Top-Cited Security Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of computer security. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top 100 papers from 1981 to 2017 ⌄

  1. 1
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4477 cites at Google Scholar
    2702% above average of year
    Last visited: Jun-2017
  2. 2
    Laurent Eschenauer, Virgil D. Gligor:
    A key-management scheme for distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    4475 cites at Google Scholar
    1871% above average of year
    Last visited: Jun-2017
  3. 3
    Dorothy E. Denning:
    An Intrusion-Detection Model.
    IEEE Symposium on Security and Privacy, 1986
    4320 cites at Google Scholar
    1699% above average of year
    Last visited: Jun-2017
  4. 4
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy, 2003
    3604 cites at Google Scholar
    1556% above average of year
    Last visited: Jul-2017
  5. 5
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3154 cites at Google Scholar
    2552% above average of year
    Last visited: Apr-2017
  6. 6
    John Bethencourt, Amit Sahai, Brent Waters:
    Ciphertext-Policy Attribute-Based Encryption.
    IEEE Symposium on Security and Privacy, 2007
    2926 cites at Google Scholar
    1942% above average of year
    Last visited: Aug-2017
  7. 7
    Matt Blaze, Joan Feigenbaum, Jack Lacy:
    Decentralized Trust Management.
    IEEE Symposium on Security and Privacy, 1996
    2905 cites at Google Scholar
    1996% above average of year
    Last visited: Jun-2017
  8. 8
    Donggang Liu, Peng Ning:
    Establishing pairwise keys in distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2216 cites at Google Scholar
    918% above average of year
    Last visited: Aug-2017
  9. 9
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2196 cites at Google Scholar
    1432% above average of year
    Last visited: Jun-2017
  10. 10
    Joseph A. Goguen, José Meseguer:
    Security Policies and Security Models.
    IEEE Symposium on Security and Privacy, 1982
    2161 cites at Google Scholar
    1461% above average of year
    Last visited: Apr-2017
  11. 11
    Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
    LEAP: efficient security mechanisms for large-scale distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2144 cites at Google Scholar
    885% above average of year
    Last visited: Jul-2017
  12. 12
    Dawn Xiaodong Song, David Wagner, Adrian Perrig:
    Practical Techniques for Searches on Encrypted Data.
    IEEE Symposium on Security and Privacy, 2000
    2129 cites at Google Scholar
    1453% above average of year
    Last visited: Jul-2017
  13. 13
    Martín Abadi, Andrew D. Gordon:
    A Calculus for Cryptographic Protocols: The Spi Calculus.
    ACM Conference on Computer and Communications Security (CCS), 1997
    1875 cites at Google Scholar
    1507% above average of year
    Last visited: Jun-2017
  14. 14
    Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
    A Security Architecture for Computational Grids.
    ACM Conference on Computer and Communications Security (CCS), 1998
    1832 cites at Google Scholar
    1110% above average of year
    Last visited: Apr-2017
  15. 15
    Roger M. Needham:
    Denial of Service.
    ACM Conference on Computer and Communications Security (CCS), 1993
    1826 cites at Google Scholar
    1043% above average of year
    Last visited: Mar-2017
  16. 16
    David Moore, Geoffrey M. Voelker, Stefan Savage:
    Inferring Internet Denial-of-Service Activity.
    USENIX Security Symposium, 2001
    1778 cites at Google Scholar
    879% above average of year
    Last visited: Aug-2017
  17. 17
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1717 cites at Google Scholar
    1420% above average of year
    Last visited: Jun-2017
  18. 18
    D. D. Clark, D. R. Wilson:
    A Comparison of Commercial and Military Computer Security Policies.
    IEEE Symposium on Security and Privacy, 1987
    1691 cites at Google Scholar
    1149% above average of year
    Last visited: Jul-2017
  19. 19
    Wenke Lee, Salvatore J. Stolfo:
    Data Mining Approaches for Intrusion Detection.
    USENIX Security Symposium, 1998
    1658 cites at Google Scholar
    995% above average of year
    Last visited: Jul-2017
  20. 20
    Steven M. Bellovin, Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy, 1992
    1648 cites at Google Scholar
    2037% above average of year
    Last visited: Apr-2017
  21. 21
    Ari Juels, Burton S. Kaliski Jr.:
    Pors: proofs of retrievability for large files.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1622 cites at Google Scholar
    1032% above average of year
    Last visited: Jul-2017
  22. 22
    Crispan Cowan:
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
    USENIX Security Symposium, 1998
    1620 cites at Google Scholar
    970% above average of year
    Last visited: Jun-2017
  23. 23
    Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
    A Data Mining Framework for Building Intrusion Detection Models.
    IEEE Symposium on Security and Privacy, 1999
    1588 cites at Google Scholar
    944% above average of year
    Last visited: Jul-2017
  24. 24
    Stuart Staniford, Vern Paxson, Nicholas Weaver:
    How to Own the Internet in Your Spare Time.
    USENIX Security Symposium, 2002
    1535 cites at Google Scholar
    576% above average of year
    Last visited: Jun-2017
  25. 25
    Tal Garfinkel, Mendel Rosenblum:
    A Virtual Machine Introspection Based Architecture for Intrusion Detection.
    Network and Distributed System Security Symposium (NDSS), 2003
    1505 cites at Google Scholar
    591% above average of year
    Last visited: Jun-2017
  26. 26
    James Newsome, Dawn Xiaodong Song:
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
    Network and Distributed System Security Symposium (NDSS), 2005
    1466 cites at Google Scholar
    960% above average of year
    Last visited: Jul-2017
  27. 27
    Ari Juels, Martin Wattenberg:
    A Fuzzy Commitment Scheme.
    ACM Conference on Computer and Communications Security (CCS), 1999
    1434 cites at Google Scholar
    843% above average of year
    Last visited: Jul-2017
  28. 28
    Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
    Detecting Intrusions using System Calls: Alternative Data Models.
    IEEE Symposium on Security and Privacy, 1999
    1388 cites at Google Scholar
    813% above average of year
    Last visited: Jun-2017
  29. 29
    Yajin Zhou, Xuxian Jiang:
    Dissecting Android Malware: Characterization and Evolution.
    IEEE Symposium on Security and Privacy, 2012
    1337 cites at Google Scholar
    1948% above average of year
    Last visited: Jul-2017
  30. 30
    Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
    The Omega Key Management Service.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1334 cites at Google Scholar
    862% above average of year
    Last visited: Sep-2016
  31. 31
    Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
    Searchable symmetric encryption: improved definitions and efficient constructions.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1285 cites at Google Scholar
    981% above average of year
    Last visited: Jul-2017
  32. 32
    D. F. C. Brewer, Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy, 1989
    1266 cites at Google Scholar
    2589% above average of year
    Last visited: Jul-2017
  33. 33
    Arvind Narayanan, Vitaly Shmatikov:
    Robust De-anonymization of Large Sparse Datasets.
    IEEE Symposium on Security and Privacy, 2008
    1254 cites at Google Scholar
    1094% above average of year
    Last visited: Aug-2017
  34. 34
    Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:
    Automated Generation and Analysis of Attack Graphs.
    IEEE Symposium on Security and Privacy, 2002
    1251 cites at Google Scholar
    451% above average of year
    Last visited: Aug-2017
  35. 35
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
    Design and Implementation of a TCG-based Integrity Measurement Architecture.
    USENIX Security Symposium, 2004
    1225 cites at Google Scholar
    646% above average of year
    Last visited: Jul-2017
  36. 36
    Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
    Network and Distributed System Security Symposium (NDSS), 2005
    1164 cites at Google Scholar
    742% above average of year
    Last visited: Jul-2017
  37. 37
    Ari Juels, Ronald L. Rivest, Michael Szydlo:
    The blocker tag: selective blocking of RFID tags for consumer privacy.
    ACM Conference on Computer and Communications Security (CCS), 2003
    1155 cites at Google Scholar
    431% above average of year
    Last visited: Apr-2017
  38. 38
    Thomas Beth, Malte Borcherding, Birgit Klein:
    Valuation of Trust in Open Networks.
    European Symposium on Research in Computer Security (ESORICS), 1994
    1127 cites at Google Scholar
    1500% above average of year
    Last visited: Jul-2017
  39. 39
    Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
    IEEE Symposium on Security and Privacy, 2000
    1112 cites at Google Scholar
    711% above average of year
    Last visited: Mar-2017
  40. 40
    Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
    Proxy Signatures for Delegating Signing Operation.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1091 cites at Google Scholar
    687% above average of year
    Last visited: Aug-2017
  41. 41
    Yao Liu, Michael K. Reiter, Peng Ning:
    False data injection attacks against state estimation in electric power grids.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1077 cites at Google Scholar
    854% above average of year
    Last visited: Jul-2017
  42. 42
    Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
    Silicon physical random functions.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1054 cites at Google Scholar
    364% above average of year
    Last visited: Aug-2017
  43. 43
    Cliff Changchun Zou, Weibo Gong, Donald F. Towsley:
    Code red worm propagation modeling and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1024 cites at Google Scholar
    351% above average of year
    Last visited: Aug-2017
  44. 44
    Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
    European Symposium on Research in Computer Security (ESORICS), 2009
    1022 cites at Google Scholar
    805% above average of year
    Last visited: Jul-2017
  45. 45
    Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner:
    Android permissions demystified.
    ACM Conference on Computer and Communications Security (CCS), 2011
    1007 cites at Google Scholar
    1246% above average of year
    Last visited: Mar-2017
  46. 46
    Ninghui Li, John C. Mitchell, William H. Winsborough:
    Design of a Role-Based Trust-Management Framework.
    IEEE Symposium on Security and Privacy, 2002
    993 cites at Google Scholar
    337% above average of year
    Last visited: Jul-2017
  47. 47
    J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
    Lest We Remember: Cold Boot Attacks on Encryption Keys.
    USENIX Security Symposium, 2008
    992 cites at Google Scholar
    845% above average of year
    Last visited: Jun-2017
  48. 48
    Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
    USENIX Security Symposium, 2008
    982 cites at Google Scholar
    835% above average of year
    Last visited: Aug-2017
  49. 49
    Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
    EXE: automatically generating inputs of death.
    ACM Conference on Computer and Communications Security (CCS), 2006
    974 cites at Google Scholar
    719% above average of year
    Last visited: Jul-2017
  50. 50
    Kevin D. Bowers, Ari Juels, Alina Oprea:
    HAIL: a high-availability and integrity layer for cloud storage.
    ACM Conference on Computer and Communications Security (CCS), 2009
    973 cites at Google Scholar
    762% above average of year
    Last visited: Apr-2017
  51. 51
    Rachna Dhamija, Adrian Perrig:
    Deja Vu-A User Study: Using Images for Authentication.
    USENIX Security Symposium, 2000
    946 cites at Google Scholar
    590% above average of year
    Last visited: Aug-2017
  52. 52
    Michael Steiner, Gene Tsudik, Michael Waidner:
    Diffie-Hellman Key Distribution Extended to Group Communication.
    ACM Conference on Computer and Communications Security (CCS), 1996
    935 cites at Google Scholar
    575% above average of year
    Last visited: Jul-2017
  53. 53
    Frédéric Cuppens, Alexandre Miège:
    Alert Correlation in a Cooperative Intrusion Detection Framework.
    IEEE Symposium on Security and Privacy, 2002
    932 cites at Google Scholar
    310% above average of year
    Last visited: Jul-2017
  54. 54
    Charles Lynn:
    Secure Border Gateway Protocol (S-BGP).
    Network and Distributed System Security Symposium (NDSS), 1999
    930 cites at Google Scholar
    512% above average of year
    Last visited: Jul-2017
  55. 55
    Alfonso Valdes, Keith Skinner:
    Probabilistic Alert Correlation.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    916 cites at Google Scholar
    404% above average of year
    Last visited: Aug-2017
  56. 56
    Arvind Narayanan, Vitaly Shmatikov:
    De-anonymizing Social Networks.
    IEEE Symposium on Security and Privacy, 2009
    909 cites at Google Scholar
    705% above average of year
    Last visited: Jun-2017
  57. 57
    C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
    Dynamic provable data possession.
    ACM Conference on Computer and Communications Security (CCS), 2009
    907 cites at Google Scholar
    703% above average of year
    Last visited: Apr-2017
  58. 58
    David Molnar, David Wagner:
    Privacy and security in library RFID: issues, practices, and architectures.
    ACM Conference on Computer and Communications Security (CCS), 2004
    904 cites at Google Scholar
    451% above average of year
    Last visited: Jul-2017
  59. 59
    Patrice Godefroid, Michael Y. Levin, David A. Molnar:
    Automated Whitebox Fuzz Testing.
    Network and Distributed System Security Symposium (NDSS), 2008
    900 cites at Google Scholar
    757% above average of year
    Last visited: Jun-2017
  60. 60
    Ernest F. Brickell, Jan Camenisch, Liqun Chen:
    Direct anonymous attestation.
    ACM Conference on Computer and Communications Security (CCS), 2004
    894 cites at Google Scholar
    445% above average of year
    Last visited: Jun-2017
  61. 61
    Hyang-Ah Kim, Brad Karp:
    Autograph: Toward Automated, Distributed Worm Signature Detection.
