[{"title":"( 51 个子文件 53.67MB ) 信息安全四大近年最佳论文整理.rar","children":[{"title":"信息安全四大近年最佳论文整理","children":[{"title":"ACM CCS best paper","children":[{"title":"2019","children":[{"title":"p1867-lu.pdf <span style='color:#111;'> 1.34MB </span>","children":null,"spread":false}],"spread":true},{"title":"2017","children":[{"title":"CCS2017_DolphinAttack_CameraReady.pdf <span style='color:#111;'> 1.12MB </span>","children":null,"spread":false},{"title":"2017-827.pdf <span style='color:#111;'> 4.60MB </span>","children":null,"spread":false},{"title":"p2435-subramanyan.pdf <span style='color:#111;'> 1.23MB </span>","children":null,"spread":false},{"title":"2017-702.pdf <span style='color:#111;'> 909.72KB </span>","children":null,"spread":false},{"title":"2017-030.pdf <span style='color:#111;'> 510.91KB </span>","children":null,"spread":false}],"spread":true},{"title":"2016","children":[{"title":"2016-376.pdf <span style='color:#111;'> 340.36KB </span>","children":null,"spread":false},{"title":"p1480-albrecht.pdf <span style='color:#111;'> 567.00KB </span>","children":null,"spread":false},{"title":"2016-768.pdf <span style='color:#111;'> 881.71KB </span>","children":null,"spread":false}],"spread":true},{"title":"2018","children":[{"title":"1805.10277.pdf <span style='color:#111;'> 1.40MB </span>","children":null,"spread":false},{"title":"p364-guo.pdf <span style='color:#111;'> 2.29MB </span>","children":null,"spread":false}],"spread":true},{"title":"2015","children":[{"title":"2015-624.pdf <span style='color:#111;'> 819.49KB </span>","children":null,"spread":false},{"title":"imperfect-forward-secrecy.pdf <span style='color:#111;'> 1.32MB </span>","children":null,"spread":false},{"title":"GUITAR_CCS_15.pdf <span style='color:#111;'> 5.65MB </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"S&P distinguished paper awards","children":[{"title":"2019","children":[{"title":"Distinguished Practical Paper Award","children":[{"title":"Lucian_Cojocar_Exploiting_Correcting_Codes_slides-ecc-new.pdf <span style='color:#111;'> 908.48KB </span>","children":null,"spread":false}],"spread":true},{"title":"distinguished paper award","children":[{"title":"Paul_Kocher_01_-_Spectre_Attacks-IEEE-SecurityPrivacy_v05.pdf <span style='color:#111;'> 1.18MB </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"2017","children":[{"title":"Distinguished Practical Paper Award","children":[{"title":"cloak_and_dagger_-_from_two_permissions_to_complete_control.pdf <span style='color:#111;'> 875.04KB </span>","children":null,"spread":false}],"spread":true},{"title":"distinguished paper award","children":[{"title":"RR-9040.pdf <span style='color:#111;'> 1.60MB </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"2016","children":[{"title":"Distinguished Practical Paper Award","children":null,"spread":false},{"title":"distinguished paper award","children":null,"spread":false}],"spread":true},{"title":"2018","children":[{"title":"Distinguished Practical Paper Award","children":[{"title":"08418606.pdf <span style='color:#111;'> 595.84KB </span>","children":null,"spread":false}],"spread":true},{"title":"distinguished paper award","children":[{"title":"main.pdf <span style='color:#111;'> 1.08MB </span>","children":null,"spread":false},{"title":"immunity.pdf <span style='color:#111;'> 676.25KB </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"2015","children":[{"title":"Distinguished Practical Paper Award","children":null,"spread":false},{"title":"distinguished paper award","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"NDSS distinguished paper awards","children":[{"title":"2019","children":[{"title":"ndss2019_02B-1_Alowaisheq_paper.pdf <span style='color:#111;'> 2.18MB </span>","children":null,"spread":false},{"title":"ndss2019_10-4_Gligor_paper.pdf <span style='color:#111;'> 477.46KB </span>","children":null,"spread":false},{"title":"ndss2019_03A-2_Hagestedt_paper.pdf <span style='color:#111;'> 448.46KB </span>","children":null,"spread":false},{"title":"ndss2019_02B-2_Cetin_paper.pdf <span style='color:#111;'> 436.99KB </span>","children":null,"spread":false}],"spread":true},{"title":"2017","children":[{"title":"ndss2017_10-5_Wang_paper_0.pdf <span style='color:#111;'> 262.67KB </span>","children":null,"spread":false},{"title":"ndss2017_03B-1_Miramirkhani_paper.pdf <span style='color:#111;'> 1.08MB </span>","children":null,"spread":false}],"spread":true},{"title":"2016","children":[{"title":"02-NDSS2016-cdn_loop-M.pdf <span style='color:#111;'> 718.35KB </span>","children":null,"spread":false},{"title":"skee-ndss16.pdf <span style='color:#111;'> 563.03KB </span>","children":null,"spread":false},{"title":"SLOTH_NDSS16.pdf <span style='color:#111;'> 2.42MB </span>","children":null,"spread":false},{"title":"protracer-towards-practical-provenance-tracing-alternating-logging-tainting.pdf <span style='color:#111;'> 1.49MB </span>","children":null,"spread":false}],"spread":true},{"title":"2018","children":[{"title":"ndss2018_05B-5_Pyrgelis_paper.pdf <span style='color:#111;'> 762.78KB </span>","children":null,"spread":false},{"title":"ndss2018_08-4_Tuncay_paper.pdf <span style='color:#111;'> 285.87KB </span>","children":null,"spread":false}],"spread":true}],"spread":true},{"title":"USENIX best paper","children":[{"title":"2019","children":[{"title":"sec19-thomas.pdf <span style='color:#111;'> 575.02KB </span>","children":null,"spread":false}],"spread":true},{"title":"2017","children":[{"title":"sec17-bond.pdf <span style='color:#111;'> 692.38KB </span>","children":null,"spread":false},{"title":"sec17-tang.pdf <span style='color:#111;'> 1.03MB </span>","children":null,"spread":false},{"title":"sec17-chung.pdf <span style='color:#111;'> 1.93MB </span>","children":null,"spread":false},{"title":"sec17-ho.pdf <span style='color:#111;'> 646.74KB </span>","children":null,"spread":false},{"title":"sec17-vila.pdf <span style='color:#111;'> 966.46KB </span>","children":null,"spread":false},{"title":"sec17-ma.pdf <span style='color:#111;'> 1.23MB </span>","children":null,"spread":false}],"spread":true},{"title":"2016","children":[{"title":"sec16_paper_giacomelli.pdf <span style='color:#111;'> 354.47KB </span>","children":null,"spread":false},{"title":"sec16_paper_svenda.pdf <span style='color:#111;'> 869.71KB </span>","children":null,"spread":false},{"title":"sec16_paper_melicher.pdf <span style='color:#111;'> 1.75MB </span>","children":null,"spread":false}],"spread":true},{"title":"2018","children":[{"title":"sec18-yun.pdf <span style='color:#111;'> 906.05KB </span>","children":null,"spread":false},{"title":"sec18-alhuzali.pdf <span style='color:#111;'> 857.97KB </span>","children":null,"spread":false},{"title":"sec18-scaife.pdf <span style='color:#111;'> 8.34MB </span>","children":null,"spread":false},{"title":"sec18-franken.pdf <span style='color:#111;'> 598.51KB </span>","children":null,"spread":false},{"title":"sec18-stevens.pdf <span style='color:#111;'> 2.61MB </span>","children":null,"spread":false}],"spread":true},{"title":"2015","children":[{"title":"sec15-paper-ramos.pdf <span style='color:#111;'> 423.45KB </span>","children":null,"spread":false},{"title":"woot15-paper-lorente.pdf <span style='color:#111;'> 463.38KB </span>","children":null,"spread":false}],"spread":true},{"title":"usenix best papers.url <span style='color:#111;'> 136B </span>","children":null,"spread":false}],"spread":true}],"spread":true}],"spread":true}]