Top-Cited Security Papers

This webpage is an attempt to assemble a ranking of top-cited papers from the area of computer security. The ranking has been created based on citations of papers published at top security conferences. More details are available here.

Top 100 papers from 1981 to 2017 ⌄

  1. 1
    Mihir Bellare, Phillip Rogaway:
    Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
    ACM Conference on Computer and Communications Security (CCS), 1993
    4541 cites at Google Scholar
    2967% above average of year
    Last visited: Sep-2017
  2. 2
    Laurent Eschenauer, Virgil D. Gligor:
    A key-management scheme for distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    4526 cites at Google Scholar
    1885% above average of year
    Last visited: Aug-2017
  3. 3
    Dorothy E. Denning:
    An Intrusion-Detection Model.
    IEEE Symposium on Security and Privacy, 1986
    4376 cites at Google Scholar
    1703% above average of year
    Last visited: Aug-2017
  4. 4
    Haowen Chan, Adrian Perrig, Dawn Xiaodong Song:
    Random Key Predistribution Schemes for Sensor Networks.
    IEEE Symposium on Security and Privacy, 2003
    3675 cites at Google Scholar
    1578% above average of year
    Last visited: Oct-2017
  5. 5
    Vipul Goyal, Omkant Pandey, Amit Sahai, Brent Waters:
    Attribute-based encryption for fine-grained access control of encrypted data.
    ACM Conference on Computer and Communications Security (CCS), 2006
    3542 cites at Google Scholar
    2829% above average of year
    Last visited: Oct-2017
  6. 6
    John Bethencourt, Amit Sahai, Brent Waters:
    Ciphertext-Policy Attribute-Based Encryption.
    IEEE Symposium on Security and Privacy, 2007
    2967 cites at Google Scholar
    1936% above average of year
    Last visited: Aug-2017
  7. 7
    Matt Blaze, Joan Feigenbaum, Jack Lacy:
    Decentralized Trust Management.
    IEEE Symposium on Security and Privacy, 1996
    2914 cites at Google Scholar
    2078% above average of year
    Last visited: Sep-2017
  8. 8
    Giuseppe Ateniese, Randal C. Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary N. J. Peterson, Dawn Xiaodong Song:
    Provable data possession at untrusted stores.
    ACM Conference on Computer and Communications Security (CCS), 2007
    2292 cites at Google Scholar
    1473% above average of year
    Last visited: Sep-2017
  9. 9
    Joseph A. Goguen, José Meseguer:
    Security Policies and Security Models.
    IEEE Symposium on Security and Privacy, 1982
    2238 cites at Google Scholar
    1470% above average of year
    Last visited: Oct-2017
  10. 10
    Donggang Liu, Peng Ning:
    Establishing pairwise keys in distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2234 cites at Google Scholar
    920% above average of year
    Last visited: Sep-2017
  11. 11
    Dawn Xiaodong Song, David Wagner, Adrian Perrig:
    Practical Techniques for Searches on Encrypted Data.
    IEEE Symposium on Security and Privacy, 2000
    2209 cites at Google Scholar
    1537% above average of year
    Last visited: Sep-2017
  12. 12
    Sencun Zhu, Sanjeev Setia, Sushil Jajodia:
    LEAP: efficient security mechanisms for large-scale distributed sensor networks.
    ACM Conference on Computer and Communications Security (CCS), 2003
    2185 cites at Google Scholar
    898% above average of year
    Last visited: Sep-2017
  13. 13
    Roger M. Needham:
    Denial of Service.
    ACM Conference on Computer and Communications Security (CCS), 1993
    1892 cites at Google Scholar
    1178% above average of year
    Last visited: Aug-2017
  14. 14
    Martín Abadi, Andrew D. Gordon:
    A Calculus for Cryptographic Protocols: The Spi Calculus.
    ACM Conference on Computer and Communications Security (CCS), 1997
    1890 cites at Google Scholar
    1546% above average of year
    Last visited: Sep-2017
  15. 15
    Ian T. Foster, Carl Kesselman, Gene Tsudik, Steven Tuecke:
    A Security Architecture for Computational Grids.
    ACM Conference on Computer and Communications Security (CCS), 1998
    1860 cites at Google Scholar
    1149% above average of year
    Last visited: Oct-2017
  16. 16
    Thomas Ristenpart, Eran Tromer, Hovav Shacham, Stefan Savage:
    Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1797 cites at Google Scholar
    1452% above average of year
    Last visited: Oct-2017
  17. 17
    David Moore, Geoffrey M. Voelker, Stefan Savage:
    Inferring Internet Denial-of-Service Activity.
    USENIX Security Symposium, 2001
    1778 cites at Google Scholar
    877% above average of year
    Last visited: Aug-2017
  18. 18
    D. D. Clark, D. R. Wilson:
    A Comparison of Commercial and Military Computer Security Policies.
    IEEE Symposium on Security and Privacy, 1987
    1706 cites at Google Scholar
    1155% above average of year
    Last visited: Oct-2017
  19. 19
    Steven M. Bellovin, Michael Merritt:
    Encrypted key exchange: password-based protocols secure against dictionary attacks.
    IEEE Symposium on Security and Privacy, 1992
    1699 cites at Google Scholar
    2108% above average of year
    Last visited: Sep-2017
  20. 20
    Wenke Lee, Salvatore J. Stolfo:
    Data Mining Approaches for Intrusion Detection.
    USENIX Security Symposium, 1998
    1658 cites at Google Scholar
    1014% above average of year
    Last visited: Jul-2017
  21. 21
    Crispan Cowan:
    StackGuard: Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks.
    USENIX Security Symposium, 1998
    1655 cites at Google Scholar
    1012% above average of year
    Last visited: Sep-2017
  22. 22
    Ari Juels, Burton S. Kaliski Jr.:
    Pors: proofs of retrievability for large files.
    ACM Conference on Computer and Communications Security (CCS), 2007
    1622 cites at Google Scholar
    1013% above average of year
    Last visited: Jul-2017
  23. 23
    Wenke Lee, Salvatore J. Stolfo, Kui W. Mok:
    A Data Mining Framework for Building Intrusion Detection Models.
    IEEE Symposium on Security and Privacy, 1999
    1614 cites at Google Scholar
    1024% above average of year
    Last visited: Oct-2017
  24. 24
    Stuart Staniford, Vern Paxson, Nicholas Weaver:
    How to Own the Internet in Your Spare Time.
    USENIX Security Symposium, 2002
    1535 cites at Google Scholar
    573% above average of year
    Last visited: Jun-2017
  25. 25
    Tal Garfinkel, Mendel Rosenblum:
    A Virtual Machine Introspection Based Architecture for Intrusion Detection.
    Network and Distributed System Security Symposium (NDSS), 2003
    1505 cites at Google Scholar
    587% above average of year
    Last visited: Jun-2017
  26. 26
    James Newsome, Dawn Xiaodong Song:
    Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software.
    Network and Distributed System Security Symposium (NDSS), 2005
    1480 cites at Google Scholar
    957% above average of year
    Last visited: Sep-2017
  27. 27
    Ari Juels, Martin Wattenberg:
    A Fuzzy Commitment Scheme.
    ACM Conference on Computer and Communications Security (CCS), 1999
    1465 cites at Google Scholar
    920% above average of year
    Last visited: Sep-2017
  28. 28
    Christina Warrender, Stephanie Forrest, Barak A. Pearlmutter:
    Detecting Intrusions using System Calls: Alternative Data Models.
    IEEE Symposium on Security and Privacy, 1999
    1419 cites at Google Scholar
    888% above average of year
    Last visited: Oct-2017
  29. 29
    Yajin Zhou, Xuxian Jiang:
    Dissecting Android Malware: Characterization and Evolution.
    IEEE Symposium on Security and Privacy, 2012
    1337 cites at Google Scholar
    1883% above average of year
    Last visited: Jul-2017
  30. 30
    Michael K. Reiter, Matthew K. Franklin, John B. Lacy, Rebecca N. Wright:
    The Omega Key Management Service.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1334 cites at Google Scholar
    897% above average of year
    Last visited: Sep-2016
  31. 31
    Reza Curtmola, Juan A. Garay, Seny Kamara, Rafail Ostrovsky:
    Searchable symmetric encryption: improved definitions and efficient constructions.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1285 cites at Google Scholar
    963% above average of year
    Last visited: Jul-2017
  32. 32
    Arvind Narayanan, Vitaly Shmatikov:
    Robust De-anonymization of Large Sparse Datasets.
    IEEE Symposium on Security and Privacy, 2008
    1277 cites at Google Scholar
    1102% above average of year
    Last visited: Sep-2017
  33. 33
    D. F. C. Brewer, Michael J. Nash:
    The Chinese Wall Security Policy.
    IEEE Symposium on Security and Privacy, 1989
    1266 cites at Google Scholar
    3022% above average of year
    Last visited: Jul-2017
  34. 34
    Oleg Sheyner, Joshua W. Haines, Somesh Jha, Richard Lippmann, Jeannette M. Wing:
    Automated Generation and Analysis of Attack Graphs.
    IEEE Symposium on Security and Privacy, 2002
    1262 cites at Google Scholar
    453% above average of year
    Last visited: Sep-2017
  35. 35
    Reiner Sailer, Xiaolan Zhang, Trent Jaeger, Leendert van Doorn:
    Design and Implementation of a TCG-based Integrity Measurement Architecture.
    USENIX Security Symposium, 2004
    1232 cites at Google Scholar
    657% above average of year
    Last visited: Aug-2017
  36. 36
    Ari Juels, Ronald L. Rivest, Michael Szydlo:
    The blocker tag: selective blocking of RFID tags for consumer privacy.
    ACM Conference on Computer and Communications Security (CCS), 2003
    1179 cites at Google Scholar
    438% above average of year
    Last visited: Sep-2017
  37. 37
    Adrienne Porter Felt, Erika Chin, Steve Hanna, Dawn Song, David Wagner:
    Android permissions demystified.
    ACM Conference on Computer and Communications Security (CCS), 2011
    1167 cites at Google Scholar
    1397% above average of year
    Last visited: Sep-2017
  38. 38
    Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
    Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage.
    Network and Distributed System Security Symposium (NDSS), 2005
    1164 cites at Google Scholar
    731% above average of year
    Last visited: Jul-2017
  39. 39
    Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiaodong Song:
    Efficient Authentication and Signing of Multicast Streams over Lossy Channels.
    IEEE Symposium on Security and Privacy, 2000
    1153 cites at Google Scholar
    754% above average of year
    Last visited: Sep-2017
  40. 40
    Yao Liu, Michael K. Reiter, Peng Ning:
    False data injection attacks against state estimation in electric power grids.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1148 cites at Google Scholar
    891% above average of year
    Last visited: Sep-2017
  41. 41
    Thomas Beth, Malte Borcherding, Birgit Klein:
    Valuation of Trust in Open Networks.
    European Symposium on Research in Computer Security (ESORICS), 1994
    1132 cites at Google Scholar
    1520% above average of year
    Last visited: Sep-2017
  42. 42
    Masahiro Mambo, Keisuke Usuda, Eiji Okamoto:
    Proxy Signatures for Delegating Signing Operation.
    ACM Conference on Computer and Communications Security (CCS), 1996
    1091 cites at Google Scholar
    716% above average of year
    Last visited: Aug-2017
  43. 43
    Blaise Gassend, Dwaine E. Clarke, Marten van Dijk, Srinivas Devadas:
    Silicon physical random functions.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1076 cites at Google Scholar
    372% above average of year
    Last visited: Sep-2017
  44. 44
    Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou:
    Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.
    European Symposium on Research in Computer Security (ESORICS), 2009
    1067 cites at Google Scholar
    821% above average of year
    Last visited: Oct-2017
  45. 45
    Cliff Changchun Zou, Weibo Gong, Donald F. Towsley:
    Code red worm propagation modeling and analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    1037 cites at Google Scholar
    355% above average of year
    Last visited: Oct-2017
  46. 46
    Kevin D. Bowers, Ari Juels, Alina Oprea:
    HAIL: a high-availability and integrity layer for cloud storage.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1036 cites at Google Scholar
    795% above average of year
    Last visited: Sep-2017
  47. 47
    J. Alex Halderman, Seth D. Schoen, Nadia Heninger, William Clarkson, William Paul, Joseph A. Calandrino, Ariel J. Feldman, Jacob Appelbaum, Edward W. Felten:
    Lest We Remember: Cold Boot Attacks on Encryption Keys.
    USENIX Security Symposium, 2008
    1031 cites at Google Scholar
    871% above average of year
    Last visited: Oct-2017
  48. 48
    Ninghui Li, John C. Mitchell, William H. Winsborough:
    Design of a Role-Based Trust-Management Framework.
    IEEE Symposium on Security and Privacy, 2002
    1004 cites at Google Scholar
    340% above average of year
    Last visited: Oct-2017
  49. 49
    Cristian Cadar, Vijay Ganesh, Peter M. Pawlowski, David L. Dill, Dawson R. Engler:
    EXE: automatically generating inputs of death.
    ACM Conference on Computer and Communications Security (CCS), 2006
    1003 cites at Google Scholar
    730% above average of year
    Last visited: Oct-2017
  50. 50
    C. Christopher Erway, Alptekin Küpçü, Charalampos Papamanthou, Roberto Tamassia:
    Dynamic provable data possession.
    ACM Conference on Computer and Communications Security (CCS), 2009
    1000 cites at Google Scholar
    764% above average of year
    Last visited: Sep-2017
  51. 51
    Guofei Gu, Roberto Perdisci, Junjie Zhang, Wenke Lee:
    BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure-Independent Botnet Detection.
    USENIX Security Symposium, 2008
    982 cites at Google Scholar
    824% above average of year
    Last visited: Aug-2017
  52. 52
    Michael Steiner, Gene Tsudik, Michael Waidner:
    Diffie-Hellman Key Distribution Extended to Group Communication.
    ACM Conference on Computer and Communications Security (CCS), 1996
    948 cites at Google Scholar
    609% above average of year
    Last visited: Sep-2017
  53. 53
    Rachna Dhamija, Adrian Perrig:
    Deja Vu-A User Study: Using Images for Authentication.
    USENIX Security Symposium, 2000
    946 cites at Google Scholar
    601% above average of year
    Last visited: Aug-2017
  54. 54
    Frédéric Cuppens, Alexandre Miège:
    Alert Correlation in a Cooperative Intrusion Detection Framework.
    IEEE Symposium on Security and Privacy, 2002
    941 cites at Google Scholar
    313% above average of year
    Last visited: Sep-2017
  55. 55
    Charles Lynn:
    Secure Border Gateway Protocol (S-BGP).
    Network and Distributed System Security Symposium (NDSS), 1999
    941 cites at Google Scholar
    555% above average of year
    Last visited: Sep-2017
  56. 56
    Arvind Narayanan, Vitaly Shmatikov:
    De-anonymizing Social Networks.
    IEEE Symposium on Security and Privacy, 2009
    940 cites at Google Scholar
    712% above average of year
    Last visited: Sep-2017
  57. 57
    Hyang-Ah Kim, Brad Karp:
    Autograph: Toward Automated, Distributed Worm Signature Detection.
    USENIX Security Symposium, 2004
    928 cites at Google Scholar
    470% above average of year
    Last visited: Sep-2017
  58. 58
    James Newsome, Brad Karp, Dawn Xiaodong Song:
    Polygraph: Automatically Generating Signatures for Polymorphic Worms.
