BibTeX records: Simeon Xenitellis

download as .bib file

@phdthesis{DBLP:phd/ethos/Xenitellis11,
  author       = {Simeon Xenitellis},
  title        = {On the identification of security vulnerabilities},
  school       = {Royal Holloway, University of London, {UK}},
  year         = {2011},
  url          = {https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.538785},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Xenitellis11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/Xenitellis03,
  author       = {Simeon Xenitellis},
  title        = {Identifying security vulnerabilities through input flow tracing and
                  analysis},
  journal      = {Inf. Manag. Comput. Secur.},
  volume       = {11},
  number       = {4},
  pages        = {195--199},
  year         = {2003},
  url          = {https://doi.org/10.1108/09685220310489562},
  doi          = {10.1108/09685220310489562},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/imcs/Xenitellis03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/XenitellisJ03,
  author       = {Simeon Xenitellis and
                  Pita Jarupunphol},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {Security Vulnerabilities in the Trust-List {PKI}},
  booktitle    = {Proceedings of the International Conference on Security and Management,
                  {SAM} '03, June 23 - 26, 2003, Las Vegas, Nevada, USA, Volume 1},
  pages        = {72--77},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Wed, 06 Dec 2006 10:55:26 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/XenitellisJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Xenitellis02,
  author       = {Simeon Xenitellis},
  editor       = {Adeeb Ghonaimy and
                  Mahmoud T. El{-}Hadidi and
                  Heba Kamal Aslan},
  title        = {Security Vulnerabilities in Event-Driven Systems},
  booktitle    = {Security in the Information Society: Visions and Perspectives, {IFIP}
                  {TC11} 17\({}^{\mbox{th}}\) International Conference on Information
                  Security (SEC2002), May 7-9, 2002, Cairo, Egypt},
  series       = {{IFIP} Conference Proceedings},
  volume       = {214},
  pages        = {147--160},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Fri, 11 Feb 2005 12:53:42 +0100},
  biburl       = {https://dblp.org/rec/conf/sec/Xenitellis02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/MarkantonakisX99,
  author       = {Constantinos Markantonakis and
                  Simeon Xenitellis},
  editor       = {Bart Preneel},
  title        = {Implementing a Secure Log File Download Manager for the Java Card},
  booktitle    = {Secure Information Networks: Communications and Multimedia Security,
                  {IFIP} {TC6/TC11} Joint Working Conference on Communications and Multimedia
                  Security {(CMS} '99), September 20-21, 1999, Leuven, Belgium},
  series       = {{IFIP} Conference Proceedings},
  volume       = {152},
  pages        = {143--162},
  publisher    = {Kluwer},
  year         = {1999},
  timestamp    = {Mon, 14 Oct 2002 12:00:15 +0200},
  biburl       = {https://dblp.org/rec/conf/cms/MarkantonakisX99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics