Search dblp for Publications

export results for "toc:db/journals/sesa/sesa4.bht:"

 download as .bib file

@article{DBLP:journals/sesa/CeesayMW18,
  author       = {Ebrima N. Ceesay and
                  K. Myers and
                  Paul A. Watters},
  title        = {Human-centered strategies for cyber-physical systems security},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {14},
  pages        = {e5},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.154773},
  doi          = {10.4108/EAI.15-5-2018.154773},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/CeesayMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/GuanFPGGL18,
  author       = {Le Guan and
                  Sadegh Farhang and
                  Yu Pu and
                  Pinyao Guo and
                  Jens Grossklags and
                  Peng Liu},
  title        = {VaultIME: Regaining User Control for Password Managers through Auto-correction},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {14},
  pages        = {e4},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.154772},
  doi          = {10.4108/EAI.15-5-2018.154772},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/GuanFPGGL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/HuangZY18,
  author       = {Chu Huang and
                  Sencun Zhu and
                  Yi Yang},
  title        = {An Evaluation Framework for Moving Target Defense Based on Analytic
                  Hierarchy Process},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e4},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153527},
  doi          = {10.4108/EAI.4-1-2018.153527},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/HuangZY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KaramiWC18,
  author       = {Mohammad Karami and
                  An Wang and
                  Songqing Chen},
  title        = {Attribution of Economic Denial of Sustainability Attacks in Public
                  Clouds},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e2},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153525},
  doi          = {10.4108/EAI.4-1-2018.153525},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/KaramiWC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/MaglarasDNR18,
  author       = {Leandros A. Maglaras and
                  George Drivas and
                  Kleanthis Noou and
                  Stylianos Rallis},
  title        = {{NIS} directive: The case of Greece},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {14},
  pages        = {e1},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.154769},
  doi          = {10.4108/EAI.15-5-2018.154769},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/MaglarasDNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/SunDSL18,
  author       = {Xiaoyan Sun and
                  Jun Dai and
                  Anoop Singhal and
                  Peng Liu},
  title        = {Probabilistic Inference of the Stealthy Bridges between Enterprise
                  Networks in Cloud},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e3},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153526},
  doi          = {10.4108/EAI.4-1-2018.153526},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/SunDSL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/WangYR18,
  author       = {Zheng Wang and
                  Shui Yu and
                  Scott Rose},
  title        = {An On-Demand Defense Scheme Against {DNS} Cache Poisoning Attacks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {14},
  pages        = {e3},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.154771},
  doi          = {10.4108/EAI.15-5-2018.154771},
  timestamp    = {Wed, 08 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/WangYR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Xiong18,
  author       = {Kaiqi Xiong},
  title        = {The performance analysis of public key cryptography-based authentication},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {14},
  pages        = {e2},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.15-5-2018.154770},
  doi          = {10.4108/EAI.15-5-2018.154770},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/Xiong18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/XuCGXS18,
  author       = {Lei Xu and
                  Lin Chen and
                  Zhimin Gao and
                  Shouhuai Xu and
                  Weidong Shi},
  title        = {Efficient Public Blockchain Client for Lightweight Users},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e5},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153528},
  doi          = {10.4108/EAI.4-1-2018.153528},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/XuCGXS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhuJM18,
  author       = {Sencun Zhu and
                  Kevin I. Jones and
                  Leandros A. Maglaras},
  title        = {Defence Mechanisms for Public Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {13},
  pages        = {e1},
  year         = {2018},
  url          = {https://doi.org/10.4108/eai.4-1-2018.153524},
  doi          = {10.4108/EAI.4-1-2018.153524},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhuJM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/BalenBW17,
  author       = {Nicolas Van Balen and
                  Christopher T. Ball and
                  Haining Wang},
  title        = {Analysis of Targeted Mouse Movements for Gender Classification},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e3},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153395},
  doi          = {10.4108/EAI.7-12-2017.153395},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/BalenBW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ChengWZ17,
  author       = {Leixiao Cheng and
                  Quanshui Wu and
                  Yunlei Zhao},
  title        = {Compact lossy and all-but-one trapdoor functions from lattice},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e4},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153517},
  doi          = {10.4108/EAI.28-12-2017.153517},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/ChengWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/DongYCLZ17,
  author       = {Qi Dong and
                  Zekun Yang and
                  Yu Chen and
                  Xiaohua Li and
                  Kai Zeng},
  title        = {Exploration of Singular Spectrum Analysis for Online Anomaly Detection
                  in CRNs},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e3},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153516},
  doi          = {10.4108/EAI.28-12-2017.153516},
  timestamp    = {Mon, 17 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/DongYCLZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/KannanWCBDB17,
  author       = {Subramaniyam Kannan and
                  Paul Wood and
                  Somali Chaterji and
                  Saurabh Bagchi and
                  Larry Deatrick and
                  Patricia Beane},
  title        = {{MAAT:} Multi-Stage Attack Attribution in Enterprise Systems using
                  Software Defined Networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e4},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153396},
  doi          = {10.4108/EAI.7-12-2017.153396},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/KannanWCBDB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Leca17,
  author       = {Cristian Liviu Leca},
  title        = {Overview of Romania 802.11Wireless Security {\&} Statistics},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e5},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153518},
  doi          = {10.4108/EAI.28-12-2017.153518},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sesa/Leca17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/LiOMMG17,
  author       = {Yongfeng Li and
                  Jinbin Ouyang and
                  Bing Mao and
                  Kai Ma and
                  Shanqing Guo},
  title        = {Data Flow Analysis on Android Platform with Fragment Lifecycle Modeling
                  and Callbacks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e2},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153394},
  doi          = {10.4108/EAI.7-12-2017.153394},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/LiOMMG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/NiyazSJ17,
  author       = {Quamar Niyaz and
                  Weiqing Sun and
                  Ahmad Y. Javaid},
  title        = {A Deep Learning Based DDoS Detection System in Software-Defined Networking
                  {(SDN)}},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e2},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153515},
  doi          = {10.4108/EAI.28-12-2017.153515},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/NiyazSJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/PaladiG17,
  author       = {Nicolae Paladi and
                  Christian Gehrmann},
  title        = {Bootstrapping trust in software defined networks},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e5},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153397},
  doi          = {10.4108/EAI.7-12-2017.153397},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/PaladiG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/TanWFCJH17,
  author       = {Zheng Tan and
                  Cheng Wang and
                  Xiaoling Fu and
                  Jipeng Cui and
                  Changjun Jiang and
                  Weili Han},
  title        = {Re-identification of Vehicular Location-Based Metadata},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {11},
  pages        = {e1},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.7-12-2017.153393},
  doi          = {10.4108/EAI.7-12-2017.153393},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/TanWFCJH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/ZhuJM17,
  author       = {Sencun Zhu and
                  Kevin I. Jones and
                  Leandros A. Maglaras},
  title        = {Vulnerability Analysis, Intrusion Detection and Privacy Preservation
                  of Modern Communication Systems},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {4},
  number       = {12},
  pages        = {e1},
  year         = {2017},
  url          = {https://doi.org/10.4108/eai.28-12-2017.153514},
  doi          = {10.4108/EAI.28-12-2017.153514},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/ZhuJM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics