BibTeX records: George Theodorakopoulos

download as .bib file

@article{DBLP:journals/iotj/AnthiWSTB19,
  author    = {Eirini Anthi and
               Lowri Williams and
               Malgorzata Slowinska and
               George Theodorakopoulos and
               Pete Burnap},
  title     = {A Supervised Intrusion Detection System for Smart Home IoT Devices},
  journal   = {{IEEE} Internet of Things Journal},
  volume    = {6},
  number    = {5},
  pages     = {9042--9053},
  year      = {2019},
  url       = {https://doi.org/10.1109/JIOT.2019.2926365},
  doi       = {10.1109/JIOT.2019.2926365},
  timestamp = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iotj/AnthiWSTB19},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-12774,
  author    = {Sasi Kumar Murakonda and
               Reza Shokri and
               George Theodorakopoulos},
  title     = {Ultimate Power of Inference Attacks: Privacy Risks of High-Dimensional
               Models},
  journal   = {CoRR},
  volume    = {abs/1905.12774},
  year      = {2019},
  url       = {http://arxiv.org/abs/1905.12774},
  archivePrefix = {arXiv},
  eprint    = {1905.12774},
  timestamp = {Mon, 03 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1905-12774},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnthiARTB18,
  author    = {Eirini Anthi and
               Shazaib Ahmad and
               Omer Rana and
               George Theodorakopoulos and
               Pete Burnap},
  title     = {EclipseIoT: {A} secure and adaptive hub for the Internet of Things},
  journal   = {Computers {\&} Security},
  volume    = {78},
  pages     = {477--490},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.07.016},
  doi       = {10.1016/j.cose.2018.07.016},
  timestamp = {Wed, 03 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/AnthiARTB18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SinghTMA18,
  author    = {Rajkarn Singh and
               George Theodorakopoulos and
               Mahesh K. Marina and
               Myrto Arapinis},
  title     = {On Choosing Between Privacy Preservation Mechanisms for Mobile Trajectory
               Data Sharing},
  booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
               2018, Beijing, China, May 30 - June 1, 2018},
  pages     = {1--9},
  year      = {2018},
  crossref  = {DBLP:conf/cns/2018},
  url       = {https://doi.org/10.1109/CNS.2018.8433178},
  doi       = {10.1109/CNS.2018.8433178},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/SinghTMA18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecpods/PratomoBT18,
  author    = {Baskoro Adi Pratomo and
               Pete Burnap and
               George Theodorakopoulos},
  title     = {Unsupervised Approach for Detecting Low Rate Attacks on Network Traffic
               with Autoencoder},
  booktitle = {2018 International Conference on Cyber Security and Protection of
               Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom,
               June 11-12, 2018},
  pages     = {1--8},
  year      = {2018},
  crossref  = {DBLP:conf/cybersecpods/2018},
  url       = {https://doi.org/10.1109/CyberSecPODS.2018.8560678},
  doi       = {10.1109/CyberSecPODS.2018.8560678},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cybersecpods/PratomoBT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ficloud/SubahiT18,
  author    = {Alanoud Subahi and
               George Theodorakopoulos},
  title     = {Ensuring Compliance of IoT Devices with Their Privacy Policy Agreement},
  booktitle = {6th {IEEE} International Conference on Future Internet of Things and
               Cloud, FiCloud 2018, Barcelona, Spain, August 6-8, 2018},
  pages     = {100--107},
  year      = {2018},
  crossref  = {DBLP:conf/ficloud/2018},
  url       = {https://doi.org/10.1109/FiCloud.2018.00022},
  doi       = {10.1109/FiCloud.2018.00022},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ficloud/SubahiT18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/MamaisT17,
  author    = {Stylianos S. Mamais and
               George Theodorakopoulos},
  title     = {Private and Secure Distribution of Targeted Advertisements to Mobile
               Phones},
  journal   = {Future Internet},
  volume    = {9},
  number    = {2},
  pages     = {16},
  year      = {2017},
  url       = {https://doi.org/10.3390/fi9020016},
  doi       = {10.3390/fi9020016},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fi/MamaisT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fi/MamaisT17a,
  author    = {Stylianos S. Mamais and
               George Theodorakopoulos},
  title     = {Behavioural Verification: Preventing Report Fraud in Decentralized
               Advert Distribution Systems},
  journal   = {Future Internet},
  volume    = {9},
  number    = {4},
  pages     = {88},
  year      = {2017},
  url       = {https://doi.org/10.3390/fi9040088},
  doi       = {10.3390/fi9040088},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/fi/MamaisT17a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ShokriTT17,
  author    = {Reza Shokri and
               George Theodorakopoulos and
               Carmela Troncoso},
  title     = {Privacy Games Along Location Traces: {A} Game-Theoretic Framework
               for Optimizing Location Privacy},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {4},
  pages     = {11:1--11:31},
  year      = {2017},
  url       = {https://doi.org/10.1145/3009908},
  doi       = {10.1145/3009908},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/ShokriTT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iissc/AnthiJRT17,
  author    = {Eirini Anthi and
               Amir Javed and
               Omer Rana and
               George Theodorakopoulos},
  title     = {Secure Data Sharing and Analysis in Cloud-Based Energy Management
               Systems},
  booktitle = {Cloud Infrastructures, Services, and IoT Systems for Smart Cities
               - Second {EAI} International Conference, {IISSC} 2017 and CN4IoT 2017,
               Brindisi, Italy, April 20-21, 2017, Proceedings},
  pages     = {228--242},
  year      = {2017},
  crossref  = {DBLP:conf/iissc/2017},
  url       = {https://doi.org/10.1007/978-3-319-67636-4\_24},
  doi       = {10.1007/978-3-319-67636-4\_24},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iissc/AnthiJRT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/percom/KatsomallosLPT17,
  author    = {Manos Katsomallos and
               Spyros Lalis and
               Thanasis Papaioannou and
               George Theodorakopoulos},
  title     = {An open framework for flexible plug-in privacy mechanisms in crowdsensing
               applications},
  booktitle = {2017 {IEEE} International Conference on Pervasive Computing and Communications
               Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March
               13-17, 2017},
  pages     = {237--242},
  year      = {2017},
  crossref  = {DBLP:conf/percom/2017w},
  url       = {https://doi.org/10.1109/PERCOMW.2017.7917564},
  doi       = {10.1109/PERCOMW.2017.7917564},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/percom/KatsomallosLPT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AnthiT17,
  author    = {Eirini Anthi and
               George Theodorakopoulos},
  title     = {Sensitive Data in Smartphone Applications: Where Does It Go? Can It
               Be Intercepted?},
  booktitle = {Security and Privacy in Communication Networks - SecureComm 2017 International
               Workshops, {ATCS} and SePrIoT, Niagara Falls, ON, Canada, October
               22-25, 2017, Proceedings},
  pages     = {301--319},
  year      = {2017},
  crossref  = {DBLP:conf/securecomm/2017w},
  url       = {https://doi.org/10.1007/978-3-319-78816-6\_21},
  doi       = {10.1007/978-3-319-78816-6\_21},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/AnthiT17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/TsoukaneriTLM16,
  author    = {Galini Tsoukaneri and
               George Theodorakopoulos and
               Hugh Leather and
               Mahesh K. Marina},
  title     = {On the Inference of User Paths from Anonymized Mobility Data},
  booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  pages     = {199--213},
  year      = {2016},
  crossref  = {DBLP:conf/eurosp/2016},
  url       = {https://doi.org/10.1109/EuroSP.2016.25},
  doi       = {10.1109/EuroSP.2016.25},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/TsoukaneriTLM16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/Theodorakopoulos15,
  author    = {George Theodorakopoulos},
  title     = {The Same-Origin Attack against Location Privacy},
  booktitle = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015},
  pages     = {49--53},
  year      = {2015},
  crossref  = {DBLP:conf/wpes/2015},
  url       = {https://doi.org/10.1145/2808138.2808150},
  doi       = {10.1145/2808138.2808150},
  timestamp = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/Theodorakopoulos15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gamesec/2015,
  editor    = {M. H. R. Khouzani and
               Emmanouil A. Panaousis and
               George Theodorakopoulos},
  title     = {Decision and Game Theory for Security - 6th International Conference,
               GameSec 2015, London, UK, November 4-5, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9406},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-25594-1},
  doi       = {10.1007/978-3-319-25594-1},
  isbn      = {978-3-319-25593-4},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gamesec/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ShokriTPKH14,
  author    = {Reza Shokri and
               George Theodorakopoulos and
               Panos Papadimitratos and
               Ehsan Kazemi and
               Jean{-}Pierre Hubaux},
  title     = {Hiding in the Mobile Crowd: LocationPrivacy through Collaboration},
  journal   = {{IEEE} Trans. Dependable Sec. Comput.},
  volume    = {11},
  number    = {3},
  pages     = {266--279},
  year      = {2014},
  url       = {https://doi.org/10.1109/TDSC.2013.57},
  doi       = {10.1109/TDSC.2013.57},
  timestamp = {Wed, 18 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tdsc/ShokriTPKH14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/saso/BagnoliGPSKT14,
  author    = {Franco Bagnoli and
               Andrea Guazzini and
               Giovanna Pacini and
               Ioannis Stavrakakis and
               Evangelia Kokolaki and
               George Theodorakopoulos},
  title     = {Cognitive Structure of Collective Awareness Platforms},
  booktitle = {Eighth {IEEE} International Conference on Self-Adaptive and Self-Organizing
               Systems Workshops, {SASOW} 2014, London, United Kingdom, September
               8-12, 2014},
  pages     = {96--101},
  year      = {2014},
  crossref  = {DBLP:conf/saso/2014w},
  url       = {https://doi.org/10.1109/SASOW.2014.38},
  doi       = {10.1109/SASOW.2014.38},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/saso/BagnoliGPSKT14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/Theodorakopoulos14,
  author    = {George Theodorakopoulos and
               Reza Shokri and
               Carmela Troncoso and
               Jean{-}Pierre Hubaux and
               Jean{-}Yves Le Boudec},
  title     = {Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for
               Location-Based Services},
  booktitle = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
               {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  pages     = {73--82},
  year      = {2014},
  crossref  = {DBLP:conf/wpes/2014},
  url       = {https://doi.org/10.1145/2665943.2665946},
  doi       = {10.1145/2665943.2665946},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/Theodorakopoulos14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/TheodorakopoulosSTHB14,
  author    = {George Theodorakopoulos and
               Reza Shokri and
               Carmela Troncoso and
               Jean{-}Pierre Hubaux and
               Jean{-}Yves Le Boudec},
  title     = {Prolonging the Hide-and-Seek Game: Optimal Trajectory Privacy for
               Location-Based Services},
  journal   = {CoRR},
  volume    = {abs/1409.1716},
  year      = {2014},
  url       = {http://arxiv.org/abs/1409.1716},
  archivePrefix = {arXiv},
  eprint    = {1409.1716},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/TheodorakopoulosSTHB14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tac/TheodorakopoulosBB13,
  author    = {George Theodorakopoulos and
               Jean{-}Yves Le Boudec and
               John S. Baras},
  title     = {Selfish Response to Epidemic Propagation},
  journal   = {{IEEE} Trans. Automat. Contr.},
  volume    = {58},
  number    = {2},
  pages     = {363--376},
  year      = {2013},
  url       = {https://doi.org/10.1109/TAC.2012.2209949},
  doi       = {10.1109/TAC.2012.2209949},
  timestamp = {Thu, 08 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/tac/TheodorakopoulosBB13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/PetriPRT13,
  author    = {Ioan Petri and
               Magdalena Punceva and
               Omer F. Rana and
               George Theodorakopoulos},
  title     = {Broker Emergence in Social Clouds},
  booktitle = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa
               Clara, CA, USA, June 28 - July 3, 2013},
  pages     = {669--676},
  year      = {2013},
  crossref  = {DBLP:conf/IEEEcloud/2013},
  url       = {https://doi.org/10.1109/CLOUD.2013.38},
  doi       = {10.1109/CLOUD.2013.38},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcloud/PetriPRT13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ShokriTTHB12,
  author    = {Reza Shokri and
               George Theodorakopoulos and
               Carmela Troncoso and
               Jean{-}Pierre Hubaux and
               Jean{-}Yves Le Boudec},
  title     = {Protecting location privacy: optimal strategy against localization
               attacks},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {617--627},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {https://doi.org/10.1145/2382196.2382261},
