Following datasets are used to support this analysis. Please feel free to download them.
Dataset Description
venue
|
tier
|
item_cnt
|
paper_cnt
|
min(year)
|
max(year)
|
year_cnt
|
proceedings_cnt
|
CCS
|
Tier 1
|
2179
|
2073
|
1993
|
2019
|
26
|
26
|
Crypto
|
Tier 1
|
1266
|
1234
|
1981
|
2012
|
32
|
32
|
Eurocrypt
|
Tier 1
|
1252
|
1220
|
1982
|
2014
|
33
|
32
|
NDSS
|
Tier 1
|
853
|
829
|
1995
|
2019
|
25
|
25
|
S&P (Oakland)
|
Tier 1
|
1548
|
1499
|
1980
|
2019
|
40
|
49
|
Security
|
Tier 1
|
1779
|
1696
|
1993
|
2019
|
25
|
83
|
ACSAC
|
Tier 2
|
1345
|
1304
|
1989
|
2019
|
30
|
34
|
ASIACCS
|
Tier 2
|
846
|
832
|
2006
|
2019
|
14
|
14
|
Asiacrypt
|
Tier 2
|
798
|
777
|
1990
|
2014
|
23
|
21
|
CHES
|
Tier 2
|
639
|
618
|
1999
|
2018
|
20
|
21
|
CSF (CSFW)
|
Tier 2
|
750
|
714
|
1988
|
2019
|
32
|
35
|
DSN
|
Tier 2
|
1936
|
1841
|
2000
|
2019
|
20
|
37
|
ESORICS
|
Tier 2
|
1014
|
971
|
1990
|
2020
|
25
|
43
|
EuroS&P
|
Tier 2
|
253
|
246
|
2016
|
2019
|
4
|
7
|
IMC
|
Tier 2
|
772
|
753
|
2001
|
2019
|
19
|
19
|
PETS
|
Tier 2
|
227
|
213
|
2002
|
2014
|
13
|
13
|
RAID
|
Tier 2
|
539
|
515
|
1999
|
2019
|
21
|
23
|
TCC
|
Tier 2
|
477
|
462
|
2004
|
2016
|
12
|
15
|
Keywords of Tier1 Conferences
year
|
cnt
|
top1
|
top2
|
top3
|
top4
|
top5
|
top6
|
top7
|
top8
|
top9
|
top10
|
top11
|
top12
|
top13
|
top14
|
top15
|
top16
|
top17
|
top18
|
top19
|
top20
|
top21
|
top22
|
top23
|
top24
|
top25
|
top26
|
top27
|
top28
|
top29
|
top30
|
1980
|
19
|
secur
|
system
|
preliminari
|
safeguard
|
key
|
data
|
report
|
cryptosystem
|
deceit
|
describ
|
gf
|
qm
|
transbord
|
problem
|
scheme
|
base
|
knapsack
|
master
|
pervas
|
logarithm
|
aspect
|
facil
|
threshold
|
kernel
|
compact
|
demonstr
|
exist
|
step
|
three
|
difficulti
|
1981
|
18
|
secur
|
system
|
protect
|
fund
|
half
|
lead
|
loaf
|
none
|
restricit
|
problem
|
flow
|
inform
|
multiprocessor
|
suffici
|
process
|
well
|
criteria
|
might
|
militari
|
model
|
kernel
|
messag
|
assign
|
defin
|
transfer
|
appli
|
futur
|
transport
|
integr
|
better
|
1982
|
20
|
secur
|
allianc
|
blindfold
|
conseqeu
|
cryptanalyt
|
memoryless
|
neval
|
obm
|
oskar
|
restitut
|
sacur
|
signitur
|
protect
|
arbitr
|
innov
|
total
|
form
|
preliminari
|
concept
|
pool
|
acceler
|
goal
|
overcom
|
commun
|
area
|
split
|
surveil
|
channel
|
practic
|
databas
|
1983
|
21
|
secur
|
system
|
encrpyt
|
indentif
|
modifi
|
sdc
|
treati
|
veru
|
problem
|
integ
|
minimum
|
theme
|
variat
|
multilevel
|
note
|
provis
|
retrospect
|
evalu
|
guard
|
recent
|
variou
|
algorithm
|
assign
|
joint
|
tcb
|
code
|
verif
|
complianc
|
pad
|
switch
|
1984
|
26
|
secur
|
formal
|
comput
|
system
|
experi
|
bell
|
congression
|
euclid
|
lapadula
|
mcf
|
mm
|
multinet
|
ottawa
|
pend
|
unwind
|
ada
|
checksum
|
interrog
|
iv
|
legisl
|
linu
|
sri
|
statement
|
traceabl
|
multilevel
|
de
|
individu
|
retrospect
|
age
|
built
|
1985
|
25
|
ada
|
verif
|
system
|
overview
|
secur
|
databas
|
comput
|
acycl
|
america
|
commut
|
conceptu
|
controlin
|
gypsi
|
honeywel
|
inequ
|
polonium
|
quadrat
|
scomp
|
trustabl
|
unif
|
issu
|
attenu
|
conflict
|
consider
|
onto
|
ssr
|
statist
|
network
|
allow
|
dbm
|
1986
|
23
|
secur
|
xenix
|
system
|
use
|
global
|
comput
|
ina
|
jo
|
keykostm
|
muse
|
owner
|
sat
|
sector
|
unreli
|
databas
|
absenc
|
affect
|
matchmak
|
workstat
|
design
|
schemat
|
special
|
anoth
|
guard
|
militari
|
ml
|
top
|
extend
|
avail
|
addit
|
1987
|
26
|
secur
|
multilevel
|
system
|
covert
|
abyss
|
comparti
|
formul
|
subsystem
|
visa
|
μabyss
|
channel
|
relat
|
believ
|
hors
|
workstat
|
capac
|
damag
|
militari
|
model
|
specif
|
invari
|
code
|
basi
|
dual
|
net
|
overview
|
potenti
|
consist
|
homomorph
|
natur
|
1988
|
24
|
secur
|
seaview
|
system
|
multilevel
|
databas
|
apo
|
commerci
|
model
|
asdview
|
axiomat
|
reverif
|
smite
|
relat
|
cascad
|
expert
|
microprocessor
|
virus
|
comput
|
distribut
|
mandatori
|
specif
|
toler
|
infer
|
basi
|
concern
|
denial
|
switch
|
discretionari
|
integr
|
manag
|
1989
|
33
|
secur
|
model
|
polici
|
viru
|
system
|
unix
|
distribut
|
allergi
|
incorpor
|
merg
|
novemb
|
part
|
subject
|
sum
|
summari
|
trak
|
tuni
|
tweezer
|
unchart
|
fact
|
immedi
|
ipc
|
mediat
|
microscop
|
narrow
|
pass
|
suppress
|
tea
|
cell
|
central
|
1990
|
34
|
secur
|
vmm
|
system
|
multilevel
|
architectur
|
data
|
knowledg
|
kernel
|
use
|
model
|
verif
|
aso
|
cartesiana
|
microprogram
|
pale
|
polyinstanti
|
referenti
|
vax
|
formal
|
construct
|
databas
|
inform
|
armi
|
conundrum
|
deduct
|
littl
|
nondeterminist
|
audit
|
form
|
goe
|
1991
|
28
|
channel
|
model
|
system
|
analysi
|
time
|
secur
|
flow
|
covert
|
distribut
|
verif
|
ban
|
buzzword
|
microdata
|
nondisclosur
|
spx
|
queri
|
relat
|
inform
|
epidemiolog
|
ide
|
sri
|
taxonomi
|
term
|
variabl
|
statist
|
approach
|
decomposit
|
higher
|
mathemat
|
schemat
|
1992
|
22
|
secur
|
system
|
multilevel
|
concurr
|
databas
|
solut
|
apo
|
blacker
|
ddn
|
ideal
|
problem
|
transact
|
snapshot
|
decomposit
|
upon
|
protocol
|
distribut
|
alloc
|
criteria
|
influenc
|
trade
|
delay
|
matrix
|
orient
|
lattic
|
schedul
|
denial
|
natur
|
procedur
|
window
|
1993
|
61
|
secur
|
unix
|
protocol
|
authent
|
distribut
|
system
|
interconnect
|
requir
|
environ
|
logic
|
design
|
key
|
signatur
|
multilevel
|
denial
|
author
|
relationship
|
assur
|
network
|
cryptanalysi
|
cryptograph
|
internet
|
access
|
commun
|
model
|
atp
|
cryptolib
|
edi
|
ftp
|
mach
|
1994
|
50
|
secur
|
protocol
|
system
|
condit
|
escrow
|
composit
|
channel
|
model
|
elimin
|
function
|
cryptograph
|
requir
|
distribut
|
amok
|
disenrol
|
gifford
|
interrel
|
prerequisit
|
tabular
|
tripwir
|
gener
|
broadcast
|
servic
|
inform
|
engin
|
convert
|
discrimin
|
endors
|
insur
|
lan
|
1995
|
59
|
secur
|
system
|
network
|
kerbero
|
internet
|
object
|
protocol
|
architectur
|
domain
|
firewal
|
issu
|
panel
|
multilevel
|
version
|
audit
|
manag
|
enforc
|
key
|
unix
|
use
|
global
|
requir
|
model
|
absorb
|
adrift
|
aix
|
autohack
|
bottom
|
corba
|
mlr
|
1996
|
74
|
secur
|
system
|
key
|
protocol
|
distribut
|
signatur
|
versatil
|
atm
|
network
|
panel
|
control
|
author
|
fair
|
support
|
educ
|
email
|
public
|
cryptanalysi
|
payment
|
framework
|
access
|
develop
|
commun
|
anarchist
|
babel
|
bankcard
|
bump
|
cryptovirolog
|
encryptor
|
helper
|
1997
|
61
|
secur
|
system
|
rout
|
calculu
|
protocol
|
concept
|
attack
|
author
|
fair
|
flaw
|
kerbero
|
configur
|
key
|
password
|
analysi
|
dynam
|
authent
|
proactiv
|
bin
|
catalyt
|
escort
|
espionag
|
fatal
|
larger
|
mbone
|
misplac
|
nimrod
|
postur
|
scout
|
segreg
|
1998
|
76
|
secur
|
protocol
|
java
|
system
|
detect
|
key
|
network
|
attack
|
distribut
|
atm
|
polici
|
effici
|
mobil
|
fair
|
certif
|
implement
|
group
|
support
|
ipsec
|
internet
|
trust
|
adapt
|
stack
|
apo
|
bean
|
di
|
dte
|
equip
|
hostil
|
intermedi
|
1999
|
83
|
secur
|
twenti
|
year
|
network
|
futur
|
intrus
|
password
|
detect
|
signatur
|
system
|
quot
|
protocol
|
toolkit
|
rsa
|
use
|
privat
|
misus
|
distribut
|
softwar
|
scheme
|
base
|
bgp
|
group
|
key
|
harden
|
ipsec
|
multicast
|
technolog
|
unix
|
analysi
|
2000
|
91
|
secur
|
use
|
protocol
|
detect
|
confin
|
multicast
|
infrastructur
|
step
|
privaci
|
java
|
system
|
sourc
|
coprocessor
|
effici
|
technolog
|
virtual
|
certif
|
intrus
|
enhanc
|
applic
|
web
|
realli
|
signatur
|
issu
|
attack
|
first
|
access
|
author
|
kerbero
|
encrypt
|
2001
|
89
|
secur
|
authent
|
system
|
detect
|
protocol
|
file
|
key
|
method
|
kerbero
|
manag
|
analysi
|
network
|
cryptograph
|
group
|
trust
|
string
|
vulner
|
protect
|
flexibl
|
publish
|
client
|
effici
|
abstract
|
control
|
certifi
|
access
|
new
|
constraint
|
format
|
negoti
|
2002
|
85
|
detect
|
intrus
|
secur
|
attack
|
network
|
use
|
anonym
|
system
|
analysi
|
linux
|
authent
|
placement
|
manag
|
tl
|
web
|
framework
|
key
|
packet
|
hook
|
protocol
|
alert
|
gener
|
modul
|
partial
|
ssh
|
certif
|
implement
|
encrypt
|
mix
|
correl
|
2003
|
93
|
attack
|
secur
|
detect
|
effici
|
use
|
sensor
|
key
|
buffer
|
system
|
static
|
interdomain
|
pairwis
|
distribut
|
signatur
|
analysi
|
network
|
overflow
|
traffic
|
authent
|
ddo
|
intrus
|
scheme
|
defend
|
vulner
|