    IEEE Symposium on Security and Privacy, 2005
    918 cites at Google Scholar
    556% above average of year
    Last visited: Sep-2017
  59. 59
    Alfonso Valdes, Keith Skinner:
    Probabilistic Alert Correlation.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    916 cites at Google Scholar
    403% above average of year
    Last visited: Aug-2017
  60. 60
    Ernest F. Brickell, Jan Camenisch, Liqun Chen:
    Direct anonymous attestation.
    ACM Conference on Computer and Communications Security (CCS), 2004
    915 cites at Google Scholar
    462% above average of year
    Last visited: Oct-2017
  61. 61
    Patrice Godefroid, Michael Y. Levin, David A. Molnar:
    Automated Whitebox Fuzz Testing.
    Network and Distributed System Security Symposium (NDSS), 2008
    912 cites at Google Scholar
    759% above average of year
    Last visited: Sep-2017
  62. 62
    David Molnar, David Wagner:
    Privacy and security in library RFID: issues, practices, and architectures.
    ACM Conference on Computer and Communications Security (CCS), 2004
    904 cites at Google Scholar
    456% above average of year
    Last visited: Jul-2017
  63. 63
    John F. Canny:
    Collaborative Filtering with Privacy.
    IEEE Symposium on Security and Privacy, 2002
    901 cites at Google Scholar
    295% above average of year
    Last visited: Oct-2017
  64. 64
    William Enck, Damien Octeau, Patrick McDaniel, Swarat Chaudhuri:
    A Study of Android Application Security.
    USENIX Security Symposium, 2011
    898 cites at Google Scholar
    1052% above average of year
    Last visited: Oct-2017
  65. 65
    Ke Wang, Salvatore J. Stolfo:
    Anomalous Payload-Based Network Intrusion Detection.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2004
    889 cites at Google Scholar
    446% above average of year
    Last visited: Oct-2017
  66. 66
    David Wagner, Jeffrey S. Foster, Eric A. Brewer, Alexander Aiken:
    A First Step Towards Automated Detection of Buffer Overrun Vulnerabilities.
    Network and Distributed System Security Symposium (NDSS), 2000
    887 cites at Google Scholar
    557% above average of year
    Last visited: Sep-2017
  67. 67
    Martín Abadi, Roger M. Needham:
    Prudent engineering practice for cryptographic protocols.
    IEEE Symposium on Security and Privacy, 1994
    884 cites at Google Scholar
    1165% above average of year
    Last visited: Aug-2017
  68. 68
    Hovav Shacham:
    The geometry of innocent flesh on the bone: return-into-libc without function calls (on the x86).
    ACM Conference on Computer and Communications Security (CCS), 2007
    879 cites at Google Scholar
    503% above average of year
    Last visited: Sep-2017
  69. 69
    Jeffrey O. Kephart, Steve R. White:
    Directed-Graph Epidemiological Models of Computer Viruses.
    IEEE Symposium on Security and Privacy, 1991
    875 cites at Google Scholar
    994% above average of year
    Last visited: Oct-2017
  70. 70
    Ian Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin:
    The Design and Analysis of Graphical Passwords.
    USENIX Security Symposium, 1999
    875 cites at Google Scholar
    509% above average of year
    Last visited: Sep-2017
  71. 71
    David Wagner, Drew Dean:
    Intrusion Detection via Static Analysis.
    IEEE Symposium on Security and Privacy, 2001
    867 cites at Google Scholar
    376% above average of year
    Last visited: Oct-2017
  72. 72
    Rafail Ostrovsky, Amit Sahai, Brent Waters:
    Attribute-based encryption with non-monotonic access structures.
    ACM Conference on Computer and Communications Security (CCS), 2007
    864 cites at Google Scholar
    493% above average of year
    Last visited: Aug-2017
  73. 73
    Ross J. Anderson:
    Why Information Security is Hard-An Economic Perspective.
    Annual Computer Security Applications Conference (ACSAC), 2001
    859 cites at Google Scholar
    372% above average of year
    Last visited: Oct-2017
  74. 74
    William Enck, Machigar Ongtang, Patrick Drew McDaniel:
    On lightweight mobile phone application certification.
    ACM Conference on Computer and Communications Security (CCS), 2009
    856 cites at Google Scholar
    639% above average of year
    Last visited: Jun-2017
  75. 75
    Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati, Fabio Violante:
    A reputation-based approach for choosing reliable resources in peer-to-peer networks.
    ACM Conference on Computer and Communications Security (CCS), 2002
    853 cites at Google Scholar
    274% above average of year
    Last visited: Aug-2017
  76. 76
    Michael J. Freedman, Robert Morris:
    Tarzan: a peer-to-peer anonymizing network layer.
    ACM Conference on Computer and Communications Security (CCS), 2002
    853 cites at Google Scholar
    274% above average of year
    Last visited: Jun-2017
  77. 77
    Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti:
    Control-flow integrity.
    ACM Conference on Computer and Communications Security (CCS), 2005
    851 cites at Google Scholar
    508% above average of year
    Last visited: Sep-2017
  78. 78
    John Bellardo, Stefan Savage:
    802.11 Denial-of-Service Attacks: Real Vulnerabilities and Practical Solutions.
    USENIX Security Symposium, 2003
    848 cites at Google Scholar
    287% above average of year
    Last visited: Oct-2017
  79. 79
    Matthew G. Schultz, Eleazar Eskin, Erez Zadok, Salvatore J. Stolfo:
    Data Mining Methods for Detection of New Malicious Executables.
    IEEE Symposium on Security and Privacy, 2001
    835 cites at Google Scholar
    359% above average of year
    Last visited: Oct-2017
  80. 80
    Ian Goldberg, David Wagner, Randi Thomas, Eric A. Brewer:
    A Secure Environment for Untrusted Helper Applications.
    USENIX Security Symposium, 1996
    833 cites at Google Scholar
    523% above average of year
    Last visited: Aug-2017
  81. 81
    Guofei Gu, Junjie Zhang, Wenke Lee:
    BotSniffer: Detecting Botnet Command and Control Channels in Network Traffic.
    Network and Distributed System Security Symposium (NDSS), 2008
    825 cites at Google Scholar
    677% above average of year
    Last visited: Jun-2017
  82. 82
    Li Gong, Roger M. Needham, Raphael Yahalom:
    Reasoning about Belief in Cryptographic Protocols.
    IEEE Symposium on Security and Privacy, 1990
    823 cites at Google Scholar
    1351% above average of year
    Last visited: Aug-2017
  83. 83
    Hovav Shacham, Matthew Page, Ben Pfaff, Eu-Jin Goh, Nagendra Modadugu, Dan Boneh:
    On the effectiveness of address-space randomization.
    ACM Conference on Computer and Communications Security (CCS), 2004
    818 cites at Google Scholar
    403% above average of year
    Last visited: Oct-2017
  84. 84
    Adrian Perrig, Ran Canetti, Dawn Xiaodong Song, J. D. Tygar:
    Efficient and Secure Source Authentication for Multicast.
    Network and Distributed System Security Symposium (NDSS), 2001
    817 cites at Google Scholar
    349% above average of year
    Last visited: Aug-2017
  85. 85
    Guofei Gu, Phillip A. Porras, Vinod Yegneswaran, Martin W. Fong:
    BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation.
    USENIX Security Symposium, 2007
    812 cites at Google Scholar
    457% above average of year
    Last visited: Sep-2017
  86. 86
    Ross J. Anderson:
    Why Cryptosystems Fail.
    ACM Conference on Computer and Communications Security (CCS), 1993
    801 cites at Google Scholar
    441% above average of year
    Last visited: Aug-2017
  87. 87
    Jaeyeon Jung, Vern Paxson, Arthur W. Berger, Hari Balakrishnan:
    Fast Portscan Detection Using Sequential Hypothesis Testing.
    IEEE Symposium on Security and Privacy, 2004
    801 cites at Google Scholar
    392% above average of year
    Last visited: Sep-2017
  88. 88
    Paul Ammann, Duminda Wijesekera, Saket Kaushik:
    Scalable, graph-based network vulnerability analysis.
    ACM Conference on Computer and Communications Security (CCS), 2002
    796 cites at Google Scholar
    249% above average of year
    Last visited: Oct-2017
  89. 89
    Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage:
    Experimental Security Analysis of a Modern Automobile.
    IEEE Symposium on Security and Privacy, 2010
    792 cites at Google Scholar
    924% above average of year
    Last visited: Aug-2017
  90. 90
    Bryan Parno, Adrian Perrig, Virgil D. Gligor:
    Distributed Detection of Node Replication Attacks in Sensor Networks.
    IEEE Symposium on Security and Privacy, 2005
    772 cites at Google Scholar
    451% above average of year
    Last visited: Sep-2017
  91. 91
    Dahlia Malkhi, Noam Nisan, Benny Pinkas, Yaron Sella:
    Fairplay - Secure Two-Party Computation System.
    USENIX Security Symposium, 2004
    771 cites at Google Scholar
    374% above average of year
    Last visited: Oct-2017
  92. 92
    Niels Provos:
    A Virtual Honeypot Framework.
    USENIX Security Symposium, 2004
    769 cites at Google Scholar
    373% above average of year
    Last visited: Oct-2017
  93. 93
    Hervé Debar, Andreas Wespi:
    Aggregation and Correlation of Intrusion-Detection Alerts.
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2001
    769 cites at Google Scholar
    323% above average of year
    Last visited: Jul-2017
  94. 94
    J. S. Balasubramaniyan, J. O. Garcia-Fernandez, D. Isacoff, Eugene H. Spafford, Diego Zamboni:
    An Architecture for Intrusion Detection Using Autonomous Agents.
    Annual Computer Security Applications Conference (ACSAC), 1998
    766 cites at Google Scholar
    415% above average of year
    Last visited: Sep-2017
  95. 95
    John Ioannidis, Steven M. Bellovin:
    Implementing Pushback: Router-Based Defense Against DDoS Attacks.
    Network and Distributed System Security Symposium (NDSS), 2002
    766 cites at Google Scholar
    236% above average of year
    Last visited: Sep-2017
  96. 96
    Dirk Balfanz, Diana K. Smetters, Paul Stewart, H. Chi Wong:
    Talking to Strangers: Authentication in Ad-Hoc Wireless Networks.
    Network and Distributed System Security Symposium (NDSS), 2002
    761 cites at Google Scholar
    234% above average of year
    Last visited: Oct-2017
  97. 97
    Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia, Dawn Xiaodong Song, Randal E. Bryant:
    Semantics-Aware Malware Detection.
    IEEE Symposium on Security and Privacy, 2005
    756 cites at Google Scholar
    440% above average of year
    Last visited: Oct-2017
  98. 98
    Niels Provos:
    Defending Against Statistical Steganalysis.
    USENIX Security Symposium, 2001
    745 cites at Google Scholar
    309% above average of year
    Last visited: Oct-2017
  99. 99
    Ari Juels, John G. Brainard:
    Client Puzzles: A Cryptographic Countermeasure Against Connection Depletion Attacks.
    Network and Distributed System Security Symposium (NDSS), 1999
    742 cites at Google Scholar
    417% above average of year
    Last visited: Aug-2017
  100. 100
    William A. Arbaugh, David J. Farber, Jonathan M. Smith:
    A Secure and Reliable Bootstrap Architecture.
    IEEE Symposium on Security and Privacy, 1997
    742 cites at Google Scholar
    546% above average of year
    Last visited: Oct-2017