  doi       = {10.1145/2382196.2382261},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ShokriTTHB12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/RistanovicTB12,
  author    = {Nikodin Ristanovic and
               George Theodorakopoulos and
               Jean{-}Yves Le Boudec},
  title     = {Traps and pitfalls of using contact traces in performance studies
               of opportunistic networks},
  booktitle = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
               25-30, 2012},
  pages     = {1377--1385},
  year      = {2012},
  crossref  = {DBLP:conf/infocom/2012},
  url       = {https://doi.org/10.1109/INFCOM.2012.6195502},
  doi       = {10.1109/INFCOM.2012.6195502},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/RistanovicTB12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/ShokriPTH11,
  author    = {Reza Shokri and
               Panos Papadimitratos and
               George Theodorakopoulos and
               Jean{-}Pierre Hubaux},
  title     = {Collaborative Location Privacy},
  booktitle = {{IEEE} 8th International Conference on Mobile Adhoc and Sensor Systems,
               {MASS} 2011, Valencia, Spain, October 17-22, 2011},
  pages     = {500--509},
  year      = {2011},
  crossref  = {DBLP:conf/mass/2011},
  url       = {https://doi.org/10.1109/MASS.2011.55},
  doi       = {10.1109/MASS.2011.55},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mass/ShokriPTH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/ShokriTDHB11,
  author    = {Reza Shokri and
               George Theodorakopoulos and
               George Danezis and
               Jean{-}Pierre Hubaux and
               Jean{-}Yves Le Boudec},
  title     = {Quantifying Location Privacy: The Case of Sporadic Location Exposure},
  booktitle = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
               2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  pages     = {57--76},
  year      = {2011},
  crossref  = {DBLP:conf/pet/2011},
  url       = {https://doi.org/10.1007/978-3-642-22263-4\_4},
  doi       = {10.1007/978-3-642-22263-4\_4},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/ShokriTDHB11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/ShokriTBH11,
  author    = {Reza Shokri and
               George Theodorakopoulos and
               Jean{-}Yves Le Boudec and
               Jean{-}Pierre Hubaux},
  title     = {Quantifying Location Privacy},
  booktitle = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  pages     = {247--262},
  year      = {2011},
  crossref  = {DBLP:conf/sp/2011},
  url       = {https://doi.org/10.1109/SP.2011.18},
  doi       = {10.1109/SP.2011.18},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/ShokriTBH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/synthesis/2010Baras,
  author    = {John S. Baras and
               George Theodorakopoulos},
  title     = {Path Problems in Networks},
  series    = {Synthesis Lectures on Communication Networks},
  publisher = {Morgan {\&} Claypool Publishers},
  year      = {2010},
  url       = {https://doi.org/10.2200/S00245ED1V01Y201001CNT003},
  doi       = {10.2200/S00245ED1V01Y201001CNT003},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/series/synthesis/2010Baras},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1010-0609,
  author    = {George Theodorakopoulos and
               Jean{-}Yves Le Boudec and
               John S. Baras},
  title     = {Selfish Response to Epidemic Propagation},
  journal   = {CoRR},
  volume    = {abs/1010.0609},
  year      = {2010},
  url       = {http://arxiv.org/abs/1010.0609},
  archivePrefix = {arXiv},
  eprint    = {1010.0609},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1010-0609},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mobicom/RistanovicPTHB09,
  author    = {Nikodin Ristanovic and
               Panos Papadimitratos and
               George Theodorakopoulos and
               Jean{-}Pierre Hubaux and
               Jean{-}Yves Le Boudec},
  title     = {Adaptive message authentication for vehicular networks},
  booktitle = {Proceedings of the Sixth International Workshop on Vehicular Ad Hoc
               Networks, {VANET} 2009, Beijing, China, September 25, 2009},
  pages     = {121--122},
  year      = {2009},
  crossref  = {DBLP:conf/mobicom/2009vanet},
  url       = {https://doi.org/10.1145/1614269.1614291},
  doi       = {10.1145/1614269.1614291},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/mobicom/RistanovicPTHB09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/recsys/ShokriPTH09,
  author    = {Reza Shokri and
               Pedram Pedarsani and
               George Theodorakopoulos and
               Jean{-}Pierre Hubaux},
  title     = {Preserving privacy in collaborative filtering through distributed