protect
|
improv
|
avail
|
pki
|
call
|
memori
|
2004
|
103
|
secur
|
detect
|
attack
|
system
|
use
|
encrypt
|
do
|
network
|
intrus
|
effect
|
filter
|
worm
|
graphic
|
reusabl
|
authent
|
access
|
architectur
|
web
|
design
|
signatur
|
puzzl
|
alert
|
futur
|
runtim
|
rfid
|
static
|
integr
|
scheme
|
automat
|
buffer
|
2005
|
100
|
attack
|
secur
|
worm
|
detect
|
use
|
network
|
automat
|
analysi
|
distribut
|
troubleshoot
|
sensor
|
gener
|
authent
|
vulner
|
autom
|
applic
|
effici
|
system
|
exploit
|
polymorph
|
proxi
|
improv
|
ieee
|
internet
|
signatur
|
caus
|
effect
|
fast
|
new
|
counter
|
2006
|
134
|
secur
|
detect
|
system
|
analysi
|
gener
|
vote
|
network
|
data
|
attack
|
short
|
paper
|
web
|
replay
|
spywar
|
use
|
applic
|
hidden
|
automat
|
approach
|
intrus
|
authent
|
practic
|
abstract
|
browser
|
privaci
|
signatur
|
polici
|
ballot
|
exploit
|
resili
|
2007
|
173
|
attack
|
vote
|
secur
|
network
|
system
|
deter
|
detect
|
malwar
|
analysi
|
use
|
ballot
|
testb
|
vulner
|
gener
|
web
|
exploit
|
privaci
|
audit
|
inform
|
automat
|
quot
|
encrypt
|
anonym
|
spam
|
denial
|
unifi
|
softwar
|
dynam
|
fingerprint
|
optim
|
2008
|
171
|
secur
|
network
|
vote
|
system
|
attack
|
analysi
|
toward
|
anonym
|
verifi
|
engin
|
defens
|
elect
|
practic
|
automat
|
effici
|
optic
|
use
|
malwar
|
protocol
|
via
|
gener
|
web
|
testb
|
robust
|
revers
|
exploit
|
audit
|
encrypt
|
model
|
experi
|
2009
|
158
|
vote
|
secur
|
use
|
attack
|
web
|
detect
|
botnet
|
effici
|
rfid
|
network
|
defens
|
data
|
privaci
|
system
|
leak
|
applic
|
automat
|
malwar
|
voter
|
script
|
analysi
|
paper
|
testb
|
robust
|
inform
|
comput
|
traffic
|
social
|
avc
|
tor
|
2010
|
250
|
secur
|
attack
|
web
|
network
|
system
|
social
|
applic
|
spam
|
detect
|
malwar
|
use
|
health
|
privaci
|
effici
|
vulner
|
elect
|
data
|
analysi
|
browser
|
anonym
|
automat
|
cloud
|
onlin
|
protect
|
javascript
|
framework
|
polici
|
base
|
control
|
aggreg
|
2011
|
272
|
secur
|
attack
|
privaci
|
web
|
detect
|
analysi
|
system
|
use
|
cloud
|
malwar
|
vulner
|
applic
|
network
|
inform
|
encrypt
|
medic
|
measur
|
automat
|
censorship
|
onlin
|
data
|
exploit
|
control
|
android
|
scalabl
|
anonym
|
comput
|
devic
|
social
|
mobil
|
2012
|
338
|
attack
|
secur
|
privaci
|
network
|
web
|
android
|
system
|
malwar
|
detect
|
data
|
cloud
|
analysi
|
social
|
apo
|
tor
|
user
|
toward
|
onlin
|
use
|
applic
|
inform
|
semant
|
comput
|
evalu
|
effici
|
practic
|
protocol
|
smartphon
|
mobil
|
measur
|
2013
|
381
|
secur
|
android
|
attack
|
data
|
network
|
web
|
use
|
detect
|
privaci
|
analysi
|
comput
|
system
|
insid
|
applic
|
practic
|
devic
|
evalu
|
malwar
|
censorship
|
mobil
|
effici
|
toward
|
circuit
|
apo
|
automat
|
oblivi
|
protocol
|
integr
|
threat
|
user
|
2014
|
407
|
secur
|
attack
|
android
|
data
|
detect
|
malwar
|
privaci
|
web
|
use
|
analysi
|
network
|
applic
|
system
|
practic
|
password
|
vulner
|
encrypt
|
insid
|
cloud
|
malici
|
autom
|
devic
|
apo
|
mobil
|
code
|
threat
|
toward
|
app
|
comput
|
state
|
2015
|
376
|
secur
|
attack
|
android
|
privaci
|
app
|
detect
|
data
|
vulner
|
code
|
cloud
|
applic
|
studi
|
bitcoin
|
exploit
|
tl
|
automat
|
use
|
web
|
apo
|
protect
|
analysi
|
encrypt
|
user
|
network
|
cach
|
integr
|
memori
|
circuit
|
comput
|
authent
|
2016
|
459
|
secur
|
android
|
attack
|
analysi
|
detect
|
malwar
|
data
|
mobil
|
network
|
privaci
|
applic
|
differenti
|
system
|
practic
|
toward
|
vulner
|
authent
|
learn
|
tl
|
apo
|
user
|
app
|
studi
|
devic
|
privat
|
via
|
use
|
gener
|
cybersecur
|
comput
|
2017
|
502
|
attack
|
secur
|
detect
|
android
|
privaci
|
vulner
|
network
|
learn
|
analysi
|
via
|
practic
|
use
|
sgx
|
malwar
|
apo
|
privat
|
mobil
|
system
|
measur
|
effici
|
differenti
|
enclav
|
onlin
|
exploit
|
evil
|
toward
|
autom
|
encrypt
|
tor
|
verifi
|
2018
|
542
|
secur
|
attack
|
learn
|
deep
|
android
|
detect
|
use
|
network
|
analysi
|
adversari
|
privaci
|
apo
|
studi
|
toward
|
neural
|
system
|
iot
|
data
|
practic
|
user
|
quot
|
gener
|
cybersecur
|
via
|
app
|
web
|
encrypt
|
fingerprint
|
threat
|
differenti
|
2019
|
590
|
attack
|
secur
|
privaci
|
adversari
|
learn
|
apo
|
neural
|
deep
|
iot
|
fuzz
|
network
|
detect
|
smart
|
data
|
studi
|
vulner
|
use
|
app
|
analysi
|
system
|
evalu
|
understand
|
via
|
cryptocurr
|
applic
|
web
|
blockchain
|
user
|
measur
|
differenti
|
Keywords of Tier2 Conferences
year
|
cnt
|
top1
|
top2
|
top3
|
top4
|
top5
|
top6
|
top7
|
top8
|
top9
|
top10
|
top11
|
top12
|
top13
|
top14
|
top15
|
top16
|
top17
|
top18
|
top19
|
top20
|
top21
|
top22
|
top23
|
top24
|
top25
|
top26
|
top27
|
top28
|
top29
|
top30
|
1988
|
16
|
secur
|
inform
|
model
|
tranquil
|
unansw
|
express
|
gypsi
|
approach
|
degre
|
hook
|
schemat
|
theft
|
question
|
specifi
|
permiss
|
flow
|
protect
|
formal
|
deriv
|
increas
|
analysi
|
insecur
|
polici
|
quantit
|
need
|
command
|
definit
|
knowledg
|
compon
|
sensit
|
1989
|
73
|
secur
|
system
|
subset
|
tcb
|
trust
|
multilevel
|
develop
|
cal
|
gemso
|
issu
|
summari
|
integr
|
data
|
databas
|
logist
|
process
|
approach
|
design
|
acquisit
|
lan
|
consist
|
air
|
model
|
support
|
comput
|
protect
|
risk
|
network
|
panel
|
distribut
|
1990
|
86
|
secur
|
system
|
multilevel
|
model
|
trust
|
comput
|
profession
|
databas
|
network
|
control
|
applic
|
manag
|
distribut
|
inform
|
unix
|
base
|
evalu
|
epistem
|
formal
|
protocol
|
relat
|
access
|
progress
|
process
|
softwar
|
ml
|
orient
|
apo
|
logic
|
criteria
|
1991
|
54
|
secur
|
polyinstanti
|
multilevel
|
system
|
model
|
analysi
|
use
|
protocol
|
discuss
|
databas
|
depend
|
consider
|
channel
|
integr
|
panel
|
posit
|
bell
|
hors
|
inevit
|
infeas
|
nonparametr
|
rebu
|
salient
|
teller
|
virtu
|
high
|
problem
|
paper
|
abduct
|
computer
|
1992
|
66
|
secur
|
multilevel
|
system
|
analysi
|
comput
|
distribut
|
model
|
transit
|
protocol
|
architectur
|
authent
|
formal
|
use
|
method
|
process
|
ml
|
approach
|
databas
|
trust
|
interoper
|
panel
|
access
|
control
|
polici
|
sourc
|
amac
|
amc
|
asax
|
cat
|
cautionari
|
1993
|
43
|
secur
|
ml
|
multilevel
|
model
|
system
|
protocol
|
represent
|
panel
|
compusec
|
cosignatur
|
dbmss
|
devis
|
multiview
|
rational
|
theme
|
unhappi
|
workstat
|
prototyp
|
allianc
|
canadian
|
describ
|
display
|
involv
|
mathemat
|
mental
|
procur
|
rdbm
|
approach
|
databas
|
applic
|
1994
|
77
|
secur
|
system
|
multilevel
|
databas
|
model
|
approach
|
editori
|
mitr
|
protocol
|
authent
|
network
|
inform
|
privileg
|
perimet
|
architectur
|
analysi
|
use
|
perform
|
practic
|
vs
|
control
|
interfac
|
confidenti
|
view
|
ml
|
integr
|
open
|
taxonomi
|
comput
|
design
|
1995
|
16
|
secur
|
system
|
specifi
|
protocol
|
authentif
|
cscw
|
fdr
|
loral
|
mclean
|
ulyss
|
properti
|
higher
|
synthet
|
compos
|
control
|
model
|
decompos
|
discretionari
|
epistem
|
verifi
|
guess
|
individu
|
checker
|
clock
|
interfer
|
represent
|
resolut
|
logic
|
csp
|
key
|
1996
|
71
|
secur
|
protocol
|
payment
|
system
|
purs
|
model
|
electron
|
nrl
|
multilevel
|
quot
|
two
|
internet
|
authent
|
control
|
databas
|
formal
|
proxi
|
distribut
|
use
|
analyz
|
convinc
|
edi
|
esign
|
fortezza
|
genealog
|
german
|
gni
|
hanscom
|
hol
|
immunolog
|
1997
|
47
|
secur
|
protocol
|
multilevel
|
system
|
commerc
|
assur
|
type
|
applic
|
authent
|
electron
|
bastion
|
casper
|
doc
|
dss
|
hajj
|
pcasso
|
saudi
|
virgil
|
wyatt
|
enforc
|
effici
|
technolog
|
canon
|
dod
|
ethic
|
sdsi
|
unattend
|
architectur
|
comput
|
firewal
|
1998
|
78
|
secur
|
system
|
detect
|
protocol
|
model
|
applet
|
distribut
|
authent
|
network
|
electron
|
java
|
panel
|
analysi
|
multilevel
|
intrus
|
atm
|
fair
|
comput
|
databas
|
commerc
|
payment
|
mobil
|
scheme
|
servic
|
introduct
|
architectur
|
data
|
key
|
applic
|
use
|
1999
|
123
|
detect
|
secur
|
intrus
|
system
|
network
|
analysi
|
attack
|
protocol
|
architectur
|
use
|
finit
|
id
|
certif
|
applic
|
basi
|
de
|
access
|
model
|
gener
|
build
|
design
|
nt
|
field
|
cryptograph
|
new
|
fast
|
atm
|
manag
|
servic
|
multipl
|
2000
|
190
|
secur
|
system
|
use
|
detect
|
network
|
protocol
|
analysi
|
fault
|
control
|
access
|
applic
|
depend
|
gf
|
approach
|
intrus
|
base
|
model
|
architectur
|
data
|
mobil
|
toler
|
power
|
attack
|
softwar
|
certif
|
reliabl
|
comput
|
implement
|
code
|
cot
|
2001
|
198
|
secur
|
system
|
detect
|
fault
|
network
|
perform
|
intrus
|
attack
|
algorithm
|
implement
|
internet
|
alert
|
distribut
|
use
|
model
|
ellipt
|
softwar
|
protocol
|
measur
|
analysi
|
rijndael
|
curv
|
toler
|
approach
|
architectur
|
data
|
design
|
traffic
|
applic
|
multipl
|
2002
|
288
|
system
|
analysi
|
detect
|
secur
|
use
|
network
|
attack
|
model
|
intrus
|
internet
|
evalu
|
traffic
|
softwar
|
measur
|
fault
|
curv
|
depend
|
perform
|
ellipt
|
privaci
|
random
|
toler
|
backbon
|
inform
|
tool
|
control
|
gf
|
architectur
|
data
|
applic
|
2003
|
252
|
system
|
secur
|
detect
|
network
|
analysi
|
model
|
fault
|
attack
|
depend
|
intrus
|
use
|
perform
|
data
|
algorithm
|
failur
|
applic
|
protocol
|
privaci
|
evalu
|
control
|
internet
|
implement
|
measur
|
distribut
|
toler
|
base
|
number
|
design
|
rout
|
hardwar
|
2004
|
330
|
system
|
network
|
detect
|
secur
|
attack
|
analysi
|
fault
|
depend
|
applic
|
use
|
comput
|
traffic
|
intrus
|
data
|
model
|
implement
|
servic
|
algorithm
|
reliabl
|
worm
|
design
|
control
|
effici
|
measur
|
protocol
|
toler
|
transfer
|
inform
|
rout
|
flow
|
2005
|
335
|
secur
|
system
|
network
|
attack
|
detect
|
model
|
analysi
|
committe
|
distribut
|
use
|
intrus
|
wireless
|
protocol
|
base
|
error
|
privaci
|
comput
|
data
|
failur
|
traffic
|
approach
|
confer
|
encrypt
|
code
|
worm
|
monitor
|
applic
|
depend
|
adapt
|
evalu
|
2006
|
383
|
secur
|
system
|
attack
|
network
|
analysi
|
detect
|
use
|
privaci
|
depend
|
model
|
effici
|
architectur
|
access
|
framework
|
gener
|
control
|
random
|
intrus
|
protocol
|
base
|
key
|
oracl
|
distribut
|
approach
|
comput
|
perform
|
sampl
|
scheme
|
automat
|
messag
|
2007
|
392
|
secur
|
network
|
system
|
attack
|
analysi
|
use
|
servic
|
detect
|
protocol
|
control
|
model
|
data
|
effici
|
dynam
|
encrypt
|
authent
|
depend
|
privaci
|
access
|
approach
|
fault
|
traffic
|
monitor
|
key
|
distribut
|
inform
|
web
|
tube
|
rout
|
rfid
|
2008
|
377
|
secur
|
attack
|
detect
|
network
|
system
|
analysi
|
protocol
|
use
|
control
|
applic
|
effici
|
fault
|
anomali
|
signatur
|
anonym
|
base
|
servic
|
error
|
depend
|
approach
|
toward
|
model
|
scheme
|
abstract
|
privaci
|
architectur
|
rfid
|
improv
|
evalu
|
extend
|
2009
|
420
|
network
|
secur
|
system
|
detect
|
attack
|
privaci
|
use
|
analysi
|
dynam
|
applic
|
protocol
|
social
|
base
|
servic
|
polici
|
depend
|
onlin
|
control
|
function
|
inform
|
effici
|
comput
|
data
|
encrypt
|
gener
|
anonym
|
authent
|
botnet
|
model
|
intrus
|
2010
|
424
|
network
|
secur
|
detect
|
analysi
|
use
|
system
|
fault
|
effici
|
base
|
privaci
|
data
|
anonym
|
attack
|
protocol
|
social
|
monitor
|
model
|
comput
|
toler
|
effect
|
hardwar
|
toward
|
framework
|
applic
|
web
|
softwar
|
approach
|
error
|
encrypt
|
improv
|
2011
|
433
|
secur
|
attack
|
detect
|
use
|
system
|
network
|
analysi
|
privaci
|
malwar
|
cloud
|
data
|
web
|
dynam
|
model
|
social
|
fault
|
effici
|
signatur
|
privat
|
comput
|
memori
|
protocol
|
approach
|
key
|
encrypt
|
virtual
|
depend
|
applic
|
function
|
random
|
2012
|
439
|
secur
|
analysi
|
network
|
attack
|
cloud
|
system
|
detect
|
effici
|
privaci
|
data
|
model
|
use
|
toward
|
protocol
|
privat
|
abstract
|
encrypt
|
social
|
function
|
program
|
error
|
scheme
|
resili
|
practic
|
monitor
|
measur
|
malwar
|
fault
|
differenti
|
authent
|
2013
|
437
|
secur
|
system
|
network
|
cloud
|
attack
|
comput
|
analysi
|
use
|
data
|
android
|
privaci
|
detect
|
applic
|
encrypt
|
malwar
|
model
|
virtual
|
devic
|
effici
|
control
|
fault
|
mobil
|
web
|
dynam
|
practic
|
evalu
|
measur
|
via
|
understand
|
memori
|
2014
|
391
|
secur
|
attack
|
network
|
android
|
system
|
cloud
|
privaci
|
analysi
|
detect
|
malwar
|
use
|
applic
|
social
|
evalu
|
data
|
measur
|
web
|
virtual
|
fault
|
toward
|
autom
|
effici
|
model
|
studi
|
program
|
leakag
|
vulner
|
failur
|
understand
|
encrypt
|
2015
|
394
|
attack
|
secur
|
system
|
analysi
|
detect
|
android
|
use
|
data
|
privaci
|
control
|
network
|
effici
|
mobil
|
cloud
|
applic
|
program
|
devic
|
softwar
|
binari
|
app
|
base
|
integr
|
code
|
encrypt
|
hardwar
|
keynot
|
protect
|
improv
|
model
|
character
|
2016
|
546
|
secur
|
analysi
|
attack
|
encrypt
|
cloud
|
android
|
system
|
effici
|
obfusc
|
app
|
detect
|
comput
|
function
|
network
|
data
|
use
|
code
|
malwar
|
privaci
|
applic
|
via
|
control
|
model
|
ram
|
fault
|
dynam
|
authent
|
practic
|
secret
|
protect
|
2017
|
456
|
secur
|
attack
|
android
|
system
|
detect
|
analysi
|
use
|
blockchain
|
data
|
encrypt
|
network
|
cloud
|
app
|
control
|
toward
|
authent
|
malwar
|
evalu
|
applic
|
measur
|
privaci
|
effici
|
model
|
case
|
studi
|
industri
|
binari
|
mobil
|
internet
|
malici
|
2018
|
527
|
secur
|
detect
|
attack
|
system
|
use
|
network
|
cloud
|
analysi
|
data
|
iot
|
learn
|
machin
|
privaci
|
deep
|
blockchain
|
base
|
neural
|
control
|
model
|
android
|
toward
|
malwar
|
measur
|
via
|
studi
|
practic
|
authent
|
internet
|
framework
|
error
|
2019
|
507
|
attack
|
secur
|
network
|
system
|
use
|
iot
|
detect
|
analysi
|
neural
|
malwar
|
data
|
privaci
|
blockchain
|
applic
|
control
|
devic
|
model
|
deep
|
adversari
|
studi
|
android
|
via
|
vulner
|
toward
|
measur
|
base
|
framework
|
approach
|
protect
|
protocol
|