10 papers:
- SAC-2015-BarbosaBA #monitoring
- Defending against load monitoring in smart metering data through noise addition (PB, AB, HA), pp. 2218–2224.
- SAC-2009-TupakulaVP #named
- DoSTRACK: a system for defending against DoS attacks (UKT, VV, SRP), pp. 47–53.
- SAC-2009-YangSKY #collaboration #modelling #online #trust
- Defending online reputation systems against collaborative unfair raters through signal modeling and trust (YY, YLS, SK, QY), pp. 1308–1315.
- HPCA-2009-KongASZ
- Hardware-software integrated approaches to defend against software cache-based side channel attacks (JK, OA, JPS, HZ), pp. 393–404.
- OSDI-2008-JulaTZC #concurrent
- Deadlock Immunity: Enabling Systems to Defend Against Deadlocks (HJ, DMT, CZ, GC), pp. 295–308.
- ITiCSE-2006-TjadenT #network #student
- Training students to administer and defend computer networks and systems (BT, BCT), pp. 245–249.
- ICEIS-v2-2005-Liu
- Defending Against Business Crises with the Help of Intelligent Agent Based Early Warning Solutions (SL), pp. 58–65.
- ICEIS-v3-2003-AldersonSSS #process
- Defending Essential Processes (AA, AS, HS, BS), pp. 197–200.
- HCI-EI-1999-Aykin
- Defending and Offending cultures (NMA), pp. 506–510.
- OSDI-1999-SpatscheckP
- Defending Against Denial of Service Attacks in Scout (OS, LLP), pp. 59–72.