               aggregation of offline profiles},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Recommender Systems, RecSys
               2009, New York, NY, USA, October 23-25, 2009},
  pages     = {157--164},
  year      = {2009},
  crossref  = {DBLP:conf/recsys/2009},
  url       = {https://doi.org/10.1145/1639714.1639741},
  doi       = {10.1145/1639714.1639741},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/recsys/ShokriPTH09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/TheodorakopoulosB08,
  author    = {George Theodorakopoulos and
               John S. Baras},
  title     = {Game Theoretic Modeling of Malicious Users in Collaborative Networks},
  journal   = {{IEEE} Journal on Selected Areas in Communications},
  volume    = {26},
  number    = {7},
  pages     = {1317--1327},
  year      = {2008},
  url       = {https://doi.org/10.1109/JSAC.2008.080928},
  doi       = {10.1109/JSAC.2008.080928},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jsac/TheodorakopoulosB08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infocom/TheodorakopoulosB07,
  author    = {George Theodorakopoulos and
               John S. Baras},
  title     = {Malicious Users in Unstructured Networks},
  booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
               Joint Conference of the {IEEE} Computer and Communications Societies,
               6-12 May 2007, Anchorage, Alaska, {USA}},
  pages     = {884--891},
  year      = {2007},
  crossref  = {DBLP:conf/infocom/2007},
  url       = {https://doi.org/10.1109/INFCOM.2007.108},
  doi       = {10.1109/INFCOM.2007.108},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/TheodorakopoulosB07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsac/TheodorakopoulosB06,
  author    = {George Theodorakopoulos and
               John S. Baras},
  title     = {On trust models and trust evaluation metrics for ad hoc networks},
  journal   = {{IEEE} Journal on Selected Areas in Communications},
  volume    = {24},
  number    = {2},
  pages     = {318--328},
  year      = {2006},
  url       = {https://doi.org/10.1109/JSAC.2005.861390},
  doi       = {10.1109/JSAC.2005.861390},
  timestamp = {Tue, 06 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jsac/TheodorakopoulosB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/TheodorakopoulosB06,
  author    = {George Theodorakopoulos and
               John S. Baras},
  title     = {A Game for Ad Hoc Network Connectivity in the Presence of Malicious
               Users},
  booktitle = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
               '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  year      = {2006},
  crossref  = {DBLP:conf/globecom/2006},
  url       = {https://doi.org/10.1109/GLOCOM.2006.272},
  doi       = {10.1109/GLOCOM.2006.272},
  timestamp = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/TheodorakopoulosB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/TheodorakopoulosB06,
  author    = {George Theodorakopoulos and
               John S. Baras},
  title     = {Enhancing Benign User Cooperation in the Presence of Malicious Adversaries
               in Ad Hoc Networks},
  booktitle = {Second International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
               2, 2006 - September 1, 2006},
  pages     = {1--6},
  year      = {2006},
  crossref  = {DBLP:conf/securecomm/2006},
  url       = {https://doi.org/10.1109/SECCOMW.2006.359557},
  doi       = {10.1109/SECCOMW.2006.359557},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/TheodorakopoulosB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ws/TheodorakopoulosB04,
  author    = {George Theodorakopoulos and
               John S. Baras},
  title     = {Trust evaluation in ad-hoc networks},
  booktitle = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia,
               PA, USA, October 1, 2004},
  pages     = {1--10},
  year      = {2004},
  crossref  = {DBLP:conf/ws/2004},
  url       = {https://doi.org/10.1145/1023646.1023648},
  doi       = {10.1145/1023646.1023648},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ws/TheodorakopoulosB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cns/2018,
  title     = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
               2018, Beijing, China, May 30 - June 1, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8410986/proceeding},
  isbn      = {978-1-5386-4586-4},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cns/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersecpods/2018,
  title     = {2018 International Conference on Cyber Security and Protection of
               Digital Services, Cyber Security 2018, Glasgow, Scotland, United Kingdom,
               June 11-12, 2018},
  publisher = {{IEEE}},
  year      = {2018},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8537418/proceeding},
  isbn      = {978-1-5386-4683-0},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cybersecpods/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ficloud/2018,
  editor    = {Muhammad Younas and
               Jules Pagna Disso},
  title     = {6th {IEEE} International Conference on Future Internet of Things and
               Cloud, FiCloud 2018, Barcelona, Spain, August 6-8, 2018},
  publisher = {{IEEE} Computer Society},
  year      = {2018},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/8457543/proceeding},
  isbn      = {978-1-5386-7503-8},
  timestamp = {Wed, 16 Oct 2019 14:14:57 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ficloud/2018},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iissc/2017,
  editor    = {Antonella Longo and
               Marco Zappatore and
               Massimo Villari and
               Omer F. Rana and
               Dario Bruneo and
               Rajiv Ranjan and
               Maria Fazio and
               Philippe Massonet},
  title     = {Cloud Infrastructures, Services, and IoT Systems for Smart Cities
               - Second {EAI} International Conference, {IISSC} 2017 and CN4IoT 2017,
               Brindisi, Italy, April 20-21, 2017, Proceedings},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {189},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-67636-4},
  doi       = {10.1007/978-3-319-67636-4},
  isbn      = {978-3-319-67635-7},
  timestamp = {Wed, 15 Aug 2018 17:51:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iissc/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/percom/2017w,
  title     = {2017 {IEEE} International Conference on Pervasive Computing and Communications
               Workshops, PerCom Workshops 2017, Kona, Big Island, HI, USA, March
               13-17, 2017},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7911894/proceeding},
  isbn      = {978-1-5090-4338-5},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/percom/2017w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2017w,
  editor    = {Xiaodong Lin and
               Ali Ghorbani and
               Kui Ren and
               Sencun Zhu and
               Aiqing Zhang},
  title     = {Security and Privacy in Communication Networks - SecureComm 2017 International
               Workshops, {ATCS} and SePrIoT, Niagara Falls, ON, Canada, October
               22-25, 2017, Proceedings},
  series    = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
               and Telecommunications Engineering},
  volume    = {239},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78816-6},
  doi       = {10.1007/978-3-319-78816-6},
  isbn      = {978-3-319-78815-9},
  timestamp = {Mon, 07 May 2018 13:22:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2017w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurosp/2016,
  title     = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2016, Saarbr{\"{u}}cken, Germany, March 21-24, 2016},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7467055/proceeding},
  isbn      = {978-1-5090-1751-5},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/eurosp/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2015,
  editor    = {Indrajit Ray and
               Nicholas Hopper and
               Rob Jansen},
  title     = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808138},
  doi       = {10.1145/2808138},
  isbn      = {978-1-4503-3820-2},
  timestamp = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/saso/2014w,
  title     = {Eighth {IEEE} International Conference on Self-Adaptive and Self-Organizing
               Systems Workshops, {SASOW} 2014, London, United Kingdom, September
               8-12, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/7055964/proceeding},
  isbn      = {978-1-4799-6378-2},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/saso/2014w},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wpes/2014,
  editor    = {Gail{-}Joon Ahn and
               Anupam Datta},
  title     = {Proceedings of the 13th Workshop on Privacy in the Electronic Society,
               {WPES} 2014, Scottsdale, AZ, USA, November 3, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {http://dl.acm.org/citation.cfm?id=2665943},
  isbn      = {978-1-4503-3148-7},
  timestamp = {Fri, 20 Mar 2015 16:30:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wpes/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/IEEEcloud/2013,
  title     = {2013 {IEEE} Sixth International Conference on Cloud Computing, Santa
               Clara, CA, USA, June 28 - July 3, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6596015/proceeding},