    USENIX Security Symposium, 2004
    889 cites at Google Scholar
    442% above average of year
    Last visited: Mar-2017
  62. 62
    John F. Canny:
    Collaborative Filtering with Privacy.
    IEEE Symposium on Security and Privacy, 2002
    888 cites at Google Scholar
    291% above average of year
    Last visited: Aug-2017
  63. 63
    David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
    Network and Distributed System Security Symposium (NDSS), 2000
    883 cites at Google Scholar
    544% above average of year
    Last visited: Aug-2017
  64. 64
    Martín Abadi, Roger M. Needham:
    Prudent engineering practice for cryptographic protocols.
    IEEE Symposium on Security and Privacy, 1994
    880 cites at Google Scholar
    1150% above average of year
    Last visited: Jul-2017
  65. 65
    James Newsome, Brad Karp, Dawn Xiaodong Song:
    Polygraph: Automatically Generating Signatures for Polymorphic Worms.
    IEEE Symposium on Security and Privacy, 2005
    877 cites at Google Scholar
    534% above average of year
    Last visited: Apr-2017
  66. 66
    Ke Wang, Salvatore J. Stolfo:
    Anomalous Payload-Based Network Intrusion Detection.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2004
    876 cites at Google Scholar
    434% above average of year
    Last visited: Jul-2017
  67. 67
    Rafail Ostrovsky, Amit Sahai, Brent Waters:
    Attribute-based encryption with non-monotonic access structures.
    ACM Conference on Computer and Communications Security (CCS), 2007
    864 cites at Google Scholar
    503% above average of year
    Last visited: Aug-2017
  68. 68
    David Wagner, Drew Dean:
    Intrusion Detection via Static Analysis.
    IEEE Symposium on Security and Privacy, 2001
    861 cites at Google Scholar
    374% above average of year
    Last visited: Jun-2017
  69. 69
    William Enck, Machigar Ongtang, Patrick Drew McDaniel:
    On lightweight mobile phone application certification.
    ACM Conference on Computer and Communications Security (CCS), 2009
    856 cites at Google Scholar
    658% above average of year
    Last visited: Jun-2017
  70. 70
    Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
    The Design and Analysis of Graphical Passwords.
    USENIX Security Symposium, 1999
    856 cites at Google Scholar
    463% above average of year
    Last visited: Jul-2017
  71. 71
    Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante:
    A reputation-based approach for choosing reliable resources in peer-to-peer networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    853 cites at Google Scholar
    276% above average of year
    Last visited: Aug-2017
  72. 72
    Michael J. Freedman, Robert Morris:
    Tarzan: a peer-to-peer anonymizing network layer.
    ACM Conference on Computer and Communications Security (CCS), 2002
    853 cites at Google Scholar
    276% above average of year
    Last visited: Jun-2017
  73. 73
    Hovav Shacham:
    The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
    ACM Conference on Computer and Communications Security (CCS), 2007
    847 cites at Google Scholar
    491% above average of year
    Last visited: Jul-2017
  74. 74
    John Bellardo, Stefan Savage:
    802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.
    USENIX Security Symposium, 2003
    842 cites at Google Scholar
    287% above average of year
    Last visited: Jun-2017
  75. 75
    Ross J. Anderson:
    Why Information Security is Hard-An Economic Perspective.
    Annual Computer Security Applications Conference (ACSAC), 2001
    841 cites at Google Scholar
    363% above average of year
    Last visited: Jul-2017
  76. 76
    Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer:
    A Secure Environment for Untrusted Helper Applications.
    USENIX Security Symposium, 1996
    833 cites at Google Scholar
    501% above average of year
    Last visited: Jun-2017
  77. 77
    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
    Control-flow integrity.
    ACM Conference on Computer and Communications Security (CCS), 2005
    828 cites at Google Scholar
    499% above average of year
    Last visited: Jul-2017
  78. 78
    Guofei Gu, Junjie Zhang, Wenke Lee:
    BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
    Network and Distributed System Security Symposium (NDSS), 2008
    825 cites at Google Scholar
    686% above average of year
    Last visited: Jun-2017
  79. 79
    Li Gong, Roger M. Needham, Raphael Yahalom:
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy, 1990
    823 cites at Google Scholar
    1126% above average of year
    Last visited: Aug-2017
  80. 80
    Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar:
    Efficient and Secure Source Authentication for Multicast.
    Network and Distributed System Security Symposium (NDSS), 2001
    813 cites at Google Scholar
    348% above average of year
    Last visited: Jul-2017
  81. 81
    Jeffrey O. Kephart, Steve R. White:
    Directed-Graph Epidemiological Models of Computer Viruses.
    IEEE Symposium on Security and Privacy, 1991
    801 cites at Google Scholar
    884% above average of year
    Last visited: Mar-2017
  82. 82
    Ross J. Anderson:
    Why Cryptosystems Fail.
    ACM Conference on Computer and Communications Security (CCS), 1993
    801 cites at Google Scholar
    401% above average of year
    Last visited: Aug-2017
  83. 83
    Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
    On the effectiveness of address-space randomization.
    ACM Conference on Computer and Communications Security (CCS), 2004
    798 cites at Google Scholar
    386% above average of year
    Last visited: Jul-2017
  84. 84
    Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo:
    Data Mining Methods for Detection of New Malicious Executables.
    IEEE Symposium on Security and Privacy, 2001
    796 cites at Google Scholar
    338% above average of year
    Last visited: Jun-2017
  85. 85
    Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong:
    BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
    USENIX Security Symposium, 2007
    795 cites at Google Scholar
    455% above average of year
    Last visited: Jun-2017
  86. 86
    Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:
    Fast Portscan Detection Using Sequential Hypothesis Testing.
    IEEE Symposium on Security and Privacy, 2004
    789 cites at Google Scholar
    381% above average of year
    Last visited: Apr-2017
  87. 87
    William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri:
    A Study of Android Application Security.
    USENIX Security Symposium, 2011
    786 cites at Google Scholar
    951% above average of year
    Last visited: Feb-2017
  88. 88
    Hervé Debar, Andreas Wespi:
    Aggregation and Correlation of Intrusion-Detection Alerts.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    769 cites at Google Scholar
    323% above average of year
    Last visited: Jul-2017
  89. 89
    Paul Ammann, Duminda Wijesekera, Saket Kaushik:
    Scalable, graph-based network vulnerability analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    767 cites at Google Scholar
    238% above average of year
    Last visited: May-2017
  90. 90
    J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni:
    An Architecture for Intrusion Detection Using Autonomous Agents.
    Annual Computer Security Applications Conference (ACSAC), 1998
    765 cites at Google Scholar
    405% above average of year
    Last visited: Jul-2017
  91. 91
    John Ioannidis, Steven M. Bellovin:
    Implementing Pushback: Router-Based Defense Against DDoS Attacks.
    Network and Distributed System Security Symposium (NDSS), 2002
    764 cites at Google Scholar
    236% above average of year
    Last visited: Aug-2017
  92. 92
    Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
    Experimental Security Analysis of a Modern Automobile.
    IEEE Symposium on Security and Privacy, 2010
    755 cites at Google Scholar
    889% above average of year
    Last visited: Jun-2017
  93. 93
    Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong:
    Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.
    Network and Distributed System Security Symposium (NDSS), 2002
    754 cites at Google Scholar
    232% above average of year
    Last visited: Jul-2017
  94. 94
    Niels Provos:
    A Virtual Honeypot Framework.
    USENIX Security Symposium, 2004
    751 cites at Google Scholar
    358% above average of year
    Last visited: Jul-2017
  95. 95
    Ari Juels, John G. Brainard:
    Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
    Network and Distributed System Security Symposium (NDSS), 1999
    741 cites at Google Scholar
    387% above average of year
    Last visited: Jul-2017
  96. 96
    Bryan Parno, Adrian Perrig, Virgil D. Gligor:
    Distributed Detection of Node Replication Attacks in Sensor Networks.
    IEEE Symposium on Security and Privacy, 2005
    741 cites at Google Scholar
    436% above average of year
    Last visited: Apr-2017
  97. 97
    Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant:
    Semantics-Aware Malware Detection.
    IEEE Symposium on Security and Privacy, 2005
    740 cites at Google Scholar
    435% above average of year
    Last visited: Jun-2017
  98. 98
    William A. Arbaugh, David J. Farber, Jonathan M. Smith:
    A Secure and Reliable Bootstrap Architecture.
    IEEE Symposium on Security and Privacy, 1997
    736 cites at Google Scholar
    531% above average of year
    Last visited: Jul-2017
  99. 99
    Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christopher Kruegel, Engin Kirda:
    Panorama: capturing system-wide information flow for malware detection and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2007
    722 cites at Google Scholar
    404% above average of year
    Last visited: Jul-2017
  100. 100
    David Wagner, Paolo Soto:
    Mimicry attacks on host-based intrusion detection systems.
    ACM Conference on Computer and Communications Security (CCS), 2002
    719 cites at Google Scholar
    217% above average of year
    Last visited: Aug-2017