google Scholar
    725% above average of year
    Last visited: Dec-2017
  41. 41
    Thomas Beth, Malte Borcherding, Birgit Klein:
    Valuation of Trust in Open Networks.
    European Symposium on Research in Computer Security (ESORICS), 1994
    1148 cites at Google Scholar
    1502% above average of year
    Last visited: Dec-2017
  42. 42
    Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
    Silicon physical random functions.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1129 cites at Google Scholar
    380% above average of year
    Last visited: Dec-2017
  43. 43
    Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
    Proxy Signatures for Delegating Signing Operation.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1107 cites at Google Scholar
    665% above average of year
    Last visited: Dec-2017
  44. 44
    Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
    European Symposium on Research in Computer Security (ESORICS), 2009
    1101 cites at Google Scholar
    804% above average of year
    Last visited: Jan-2018
  45. 45
    Kevin D. Bowers, Ari Juels, Alina Oprea:
    HAIL: a high-availability and integrity layer for cloud storage.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1075 cites at Google Scholar
    782% above average of year
    Last visited: Dec-2017
  46. 46
    J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
    Lest We Remember: Cold Boot Attacks on Encryption Keys.
    USENIX Security Symposium, 2008
    1063 cites at Google Scholar
    850% above average of year
    Last visited: Dec-2017
  47. 47
    Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
    USENIX Security Symposium, 2008
    1050 cites at Google Scholar
    838% above average of year
    Last visited: Jan-2018
  48. 48
    Cliff Changchun Zou, Weibo Gong, Donald F. Towsley:
    Code red worm propagation modeling and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1046 cites at Google Scholar
    345% above average of year
    Last visited: Jan-2018
  49. 49
    C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
    Dynamic provable data possession.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1026 cites at Google Scholar
    742% above average of year
    Last visited: Nov-2017
  50. 50
    Ninghui Li, John C. Mitchell, William H. Winsborough:
    Design of a Role-Based Trust-Management Framework.
    IEEE Symposium on Security and Privacy, 2002
    1004 cites at Google Scholar
    327% above average of year
    Last visited: Feb-2018
  51. 51
    Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
    EXE: automatically generating inputs of death.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1003 cites at Google Scholar
    690% above average of year
    Last visited: Oct-2017
  52. 52
    Arvind Narayanan, Vitaly Shmatikov:
    De-anonymizing Social Networks.
    IEEE Symposium on Security and Privacy, 2009
    995 cites at Google Scholar
    717% above average of year
    Last visited: Dec-2017
  53. 53
    Michael Steiner, Gene Tsudik, Michael Waidner:
    Diffie-Hellman Key Distribution Extended to Group Communication.
    ACM Conference on Computer and Communications Security (CCS), 1996
    965 cites at Google Scholar
    567% above average of year
    Last visited: Jan-2018
  54. 54
    Patrice Godefroid, Michael Y. Levin, David A. Molnar:
    Automated Whitebox Fuzz Testing.
    Network and Distributed System Security Symposium (NDSS), 2008
    962 cites at Google Scholar
    760% above average of year
    Last visited: Jan-2018
  55. 55
    Frédéric Cuppens, Alexandre Miège:
    Alert Correlation in a Cooperative Intrusion Detection Framework.
    IEEE Symposium on Security and Privacy, 2002
    956 cites at Google Scholar
    307% above average of year
    Last visited: Dec-2017
  56. 56
    Hyang-Ah Kim, Brad Karp:
    Autograph: Toward Automated, Distributed Worm Signature Detection.
    USENIX Security Symposium, 2004
    955 cites at Google Scholar
    451% above average of year
    Last visited: Jan-2018
  57. 57
    Charles Lynn:
    Secure Border Gateway Protocol (S-BGP).
    Network and Distributed System Security Symposium (NDSS), 1999
    947 cites at Google Scholar
    463% above average of year
    Last visited: Jan-2018
  58. 58
    Rachna Dhamija, Adrian Perrig:
    Deja Vu-A User Study: Using Images for Authentication.
    USENIX Security Symposium, 2000
    946 cites at Google Scholar
    570% above average of year
    Last visited: Aug-2017
  59. 59
    Alfonso Valdes, Keith Skinner:
    Probabilistic Alert Correlation.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    942 cites at Google Scholar
    402% above average of year
    Last visited: Jan-2018
  60. 60
    James Newsome, Brad Karp, Dawn Xiaodong Song:
    Polygraph: Automatically Generating Signatures for Polymorphic Worms.
    IEEE Symposium on Security and Privacy, 2005
    941 cites at Google Scholar
    536% above average of year
    Last visited: Jan-2018
  61. 61
    Hovav Shacham:
    The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
    ACM Conference on Computer and Communications Security (CCS), 2007
    939 cites at Google Scholar
    511% above average of year
    Last visited: Feb-2018
  62. 62
    David Molnar, David Wagner:
    Privacy and security in library RFID: issues, practices, and architectures.
    ACM Conference on Computer and Communications Security (CCS), 2004
    938 cites at Google Scholar
    441% above average of year
    Last visited: Feb-2018
  63. 63
    William Enck, Machigar Ongtang, Patrick Drew McDaniel:
    On lightweight mobile phone application certification.
    ACM Conference on Computer and Communications Security (CCS), 2009
    929 cites at Google Scholar
    662% above average of year
    Last visited: Feb-2018
  64. 64
    Ernest F. Brickell, Jan Camenisch, Liqun Chen:
    Direct anonymous attestation.
    ACM Conference on Computer and Communications Security (CCS), 2004
    926 cites at Google Scholar
    434% above average of year
    Last visited: Nov-2017
  65. 65
    William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri:
    A Study of Android Application Security.
    USENIX Security Symposium, 2011
    923 cites at Google Scholar
    987% above average of year
    Last visited: Nov-2017
  66. 66
    Rafail Ostrovsky, Amit Sahai, Brent Waters:
    Attribute-based encryption with non-monotonic access structures.
    ACM Conference on Computer and Communications Security (CCS), 2007
    922 cites at Google Scholar
    500% above average of year
    Last visited: Dec-2017
  67. 67
    John F. Canny:
    Collaborative Filtering with Privacy.
    IEEE Symposium on Security and Privacy, 2002
    915 cites at Google Scholar
    289% above average of year
    Last visited: Dec-2017
  68. 68
    Martín Abadi, Roger M. Needham:
    Prudent engineering practice for cryptographic protocols.
    IEEE Symposium on Security and Privacy, 1994
    894 cites at Google Scholar
    1147% above average of year
    Last visited: Feb-2018
  69. 69
    Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
    The Design and Analysis of Graphical Passwords.
    USENIX Security Symposium, 1999
    894 cites at Google Scholar
    431% above average of year
    Last visited: Jan-2018
  70. 70
    Jeffrey O. Kephart, Steve R. White:
    Directed-Graph Epidemiological Models of Computer Viruses.
    IEEE Symposium on Security and Privacy, 1991
    893 cites at Google Scholar
    950% above average of year
    Last visited: Dec-2017
  71. 71
    Ke Wang, Salvatore J. Stolfo:
    Anomalous Payload-Based Network Intrusion Detection.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2004
    893 cites at Google Scholar
    415% above average of year
    Last visited: Nov-2017
  72. 72
    David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
    Network and Distributed System Security Symposium (NDSS), 2000
    893 cites at Google Scholar
    533% above average of year
    Last visited: Nov-2017
  73. 73
    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
    Control-flow integrity.
    ACM Conference on Computer and Communications Security (CCS), 2005
    886 cites at Google Scholar
    498% above average of year
    Last visited: Dec-2017
  74. 74
    David Wagner, Drew Dean:
    Intrusion Detection via Static Analysis.
    IEEE Symposium on Security and Privacy, 2001
    883 cites at Google Scholar
    370% above average of year
    Last visited: Jan-2018
  75. 75
    Michael J. Freedman, Robert Morris:
    Tarzan: a peer-to-peer anonymizing network layer.
    ACM Conference on Computer and Communications Security (CCS), 2002
    879 cites at Google Scholar
    274% above average of year
    Last visited: Jan-2018
  76. 76
    Ross J. Anderson:
    Why Information Security is Hard-An Economic Perspective.
    Annual Computer Security Applications Conference (ACSAC), 2001
    877 cites at Google Scholar
    367% above average of year
    Last visited: Jan-2018
  77. 77
    Guofei Gu, Junjie Zhang, Wenke Lee:
    BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
    Network and Distributed System Security Symposium (NDSS), 2008
    875 cites at Google Scholar
    682% above average of year
    Last visited: Jan-2018
  78. 78
    Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo:
    Data Mining Methods for Detection of New Malicious Executables.
    IEEE Symposium on Security and Privacy, 2001
    870 cites at Google Scholar
    363% above average of year
    Last visited: Feb-2018
  79. 79
    John Bellardo, Stefan Savage:
    802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.
    USENIX Security Symposium, 2003
    865 cites at Google Scholar
    280% above average of year
    Last visited: Dec-2017
  80. 80
    Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante:
    A reputation-based approach for choosing reliable resources in peer-to-peer networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    864 cites at Google Scholar
    267% above average of year
    Last visited: Dec-2017
  81. 81
    Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
    Experimental Security Analysis of a Modern Automobile.
    IEEE Symposium on Security and Privacy, 2010
    862 cites at Google Scholar
    921% above average of year
    Last visited: Feb-2018
  82. 82
    Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
    On the effectiveness of address-space randomization.
    ACM Conference on Computer and Communications Security (CCS), 2004
    849 cites at Google Scholar
    390% above average of year
    Last visited: Jan-2018
  83. 83
    Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer:
    A Secure Environment for Untrusted Helper Applications.
    USENIX Security Symposium, 1996
    847 cites at Google Scholar
    485% above average of year
    Last visited: Feb-2018
  84. 84
    Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong:
    BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
    USENIX Security Symposium, 2007
    843 cites at Google Scholar
    449% above average of year
    Last visited: Dec-2017
  85. 85
    Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar:
    Efficient and Secure Source Authentication for Multicast.
    Network and Distributed System Security Symposium (NDSS), 2001
    842 cites at Google Scholar
    348% above average of year
    Last visited: Jan-2018
  86. 86
    Ross J. Anderson:
    Why Cryptosystems Fail.
    ACM Conference on Computer and Communications Security (CCS), 1993
    816 cites at Google Scholar
    403% above average of year
    Last visited: Dec-2017
  87. 87
    Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:
    Fast Portscan Detection Using Sequential Hypothesis Testing.
    IEEE Symposium on Security and Privacy, 2004
    815 cites at Google Scholar
    370% above average of year
    Last visited: Jan-2018
  88. 88
    Paul Ammann, Duminda Wijesekera, Saket Kaushik:
    Scalable, graph-based network vulnerability analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    810 cites at Google Scholar
    244% above average of year
    Last visited: Dec-2017
  89. 89
    Li Gong, Roger M. Needham, Raphael Yahalom:
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy, 1990
    808 cites at Google Scholar
    1075% above average of year
    Last visited: Feb-2018
  90. 90
    Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella:
    Fairplay - Secure Two-Party Computation System.
    USENIX Security Symposium, 2004
    806 cites at Google Scholar
    365% above average of year
    Last visited: Feb-2018
  91. 91
    Bryan Parno, Adrian Perrig, Virgil D. Gligor:
    Distributed Detection of Node Replication Attacks in Sensor Networks.
    IEEE Symposium on Security and Privacy, 2005
    796 cites at Google Scholar
    438% above average of year
    Last visited: Jan-2018
  92. 92
    Hervé Debar, Andreas Wespi:
    Aggregation and Correlation of Intrusion-Detection Alerts.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    786 cites at Google Scholar
    319% above average of year
    Last visited: Feb-2018
  93. 93
    J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni:
    An Architecture for Intrusion Detection Using Autonomous Agents.
    Annual Computer Security Applications Conference (ACSAC), 1998
    777 cites at Google Scholar
    383% above average of year
    Last visited: Jan-2018
  94. 94
    Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant:
    Semantics-Aware Malware Detection.
    IEEE Symposium on Security and Privacy, 2005
    776 cites at Google Scholar
    424% above average of year
    Last visited: Jan-2018
  95. 95
    Niels Provos:
    A Virtual Honeypot Framework.
    USENIX Security Symposium, 2004
    776 cites at Google Scholar
    347% above average of year
    Last visited: Feb-2018
  96. 96
    Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong:
    Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.
    Network and Distributed System Security Symposium (NDSS), 2002
    774 cites at Google Scholar
    229% above average of year
    Last visited: Dec-2017
  97. 97
    John Ioannidis, Steven M. Bellovin:
    Implementing Pushback: Router-Based Defense Against DDoS Attacks.
    Network and Distributed System Security Symposium (NDSS), 2002
    773 cites at Google Scholar
    229% above average of year
    Last visited: Jan-2018
  98. 98
    Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
    Panorama: capturing system-wide information flow for malware detection and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2007
    765 cites at Google Scholar
    398% above average of year
    Last visited: Feb-2018
  99. 99
    Ari Juels, John G. Brainard:
    Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
    Network and Distributed System Security Symposium (NDSS), 1999
    762 cites at Google Scholar
    353% above average of year
    Last visited: Jan-2018
  100. 100
    Niels Provos:
    Defending Against Statistical Steganalysis.
    USENIX Security Symposium, 2001
    756 cites at Google Scholar
    303% above average of year
    Last visited: Jan-2018