  isbn      = {978-0-7695-5028-2},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/IEEEcloud/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2012,
  editor    = {Albert G. Greenberg and
               Kazem Sohraby},
  title     = {Proceedings of the {IEEE} {INFOCOM} 2012, Orlando, FL, USA, March
               25-30, 2012},
  publisher = {{IEEE}},
  year      = {2012},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6189419/proceeding},
  isbn      = {978-1-4673-0773-4},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mass/2011,
  title     = {{IEEE} 8th International Conference on Mobile Adhoc and Sensor Systems,
               {MASS} 2011, Valencia, Spain, October 17-22, 2011},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/6075051/proceeding},
  isbn      = {978-1-4577-1345-3},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mass/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pet/2011,
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Nicholas Hopper},
  title     = {Privacy Enhancing Technologies - 11th International Symposium, {PETS}
               2011, Waterloo, ON, Canada, July 27-29, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6794},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22263-4},
  doi       = {10.1007/978-3-642-22263-4},
  isbn      = {978-3-642-22262-7},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pet/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sp/2011,
  title     = {32nd {IEEE} Symposium on Security and Privacy, S{\&}P 2011, 22-25
               May 2011, Berkeley, California, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/5955408/proceeding},
  isbn      = {978-1-4577-0147-4},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sp/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/mobicom/2009vanet,
  editor    = {Rajeev Shorey and
               Andr{\'{e}} Weimerskirch and
               Daniel Jiang and
               Martin Mauve},
  title     = {Proceedings of the Sixth International Workshop on Vehicular Ad Hoc
               Networks, {VANET} 2009, Beijing, China, September 25, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-737-0},
  timestamp = {Wed, 27 Apr 2011 20:36:03 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/mobicom/2009vanet},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/recsys/2009,
  editor    = {Lawrence D. Bergman and
               Alexander Tuzhilin and
               Robin D. Burke and
               Alexander Felfernig and
               Lars Schmidt{-}Thieme},
  title     = {Proceedings of the 2009 {ACM} Conference on Recommender Systems, RecSys
               2009, New York, NY, USA, October 23-25, 2009},
  publisher = {{ACM}},
  year      = {2009},
  isbn      = {978-1-60558-435-5},
  timestamp = {Mon, 11 Jan 2010 12:53:05 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/recsys/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infocom/2007,
  title     = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications,
               Joint Conference of the {IEEE} Computer and Communications Societies,
               6-12 May 2007, Anchorage, Alaska, {USA}},
  publisher = {{IEEE}},
  year      = {2007},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4215581/proceeding},
  isbn      = {1-4244-1046-0},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/infocom/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/globecom/2006,
  title     = {Proceedings of the Global Telecommunications Conference, 2006. {GLOBECOM}
               '06, San Francisco, CA, USA, 27 November - 1 December 2006},
  publisher = {{IEEE}},
  year      = {2006},
  timestamp = {Tue, 30 Oct 2007 09:36:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/globecom/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/securecomm/2006,
  title     = {Second International Conference on Security and Privacy in Communication
               Networks and the Workshops, SecureComm 2006, Baltimore, MD, USA, August
               2, 2006 - September 1, 2006},
  publisher = {{IEEE}},
  year      = {2006},
  url       = {https://ieeexplore.ieee.org/xpl/conhome/4198788/proceeding},
  isbn      = {1-4244-0423-1},
  timestamp = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/securecomm/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ws/2004,
  editor    = {Markus Jakobsson and
               Adrian Perrig},
  title     = {Proceedings of the 2004 {ACM} Workshop on Wireless Security, Philadelphia,
               PA, USA, October 1, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-925-X},
  timestamp = {Thu, 20 Jan 2005 13:57:47 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ws/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics