ACSAC

AcronymDefinition
ACSACAnnual Computer Security Applications Conference
ACSACAssociation contre la Spondylarthrite Ankylosante et ses Conséquences
ACSACAssociation of Commonwealth Societies of Architects in the Caribbean
ACSACAncient Ceramics Scientific Authentication Centre (Hong Kong)
ACSACAshby Castle Sub Aqua Club (est. 1997; UK)
ACSACAssistant Chief of Staff for Automation and Communication
References in periodicals archive ?
Williamson, "Throttling viruses: restricting propagation to defeat malicious mobile code," in Proceedings of the ACSAC Security Conference, pp.
Wang, "Secure distributed cluster formation in wireless sensor networks," in Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC '06), pp.
Donghua Xu, Chenghuai Lu and Andre Dos Santos, Protecting Web Usage of Credit Cards Using OTP Cookie Encryption, Proceeding of ACSAC, 18: 1-8(2002).
In ACSAC '99: Proceedings of the 15th Annual Computer Security Applications Conference, page 22, Washington, DC, USA, 1999.
Synthesizing Test Data for Fraud Detection Systems, in Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC '03), Las Vegas, Nevada, USA.
Owen, "Graphical passwords: a survey," in Proceedings of the 21st Annual Computer Security Applications Conference (ACSAC '05), pp.
2006 (ACSAC '06), pp.289-300, December 11-15, 2006.
Dewald, "Cujo: efficient detection and prevention of drive-by-download attacks," in Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC '10), pp.
"Automatic inference and enforcement of kernel data structure invariants," in Proceedings of 24th Annual Computer Security Applications Conference (ACSAC), pp: 77-86.
[7] P Iglio, "Trustedbox: a Kernellevel integrity checker," in Proceedings of the 15th Annual Computer Security Applications Conference (ACSAC '99), IEEE Computer Society, Phoenix, AZ, USA, 1999.
Bogle (1998) Role-based access control framework for network enterprises, ACSAC '98: Proceedings of the 14th Annual Computer Security Applications Conference, IEEE Computer Society, Washington DC USA.
Kirda, "Limits of static analysis for malware detection," in Proceedings of the 23rd Annual Computer Security Applications Conference (ACSAC '07), pp.