信息安全四大近年最佳论文整理.rar

上传者: 43744613 | 上传时间: 2021-06-25 14:25:45 | 文件大小: 53.67MB | 文件类型: RAR
该文档是本人手动收集整理。内涵信息安全四大顶会(NDSS,S&P,CCS,USENIX)近三到五年的best paper 和distinguished paper。CCS 14篇,NDSS 12篇,S&P 7篇, USENIX 17篇。读完对该领域优秀论文能有很好的理解!

文件下载

资源详情

[{"title":"( 51 个子文件 53.67MB ) 信息安全四大近年最佳论文整理.rar","children":[{"title":"信息安全四大近年最佳论文整理","children":[{"title":"ACM CCS best paper","children":[{"title":"2019","children":[{"title":"p1867-lu.pdf <span style='color:#111;'> 1.34MB </span>","children":null,"spread":false}],"spread":true},{"title":"2017","children":[{"title":"CCS2017_DolphinAttack_CameraReady.pdf <span style='color:#111;'> 1.12MB </span>","children":null,"spread":false},{"title":"2017-827.pdf <span style='color:#111;'> 4.60MB </span>","children":null,"spread":false},{"title":"p2435-subramanyan.pdf <span style='color:#111;'> 1.23MB </span>","children":null,"spread":false},{"title":"2017-702.pdf <span style='color:#111;'> 909.72KB </span>","children":null,"spread":false},{"title":"2017-030.pdf <span style='color:#111;'> 510.91KB </span>","children":null,"spread":false}],"spread":true},{"title":"2016","children":[{"title":"2016-376.pdf <span style='color:#111;'> 340.36KB </span>","children":null,"spread":false},{"title":"p1480-albrecht.pdf <span style='color:#111;'> 567.00KB </span>","children":null,"spread":false},{"title":"2016-768.pdf <span style='color:#111;'> 881.71KB </span>","children":null,"spread":false}],"spread":true},{"title":"2018","children":[{"title":"1805.10277.pdf <span style='color:#111;'> 1.40MB </span>","children":null,"spread":false},{"title":"p364-guo.pdf <span style='color:#111;'> 2.29MB </span>","children":null,"spread":false}],"spread":true},{"title":"2015","children":[{"title":"2015-624.pdf <span style='color:#111;'> 819.49KB </span>","children":null,"spread":false},{"title":"imperfect-forward-secrecy.pdf <span style='color:#111;'> 1.32MB </span>","children":null,"spread":false},{"title":"GUITAR_CCS_15.pdf <span style='color:#111;'> 5.65MB </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"S&P distinguished paper awards","children":[{"title":"2019","children":[{"title":"Distinguished Practical Paper Award","children":[{"title":"Lucian_Cojocar_Exploiting_Correcting_Codes_slides-ecc-new.pdf <span style='color:#111;'> 908.48KB </span>","children":null,"spread":false}],"spread":true},{"title":"distinguished paper award","children":[{"title":"Paul_Kocher_01_-_Spectre_Attacks-IEEE-SecurityPrivacy_v05.pdf <span style='color:#111;'> 1.18MB </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"2017","children":[{"title":"Distinguished Practical Paper Award","children":[{"title":"cloak_and_dagger_-_from_two_permissions_to_complete_control.pdf <span style='color:#111;'> 875.04KB </span>","children":null,"spread":false}],"spread":true},{"title":"distinguished paper award","children":[{"title":"RR-9040.pdf <span style='color:#111;'> 1.60MB </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"2016","children":[{"title":"Distinguished Practical Paper Award","children":null,"spread":false},{"title":"distinguished paper award","children":null,"spread":false}],"spread":true},{"title":"2018","children":[{"title":"Distinguished Practical Paper Award","children":[{"title":"08418606.pdf <span style='color:#111;'> 595.84KB </span>","children":null,"spread":false}],"spread":true},{"title":"distinguished paper award","children":[{"title":"main.pdf <span style='color:#111;'> 1.08MB </span>","children":null,"spread":false},{"title":"immunity.pdf <span style='color:#111;'> 676.25KB </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"2015","children":[{"title":"Distinguished Practical Paper Award","children":null,"spread":false},{"title":"distinguished paper award","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"NDSS distinguished paper awards","children":[{"title":"2019","children":[{"title":"ndss2019_02B-1_Alowaisheq_paper.pdf <span style='color:#111;'> 2.18MB </span>","children":null,"spread":false},{"title":"ndss2019_10-4_Gligor_paper.pdf <span style='color:#111;'> 477.46KB </span>","children":null,"spread":false},{"title":"ndss2019_03A-2_Hagestedt_paper.pdf <span style='color:#111;'> 448.46KB </span>","children":null,"spread":false},{"title":"ndss2019_02B-2_Cetin_paper.pdf <span style='color:#111;'> 436.99KB </span>","children":null,"spread":false}],"spread":true},{"title":"2017","children":[{"title":"ndss2017_10-5_Wang_paper_0.pdf <span style='color:#111;'> 262.67KB </span>","children":null,"spread":false},{"title":"ndss2017_03B-1_Miramirkhani_paper.pdf <span style='color:#111;'> 1.08MB </span>","children":null,"spread":false}],"spread":true},{"title":"2016","children":[{"title":"02-NDSS2016-cdn_loop-M.pdf <span style='color:#111;'> 718.35KB </span>","children":null,"spread":false},{"title":"skee-ndss16.pdf <span style='color:#111;'> 563.03KB </span>","children":null,"spread":false},{"title":"SLOTH_NDSS16.pdf <span style='color:#111;'> 2.42MB </span>","children":null,"spread":false},{"title":"protracer-towards-practical-provenance-tracing-alternating-logging-tainting.pdf <span style='color:#111;'> 1.49MB </span>","children":null,"spread":false}],"spread":true},{"title":"2018","children":[{"title":"ndss2018_05B-5_Pyrgelis_paper.pdf <span style='color:#111;'> 762.78KB </span>","children":null,"spread":false},{"title":"ndss2018_08-4_Tuncay_paper.pdf <span style='color:#111;'> 285.87KB </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"USENIX best paper","children":[{"title":"2019","children":[{"title":"sec19-thomas.pdf <span style='color:#111;'> 575.02KB </span>","children":null,"spread":false}],"spread":true},{"title":"2017","children":[{"title":"sec17-bond.pdf <span style='color:#111;'> 692.38KB </span>","children":null,"spread":false},{"title":"sec17-tang.pdf <span style='color:#111;'> 1.03MB </span>","children":null,"spread":false},{"title":"sec17-chung.pdf <span style='color:#111;'> 1.93MB </span>","children":null,"spread":false},{"title":"sec17-ho.pdf <span style='color:#111;'> 646.74KB </span>","children":null,"spread":false},{"title":"sec17-vila.pdf <span style='color:#111;'> 966.46KB </span>","children":null,"spread":false},{"title":"sec17-ma.pdf <span style='color:#111;'> 1.23MB </span>","children":null,"spread":false}],"spread":true},{"title":"2016","children":[{"title":"sec16_paper_giacomelli.pdf <span style='color:#111;'> 354.47KB </span>","children":null,"spread":false},{"title":"sec16_paper_svenda.pdf <span style='color:#111;'> 869.71KB </span>","children":null,"spread":false},{"title":"sec16_paper_melicher.pdf <span style='color:#111;'> 1.75MB </span>","children":null,"spread":false}],"spread":true},{"title":"2018","children":[{"title":"sec18-yun.pdf <span style='color:#111;'> 906.05KB </span>","children":null,"spread":false},{"title":"sec18-alhuzali.pdf <span style='color:#111;'> 857.97KB </span>","children":null,"spread":false},{"title":"sec18-scaife.pdf <span style='color:#111;'> 8.34MB </span>","children":null,"spread":false},{"title":"sec18-franken.pdf <span style='color:#111;'> 598.51KB </span>","children":null,"spread":false},{"title":"sec18-stevens.pdf <span style='color:#111;'> 2.61MB </span>","children":null,"spread":false}],"spread":true},{"title":"2015","children":[{"title":"sec15-paper-ramos.pdf <span style='color:#111;'> 423.45KB </span>","children":null,"spread":false},{"title":"woot15-paper-lorente.pdf <span style='color:#111;'> 463.38KB </span>","children":null,"spread":false}],"spread":true},{"title":"usenix best papers.url <span style='color:#111;'> 136B </span>","children":null,"spread":false}],"spread":true}],"spread":true}],"spread":true}]

评论信息

免责申明

【只为小站】的资源来自网友分享,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,【只为小站】 无法对用户传输的作品、信息、内容的权属或合法性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论 【只为小站】 经营者是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。
本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二条之规定,若资源存在侵权或相关问题请联系本站客服人员,zhiweidada#qq.com,请把#换成@,本站将给予最大的支持与配合,做到及时反馈和处理。关于更多版权及免责申明参见 版权及免责申明