• RRE

  • Referenced in 9 articles [sw22305]
  • analyze undesired security events and their countermeasures using Boolean logic to combine lower-level attack...
  • FlowFox

  • Referenced in 8 articles [sw37815]
  • FlowFox subsumes many ad-hoc script containment countermeasures developed over the last years. We also...
  • MOIRA

  • Referenced in 3 articles [sw16200]
  • carefully evaluate possible impacts before choosing a countermeasure, hence decision analysis methods constitute an important ... validation of models used to quantify countermeasure impacts suggests little uncertainty in policy effects...
  • QEx

  • Referenced in 4 articles [sw12779]
  • maps produced by most methods (unless costly countermeasures are taken) pose significant challenges...
  • CFS

  • Referenced in 3 articles [sw09728]
  • attacks it had to face and the countermeasures applied. We compare the different algorithmic choices...
  • AntBot

  • Referenced in 3 articles [sw21755]
  • evade detection and improve resistance against countermeasures, botnets have evolved from the first generation that...
  • CRAFT

  • Referenced in 2 articles [sw41024]
  • with Efficient Protection Against DFA Attacks. Traditionally, countermeasures against physical attacks are integrated into...
  • ROLLO-I

  • Referenced in 1 article [sw37628]
  • side-channel attack and the associated countermeasures. The first implementation uses existing hardware with ... ciphertexts for ROLLO-I-128. We propose countermeasures in order to protect future implementations...
  • DRECON

  • Referenced in 1 article [sw09088]
  • less expensive than masking and re-keying countermeasures from the implementation perspective...
  • EQPO

  • Referenced in 1 article [sw16110]
  • concept prototype and validate the proposed countermeasure with some state of the art traffic analysis...
  • AdversariaLib

  • Referenced in 1 article [sw21631]
  • extend by implementing novel attacks and countermeasures. It relies on other widely-used open-source...
  • Andbot

  • Referenced in 1 article [sw21750]
  • will promote the development of more efficient countermeasures. To conclude our paper, we suggest possible...
  • Trinity

  • Referenced in 1 article [sw21759]
  • principle source of spam; against which, static countermeasures such as DNS Black Lists are largely...
  • BotProfiler

  • Referenced in 1 article [sw23891]
  • prevent it from infecting hosts. Many countermeasures against malware infection, such as generating network-based...
  • MSP430X

  • Referenced in 1 article [sw32622]
  • MSP430X microprocessors, respectively. Moreover, secure countermeasures against timing attack and simple power analysis is also...
  • SCATTER

  • Referenced in 1 article [sw36685]
  • implementations tend to include hardware or software countermeasures to increase this difficulty. This is typically...
  • maskVerif

  • Referenced in 1 article [sw40780]
  • order to mitigate these attacks, implementations use countermeasures, among which masking is currently the most...
  • Magma

  • Referenced in 3315 articles [sw00540]
  • Computer algebra system (CAS). Magma is a large...
  • R

  • Referenced in 9969 articles [sw00771]
  • R is a language and environment for statistical...