10 papers:
SAC-2015-BarbosaBA #monitoring- Defending against load monitoring in smart metering data through noise addition (PB, AB, HA), pp. 2218–2224.
SAC-2009-TupakulaVP #named- DoSTRACK: a system for defending against DoS attacks (UKT, VV, SRP), pp. 47–53.
SAC-2009-YangSKY #collaboration #modelling #online #trust- Defending online reputation systems against collaborative unfair raters through signal modeling and trust (YY, YLS, SK, QY), pp. 1308–1315.
HPCA-2009-KongASZ- Hardware-software integrated approaches to defend against software cache-based side channel attacks (JK, OA, JPS, HZ), pp. 393–404.
OSDI-2008-JulaTZC #concurrent- Deadlock Immunity: Enabling Systems to Defend Against Deadlocks (HJ, DMT, CZ, GC), pp. 295–308.
ITiCSE-2006-TjadenT #network #student- Training students to administer and defend computer networks and systems (BT, BCT), pp. 245–249.
ICEIS-v2-2005-Liu- Defending Against Business Crises with the Help of Intelligent Agent Based Early Warning Solutions (SL), pp. 58–65.
ICEIS-v3-2003-AldersonSSS #process- Defending Essential Processes (AA, AS, HS, BS), pp. 197–200.
HCI-EI-1999-Aykin- Defending and Offending cultures (NMA), pp. 506–510.
OSDI-1999-SpatscheckP- Defending Against Denial of Service Attacks in Scout (OS, LLP), pp. 59–72.