default search action
Search dblp for Publications
export results for "stream:streams/series/ais:"
@book{DBLP:series/ais/FernandezOP24, author = {Javier Hernandez Fernandez and Aymen Omri and Roberto Di Pietro}, title = {Physical Layer Security in Power Line Communications - Fundamentals, Models and Applications}, series = {Advances in Information Security}, volume = {108}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57349-1}, doi = {10.1007/978-3-031-57349-1}, isbn = {978-3-031-57348-4}, timestamp = {Wed, 17 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FernandezOP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Moller23, author = {Dietmar P. F. M{\"{o}}ller}, title = {Guide to Cybersecurity in Digital Transformation - Trends, Methods, Technologies, Applications and Best Practices}, series = {Advances in Information Security}, volume = {103}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-26845-8}, doi = {10.1007/978-3-031-26845-8}, isbn = {978-3-031-26844-1}, timestamp = {Sun, 14 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Moller23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Montasari23, author = {Reza Montasari}, title = {Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in {US} and {UK} National Cybersecurity}, series = {Advances in Information Security}, volume = {101}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-21920-7}, doi = {10.1007/978-3-031-21920-7}, isbn = {978-3-031-21919-1}, timestamp = {Mon, 16 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Montasari23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/KarbabDDM21, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, title = {Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence}, series = {Advances in Information Security}, volume = {86}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-74664-3}, doi = {10.1007/978-3-030-74664-3}, isbn = {978-3-030-74663-6}, timestamp = {Mon, 19 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KarbabDDM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/PietroRCC21, author = {Roberto Di Pietro and Simone Raponi and Maurantonio Caprolu and Stefano Cresci}, title = {New Dimensions of Information Warfare}, series = {Advances in Information Security}, volume = {84}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-60618-3}, doi = {10.1007/978-3-030-60618-3}, isbn = {978-3-030-60617-6}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/PietroRCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Ryan21, author = {Matthew Ryan}, title = {Ransomware Revolution: The Rise of a Prodigious Cyber Threat}, series = {Advances in Information Security}, volume = {85}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-66583-8}, doi = {10.1007/978-3-030-66583-8}, isbn = {978-3-030-66582-1}, timestamp = {Mon, 08 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Ryan21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/AlrabaeeDSWYRNMHH20, author = {Saed Alrabaee and Mourad Debbabi and Paria Shirani and Lingyu Wang and Amr M. Youssef and Ashkan Rahimian and Lina Nouh and Djedjiga Mouheb and He Huang and Aiman Hanna}, title = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting}, series = {Advances in Information Security}, volume = {78}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-34238-8}, doi = {10.1007/978-3-030-34238-8}, isbn = {978-3-030-34237-1}, timestamp = {Fri, 06 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/AlrabaeeDSWYRNMHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/DingPS20, author = {Jintai Ding and Albrecht Petzoldt and Dieter S. Schmidt}, title = {Multivariate Public Key Cryptosystems, Second Edition}, series = {Advances in Information Security}, volume = {80}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-1-0716-0987-3}, doi = {10.1007/978-1-0716-0987-3}, isbn = {978-1-0716-0985-9}, timestamp = {Sat, 25 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/DingPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Omondi20, author = {Amos R. Omondi}, title = {Cryptography Arithmetic - Algorithms and Hardware Architectures}, series = {Advances in Information Security}, volume = {77}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-34142-8}, doi = {10.1007/978-3-030-34142-8}, isbn = {978-3-030-34141-1}, timestamp = {Mon, 03 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Omondi20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/ZhuX20, author = {Quanyan Zhu and Zhiheng Xu}, title = {Cross-Layer Design for Secure and Resilient Cyber-Physical Systems - {A} Decision and Game Theoretic Approach, 3}, series = {Advances in Information Security}, volume = {81}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-60251-2}, doi = {10.1007/978-3-030-60251-2}, isbn = {978-3-030-60250-5}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/ZhuX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BelloP20, author = {Gabriel Bello and Alfredo J. Perez}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {On the Application of Financial Security Standards in Blockchain Platforms}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {247--267}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_13}, doi = {10.1007/978-3-030-38181-3\_13}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BelloP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ClickSPSD20, author = {Kelly Click and Amritraj Singh and Reza M. Parizi and Gautam Srivastava and Ali Dehghantanha}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Immutable and Secure {IP} Address Protection Using Blockchain}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {233--246}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_12}, doi = {10.1007/978-3-030-38181-3\_12}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/ClickSPSD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/EkramifardASDP20, author = {Ala Ekramifard and Haleh Amintoosi and Amin Hosseini Seno and Ali Dehghantanha and Reza M. Parizi}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {A Systematic Literature Review of Integration of Blockchain and Artificial Intelligence}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {147--160}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_8}, doi = {10.1007/978-3-030-38181-3\_8}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/EkramifardASDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/IslamK20, author = {Md. Nazmul Islam and Sandip Kundu}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {33--50}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_3}, doi = {10.1007/978-3-030-38181-3\_3}, timestamp = {Sun, 19 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/IslamK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KumarT20, author = {Randhir Kumar and Rakesh Tripathi}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Secure Healthcare Framework Using Blockchain and Public Key Cryptography}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {185--202}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_10}, doi = {10.1007/978-3-030-38181-3\_10}, timestamp = {Sun, 19 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KumarT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LiuHZPK20, author = {Liyuan Liu and Meng Han and Yiyun Zhou and Reza M. Parizi and Mohammed Korayem}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Blockchain-Based Certification for Education, Employment, and Skill with Incentive Mechanism}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {269--290}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_14}, doi = {10.1007/978-3-030-38181-3\_14}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LiuHZPK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MohNMK20, author = {Melody Moh and David Nguyen and Teng{-}Sheng Moh and Brian Khieu}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant Distributed Consensus}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {69--97}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_5}, doi = {10.1007/978-3-030-38181-3\_5}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/MohNMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/OmarB20, author = {Ahmad Sghaier Omar and Otman Basir}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Capability-Based Non-fungible Tokens Approach for a Decentralized {AAA} Framework in IoT}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {7--31}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_2}, doi = {10.1007/978-3-030-38181-3\_2}, timestamp = {Sun, 19 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/OmarB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PariziDAC20, author = {Reza M. Parizi and Ali Dehghantanha and Amin Azmoodeh and Kim{-}Kwang Raymond Choo}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Blockchain in Cybersecurity Realm: An Overview}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {1--5}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_1}, doi = {10.1007/978-3-030-38181-3\_1}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PariziDAC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RouzbahaniKDP20, author = {Hossein Mohammadi Rouzbahani and Hadis Karimipour and Ali Dehghantanha and Reza M. Parizi}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Blockchain Applications in Power Systems: {A} Bibliometric Analysis}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {129--145}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_7}, doi = {10.1007/978-3-030-38181-3\_7}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/RouzbahaniKDP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SinghPHDKC20, author = {Amritraj Singh and Reza M. Parizi and Meng Han and Ali Dehghantanha and Hadis Karimipour and Kim{-}Kwang Raymond Choo}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Public Blockchains Scalability: An Examination of Sharding and Segregated Witness}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {203--232}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_11}, doi = {10.1007/978-3-030-38181-3\_11}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SinghPHDKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SrivastavaPD20, author = {Gautam Srivastava and Reza M. Parizi and Ali Dehghantanha}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {The Future of Blockchain Technology in Healthcare Internet of Things Security}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {161--184}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_9}, doi = {10.1007/978-3-030-38181-3\_9}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/SrivastavaPD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/TibaPZDKC20, author = {Kevin Tiba and Reza M. Parizi and Qi Zhang and Ali Dehghantanha and Hadis Karimipour and Kim{-}Kwang Raymond Choo}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Secure Blockchain-Based Traffic Load Balancing Using Edge Computing and Reinforcement Learning}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {99--128}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_6}, doi = {10.1007/978-3-030-38181-3\_6}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/TibaPZDKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Worley0BOSAMM20, author = {Carl R. Worley and Lu Yu and Richard R. Brooks and Jon Oakley and Anthony Skjellum and Amani Altarawneh and Sai Medury and Ujan Mukhopadhyay}, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Scrybe: {A} Second-Generation Blockchain Technology with Lightweight Mining for Secure Provenance and Related Applications}, booktitle = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, pages = {51--67}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3\_4}, doi = {10.1007/978-3-030-38181-3\_4}, timestamp = {Sun, 19 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Worley0BOSAMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/79, editor = {Kim{-}Kwang Raymond Choo and Ali Dehghantanha and Reza M. Parizi}, title = {Blockchain Cybersecurity, Trust and Privacy}, series = {Advances in Information Security}, volume = {79}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38181-3}, doi = {10.1007/978-3-030-38181-3}, isbn = {978-3-030-38180-6}, timestamp = {Sun, 19 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/79.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/JiangWYLXZ19, author = {Jiaojiao Jiang and Sheng Wen and Shui Yu and Bo Liu and Yang Xiang and Wanlei Zhou}, title = {Malicious Attack Propagation and Source Identification}, series = {Advances in Information Security}, volume = {73}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-02179-5}, doi = {10.1007/978-3-030-02179-5}, isbn = {978-3-030-02178-8}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/JiangWYLXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/MajumdarMWTOAJPWD19, author = {Suryadipta Majumdar and Taous Madi and Yushun Wang and Azadeh Tabiban and Momen Oqaily and Amir Alimohammadifar and Yosr Jarraya and Makan Pourzandi and Lingyu Wang and Mourad Debbabi}, title = {Cloud Security Auditing}, series = {Advances in Information Security}, volume = {76}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-23128-6}, doi = {10.1007/978-3-030-23128-6}, isbn = {978-3-030-23127-9}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/MajumdarMWTOAJPWD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AmbassaKWM18, author = {Pacome L. Ambassa and Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {Inferring Private User Behaviour Based on Information Leakage}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {145--159}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_7}, doi = {10.1007/978-3-319-91427-5\_7}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AmbassaKWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GulW18, author = {Ammara Gul and Stephen D. Wolthusen}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {A Review on Attacks and Their Countermeasures in Power System State Estimation}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {9--28}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_2}, doi = {10.1007/978-3-319-91427-5\_2}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GulW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KayemMW18, author = {Anne V. D. M. Kayem and Christoph Meinel and Stephen D. Wolthusen}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {A Resilient Smart Micro-Grid Architecture for Resource Constrained Environments}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {71--101}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_5}, doi = {10.1007/978-3-319-91427-5\_5}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KayemMW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KayemWM18, author = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {Power Systems: {A} Matter of Security and Privacy}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {1--8}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_1}, doi = {10.1007/978-3-319-91427-5\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KayemWM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KishimotoYO18, author = {Hikaru Kishimoto and Naoto Yanai and Shingo Okamura}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {An Anonymous Authentication Protocol for the Smart Grid}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {29--52}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_3}, doi = {10.1007/978-3-319-91427-5\_3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/KishimotoYO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LimbasiyaA18, author = {Trupil Limbasiya and Aakriti Arya}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {Attacks on Authentication and Authorization Models in Smart Grid}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {53--70}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_4}, doi = {10.1007/978-3-319-91427-5\_4}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LimbasiyaA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MarufuKW18, author = {Anesu M. C. Marufu and Anne V. D. M. Kayem and Stephen D. Wolthusen}, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids}, booktitle = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, pages = {103--144}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5\_6}, doi = {10.1007/978-3-319-91427-5\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MarufuKW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/71, editor = {Anne V. D. M. Kayem and Stephen D. Wolthusen and Christoph Meinel}, title = {Smart Micro-Grid Systems Security and Privacy}, series = {Advances in Information Security}, volume = {71}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-91427-5}, doi = {10.1007/978-3-319-91427-5}, isbn = {978-3-319-91426-8}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/71.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/ZhuLZY17, author = {Tianqing Zhu and Gang Li and Wanlei Zhou and Philip S. Yu}, title = {Differential Privacy and Applications}, series = {Advances in Information Security}, volume = {69}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-62004-6}, doi = {10.1007/978-3-319-62004-6}, isbn = {978-3-319-62002-2}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ZhuLZY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Al-ShaerR16, author = {Ehab Al{-}Shaer and Mohammad Ashiqur Rahman}, title = {Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches}, series = {Advances in Information Security}, volume = {67}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-32871-3}, doi = {10.1007/978-3-319-32871-3}, isbn = {978-3-319-32870-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Al-ShaerR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/LiuW16, author = {Wen Ming Liu and Lingyu Wang}, title = {Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications}, series = {Advances in Information Security}, volume = {68}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-42644-0}, doi = {10.1007/978-3-319-42644-0}, isbn = {978-3-319-42642-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LiuW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Conti15, author = {Mauro Conti}, title = {Secure Wireless Sensor Networks - Threats and Solutions}, series = {Advances in Information Security}, volume = {65}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-1-4939-3460-7}, doi = {10.1007/978-1-4939-3460-7}, isbn = {978-1-4939-3458-4}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Conti15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/HeckmanSTST15, author = {Kristin E. Heckman and Frank J. Stech and Roshan K. Thomas and Ben S. Schmoker and Alexander W. Tsow}, title = {Cyber Denial, Deception and Counter Deception - {A} Framework for Supporting Active Cyber Defense}, series = {Advances in Information Security}, volume = {64}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25133-2}, doi = {10.1007/978-3-319-25133-2}, isbn = {978-3-319-25131-8}, timestamp = {Wed, 29 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/HeckmanSTST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Livraga15, author = {Giovanni Livraga}, title = {Protecting Privacy in Data Release}, series = {Advances in Information Security}, volume = {57}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16109-9}, doi = {10.1007/978-3-319-16109-9}, isbn = {978-3-319-16108-2}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Livraga15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Al-ShaerR15, author = {Ehab Al{-}Shaer and Mohammad Ashiqur Rahman}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Attribution, Temptation, and Expectation: {A} Formal Framework for Defense-by-Deception in Cyberwarfare}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {57--80}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_4}, doi = {10.1007/978-3-319-14039-1\_4}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Al-ShaerR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Ben-AsherG15, author = {Noam Ben{-}Asher and Cleotilde Gonzalez}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {CyberWar Game: {A} Paradigm for Understanding New Challenges of Cyber War}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {207--220}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_10}, doi = {10.1007/978-3-319-14039-1\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Ben-AsherG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Dumitras15, author = {Tudor Dumitras}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {265--285}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_13}, doi = {10.1007/978-3-319-14039-1\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Dumitras15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ElderLY15, author = {Robert J. Elder and Alexander H. Levis and Bahram Yousefi}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Alternatives to Cyber Warfare: Deterrence and Assurance}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {15--35}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_2}, doi = {10.1007/978-3-319-14039-1\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ElderLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GoelH15, author = {Sanjay Goel and Yuan Hong}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber War Games: Strategic Jostling Among Traditional Adversaries}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {1--13}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_1}, doi = {10.1007/978-3-319-14039-1\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GoelH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Hamilton15, author = {Samuel N. Hamilton}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Automated Adversary Profiling}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {141--149}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_7}, doi = {10.1007/978-3-319-14039-1\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Hamilton15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/HeckmanS15, author = {Kristin E. Heckman and Frank J. Stech}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber Counterdeception: How to Detect Denial {\&} Deception (D{\&}D)}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {103--140}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_6}, doi = {10.1007/978-3-319-14039-1\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/HeckmanS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KiekintveldLP15, author = {Christopher Kiekintveld and Viliam Lis{\'{y}} and Radek P{\'{\i}}bil}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {81--101}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_5}, doi = {10.1007/978-3-319-14039-1\_5}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KiekintveldLP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MarbleLMCAS15, author = {Julie L. Marble and William F. Lawless and Ranjeev Mittu and Joseph T. Coyne and Myriam Abramson and Ciara Sibley}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {The Human Factor in Cybersecurity: Robust {\&} Intelligent Defense}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {173--206}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_9}, doi = {10.1007/978-3-319-14039-1\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MarbleLMCAS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PaxtonRMH15, author = {Napoleon C. Paxton and Stephen Russell and Ira S. Moskowitz and Paul Hyden}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {A Survey of Community Detection Algorithms Based On Analysis-Intent}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {237--263}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_12}, doi = {10.1007/978-3-319-14039-1\_12}, timestamp = {Wed, 28 Mar 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PaxtonRMH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Prakash15, author = {B. Aditya Prakash}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Graph Mining for Cyber Security}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {287--306}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_14}, doi = {10.1007/978-3-319-14039-1\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Prakash15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PuzisE15, author = {Rami Puzis and Yuval Elovici}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Active Discovery of Hidden Profiles in Social Networks Using Malware}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {221--235}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_11}, doi = {10.1007/978-3-319-14039-1\_11}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PuzisE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RuefR15, author = {Andrew Ruef and Chris Rohlf}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Programming Language Theoretic Security in the Real World: {A} Mirage or the Future?}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {307--321}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_15}, doi = {10.1007/978-3-319-14039-1\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/RuefR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ShakarianSMP15, author = {Paulo Shakarian and Gerardo I. Simari and Geoffrey Moores and Simon Parsons}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber Attribution: An Argumentation-Based Approach}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {151--171}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_8}, doi = {10.1007/978-3-319-14039-1\_8}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ShakarianSMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SweeneyC15, author = {Patrick Sweeney and George Cybenko}, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Identifying and Exploiting the Cyber High Ground for Botnets}, booktitle = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, pages = {37--56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1\_3}, doi = {10.1007/978-3-319-14039-1\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SweeneyC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/56, editor = {Sushil Jajodia and Paulo Shakarian and V. S. Subrahmanian and Vipin Swarup and Cliff Wang}, title = {Cyber Warfare - Building the Scientific Foundation}, series = {Advances in Information Security}, volume = {56}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-14039-1}, doi = {10.1007/978-3-319-14039-1}, isbn = {978-3-319-14038-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/56.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/GenovesePS14, author = {Angelo Genovese and Vincenzo Piuri and Fabio Scotti}, title = {Touchless Palmprint Recognition Systems}, series = {Advances in Information Security}, volume = {60}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10365-5}, doi = {10.1007/978-3-319-10365-5}, isbn = {978-3-319-10364-8}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/GenovesePS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AlbaneseCJ14, author = {Massimiliano Albanese and Hasan {\c{C}}am and Sushil Jajodia}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Automated Cyber Situation Awareness Tools and Models for Improving Analyst Performance}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {47--60}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_3}, doi = {10.1007/978-3-319-10374-7\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AlbaneseCJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AlbaneseEJMPPSS14, author = {Massimiliano Albanese and Robert F. Erbacher and Sushil Jajodia and Cristian Molinaro and Fabio Persia and Antonio Picariello and Giancarlo Sperl{\`{\i}} and V. S. Subrahmanian}, editor = {Robinson E. Pino}, title = {Recognizing Unexplained Behavior in Network Traffic}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {39--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_3}, doi = {10.1007/978-1-4614-7597-2\_3}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AlbaneseEJMPPSS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AlbaneseJ14, author = {Massimiliano Albanese and Sushil Jajodia}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Formation of Awareness}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {47--62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_4}, doi = {10.1007/978-3-319-11391-3\_4}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AlbaneseJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Anderson14, author = {Gustave W. Anderson}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Trusted Computation Through Biologically Inspired Processes}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {75--84}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_5}, doi = {10.1007/978-3-319-10374-7\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Anderson14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AtaharyDT14, author = {Tanvir Atahary and Scott Douglass and Tarek M. Taha}, editor = {Robinson E. Pino}, title = {Hardware Accelerated Mining of Domain Knowledge}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {251--271}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_16}, doi = {10.1007/978-1-4614-7597-2\_16}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AtaharyDT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Berkovich14, author = {Simon Y. Berkovich}, editor = {Robinson E. Pino}, title = {Formation of Artificial and Natural Intelligence in Big Data Environment}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {189--203}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_12}, doi = {10.1007/978-1-4614-7597-2\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Berkovich14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Berkovich14a, author = {Simon Y. Berkovich}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Sustainability Problems and a Novelty in the Concept of Energy}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {119--133}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_8}, doi = {10.1007/978-3-319-10374-7\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Berkovich14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BlowersFFWCN14, author = {Misty K. Blowers and Stefan Fernandez and Brandon Froberg and Jonathan Williams and George Corbin and Kevin Nelson}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Data Mining in Cyber Operations}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {61--73}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_4}, doi = {10.1007/978-3-319-10374-7\_4}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BlowersFFWCN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BlowersW14, author = {Misty K. Blowers and Jonathan Williams}, editor = {Robinson E. Pino}, title = {Machine Learning Applied to Cyber Operations}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {155--175}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_10}, doi = {10.1007/978-1-4614-7597-2\_10}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BlowersW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CamMP14, author = {Hasan {\c{C}}am and Pierre A. Mouallem and Robinson E. Pino}, editor = {Robinson E. Pino}, title = {Alert Data Aggregation and Transmission Prioritization over Mobile Networks}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {205--220}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_13}, doi = {10.1007/978-1-4614-7597-2\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CamMP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ChengDLDSO14, author = {Yi Cheng and Julia Deng and Jason H. Li and Scott A. DeLoach and Anoop Singhal and Xinming Ou}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Metrics of Security}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {263--295}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_13}, doi = {10.1007/978-3-319-11391-3\_13}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/ChengDLDSO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/EndsleyC14, author = {Mica R. Endsley and Erik S. Connors}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Foundation and Challenges}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {7--27}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_2}, doi = {10.1007/978-3-319-11391-3\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/EndsleyC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/EvancichLLCTX14, author = {Nicholas Evancich and Zhuo Lu and Jason H. Li and Yi Cheng and Joshua Tuttle and Peng Xie}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Network-Wide Awareness}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {63--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_5}, doi = {10.1007/978-3-319-11391-3\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/EvancichLLCTX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GonzalezBOL14, author = {Cleotilde Gonzalez and Noam Ben{-}Asher and Alessandro Oltramari and Christian Lebiere}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Cognition and Technology}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {93--117}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_6}, doi = {10.1007/978-3-319-11391-3\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GonzalezBOL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Harang14, author = {Richard E. Harang}, editor = {Robinson E. Pino}, title = {Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion Detection Systems}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {15--37}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_2}, doi = {10.1007/978-1-4614-7597-2\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Harang14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Harang14a, author = {Richard E. Harang}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Learning and Semantics}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {201--217}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_10}, doi = {10.1007/978-3-319-11391-3\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Harang14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/HealeyHH14, author = {Christopher G. Healey and Lihua Hao and Steve E. Hutchinson}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Visualizations and Analysts}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {145--165}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_8}, doi = {10.1007/978-3-319-11391-3\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/HealeyHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/HolsoppleSY14, author = {Jared Holsopple and Moises Sudit and Shanchieh Jay Yang}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Impact Assessment}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {219--238}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_11}, doi = {10.1007/978-3-319-11391-3\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/HolsoppleSY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Hutchinson14, author = {Steve Hutchinson}, editor = {Robinson E. Pino}, title = {Semantic Features from Web-Traffic Streams}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {221--237}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_14}, doi = {10.1007/978-1-4614-7597-2\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Hutchinson14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Jakobson14, author = {Gabriel Jakobson}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Mission Resilience}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {297--322}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_14}, doi = {10.1007/978-3-319-11391-3\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Jakobson14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Kott14, author = {Alexander Kott}, editor = {Robinson E. Pino}, title = {Towards Fundamental Science of Cyber Security}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {1--13}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_1}, doi = {10.1007/978-1-4614-7597-2\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Kott14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KottBS14, author = {Alexander Kott and Norbou Buchler and Kristin E. Schaefer}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Kinetic and Cyber}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {29--45}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_3}, doi = {10.1007/978-3-319-11391-3\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KottBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KottWE14, author = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Preview}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {1--5}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_1}, doi = {10.1007/978-3-319-11391-3\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KottWE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KottWE14a, author = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Concluding Thoughts}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {323--328}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_15}, doi = {10.1007/978-3-319-11391-3\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KottWE14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KudithipudiMSRP14, author = {Dhireesha Kudithipudi and Cory E. Merkel and Michael Soltiz and Garrett S. Rose and Robinson E. Pino}, editor = {Robinson E. Pino}, title = {Design of Neuromorphic Architectures with Memristors}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {93--103}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_6}, doi = {10.1007/978-1-4614-7597-2\_6}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/KudithipudiMSRP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LohnMADM14, author = {Andrew J. Lohn and Patrick R. Mickel and James B. Aimone and Erik P. DeBenedictis and Matthew J. Marinella}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Memristors as Synapses in Artificial Neural Networks: Biomimicry Beyond Weight Change}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {135--150}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_9}, doi = {10.1007/978-3-319-10374-7\_9}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/LohnMADM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LykeE14, author = {James Lyke and Arthur H. Edwards}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Cyber Security Considerations for Reconfigurable Systems}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {183--209}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_13}, doi = {10.1007/978-3-319-10374-7\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LykeE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/McCormick14, author = {Bruce McCormick}, editor = {Robinson E. Pino}, title = {Applying Cognitive Memory to CyberSecurity}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {63--73}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_4}, doi = {10.1007/978-1-4614-7597-2\_4}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/McCormick14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/McLean14, author = {M. R. McLean}, editor = {Robinson E. Pino}, title = {Concurrent Learning Algorithm and the Importance Map}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {239--250}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_15}, doi = {10.1007/978-1-4614-7597-2\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/McLean14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/NixonCML14, author = {Kent W. Nixon and Yiran Chen and Zhi{-}Hong Mao and Kang Li}, editor = {Robinson E. Pino}, title = {User Classification and Authentication for Mobile Device Based on Gesture Recognition}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {125--135}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_8}, doi = {10.1007/978-1-4614-7597-2\_8}, timestamp = {Mon, 04 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/NixonCML14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PerlovskyS14, author = {Leonid I. Perlovsky and Olexander Shevchenko}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Dynamic Logic Machine Learning for Cybersecurity}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {85--98}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_6}, doi = {10.1007/978-3-319-10374-7\_6}, timestamp = {Tue, 14 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PerlovskyS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PinoK14, author = {Robinson E. Pino and Alexander Kott}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Neuromorphic Computing for Cognitive Augmentation in Cyber Defense}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {19--45}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_2}, doi = {10.1007/978-3-319-10374-7\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PinoK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PinoOC14, author = {Robinson E. Pino and Antonio S. Oblea and Kristy A. Campbell}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Memristor {SPICE} Model Simulation and Device Hardware Correlation}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {169--174}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_11}, doi = {10.1007/978-3-319-10374-7\_11}, timestamp = {Wed, 19 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PinoOC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PinoP14, author = {Robinson E. Pino and Youngok K. Pino}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Reconfigurable Memristor Based Computing Logic}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {175--182}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_12}, doi = {10.1007/978-3-319-10374-7\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PinoP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RoseKKMWY14, author = {Garrett S. Rose and Dhireesha Kudithipudi and Ganesh Khedkar and Nathan R. McDonald and Bryant T. Wysocki and Lok{-}Kwong Yan}, editor = {Robinson E. Pino}, title = {Nanoelectronics and Hardware Security}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {105--123}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_7}, doi = {10.1007/978-1-4614-7597-2\_7}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/RoseKKMWY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ShevenellSEP14, author = {Michael J. Shevenell and Justin L. Shumaker and Arthur H. Edwards and Robinson E. Pino}, editor = {Robinson E. Pino}, title = {Memristors and the Future of Cyber Security Hardware}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {273--285}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_17}, doi = {10.1007/978-1-4614-7597-2\_17}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ShevenellSEP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/TahaHYM14, author = {Tarek M. Taha and Raqibul Hasan and Chris Yakopcic and Mark R. McLean}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Low Power Neuromorphic Architectures to Enable Pervasive Deployment of Intrusion Detection Systems}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {151--168}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_10}, doi = {10.1007/978-3-319-10374-7\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/TahaHYM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/UlicnyMKAS14, author = {Brian E. Ulicny and Jakub J. Moskal and Mieczyslaw M. Kokar and Keith Abe and John Kei Smith}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Inference and Ontologies}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {167--199}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_9}, doi = {10.1007/978-3-319-11391-3\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/UlicnyMKAS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/WangK14, author = {Xueyang Wang and Ramesh Karri}, editor = {Robinson E. Pino}, title = {Detecting Kernel Control-Flow Modifying Rootkits}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {177--187}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_11}, doi = {10.1007/978-1-4614-7597-2\_11}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/WangK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/WysockiMTRG14, author = {Bryant T. Wysocki and Nathan R. McDonald and Clare Thiem and Garrett S. Rose and Mario Gomez II}, editor = {Robinson E. Pino}, title = {Hardware-Based Computational Intelligence for Size, Weight, and Power Constrained Environments}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {137--153}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_9}, doi = {10.1007/978-1-4614-7597-2\_9}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/WysockiMTRG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/YangDHS14, author = {Shanchieh Jay Yang and Haitao Du and Jared Holsopple and Moises Sudit}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Attack Projection}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {239--261}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_12}, doi = {10.1007/978-3-319-11391-3\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/YangDHS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/YenEZ014, author = {John Yen and Robert F. Erbacher and Chen Zhong and Peng Liu}, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Cognitive Process}, booktitle = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, pages = {119--144}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3\_7}, doi = {10.1007/978-3-319-11391-3\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/YenEZ014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/YuGXF14, author = {Wei Yu and Linqiang Ge and Guobin Xu and Xinwen Fu}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Towards Neural Network Based Malware Detection on Android Mobile Devices}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {99--117}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_7}, doi = {10.1007/978-3-319-10374-7\_7}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/YuGXF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Yufik14, author = {Yan M. Yufik}, editor = {Robinson E. Pino}, title = {Understanding Cyber Warfare}, booktitle = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, pages = {75--91}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2\_5}, doi = {10.1007/978-1-4614-7597-2\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Yufik14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Yufik14a, author = {Yan Yufik}, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Situational Awareness, Sensemaking, and Situation Understanding in Cyber Warfare}, booktitle = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, pages = {1--18}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7\_1}, doi = {10.1007/978-3-319-10374-7\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Yufik14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/55, editor = {Robinson E. Pino}, title = {Network Science and Cybersecurity}, series = {Advances in Information Security}, volume = {55}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-7597-2}, doi = {10.1007/978-1-4614-7597-2}, isbn = {978-1-4614-7596-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/55.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/61, editor = {Robinson E. Pino and Alexander Kott and Michael J. Shevenell}, title = {Cybersecurity Systems for Human Cognition Augmentation}, series = {Advances in Information Security}, volume = {61}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10374-7}, doi = {10.1007/978-3-319-10374-7}, isbn = {978-3-319-10373-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/61.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/62, editor = {Alexander Kott and Cliff Wang and Robert F. Erbacher}, title = {Cyber Defense and Situational Awareness}, series = {Advances in Information Security}, volume = {62}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11391-3}, doi = {10.1007/978-3-319-11391-3}, isbn = {978-3-319-11390-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/62.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/RathgebUW13, author = {Christian Rathgeb and Andreas Uhl and Peter Wild}, title = {Iris Biometrics - From Segmentation to Template Security}, series = {Advances in Information Security}, volume = {59}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5571-4}, doi = {10.1007/978-1-4614-5571-4}, isbn = {978-1-4614-5570-7}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/RathgebUW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BilarCM13, author = {Daniel Bilar and George Cybenko and John P. Murphy}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Adversarial Dynamics: The Conficker Case Study}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {41--71}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_3}, doi = {10.1007/978-1-4614-5416-8\_3}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/BilarCM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Gonzalez13, author = {Cleotilde Gonzalez}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {From Individual Decisions from Experience to Behavioral Game Theory: Lessons for Cybersecurity}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {73--86}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_4}, doi = {10.1007/978-1-4614-5416-8\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Gonzalez13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GouesNCDFHKG13, author = {Claire {Le Goues} and Anh Nguyen{-}Tuong and Hao Chen and Jack W. Davidson and Stephanie Forrest and Jason Hiser and John C. Knight and Matthew Van Gundy}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Moving Target Defenses in the Helix Self-Regenerative Architecture}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {117--149}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_7}, doi = {10.1007/978-1-4614-5416-8\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GouesNCDFHKG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/JacksonHCLBF13, author = {Todd Jackson and Andrei Homescu and Stephen Crane and Per Larsen and Stefan Brunthaler and Michael Franz}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Diversifying the Software Stack Using Randomized {NOP} Insertion}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {151--173}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_8}, doi = {10.1007/978-1-4614-5416-8\_8}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/JacksonHCLBF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/JainAT13, author = {Manish Jain and Bo An and Milind Tambe}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Security Games Applied to Real-World: Research Contributions and Challenges}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {15--39}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_2}, doi = {10.1007/978-1-4614-5416-8\_2}, timestamp = {Wed, 06 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/JainAT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Manadhata13, author = {Pratyusa K. Manadhata}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Game Theoretic Approaches to Attack Surface Shifting}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {1--13}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_1}, doi = {10.1007/978-1-4614-5416-8\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Manadhata13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PappasPK13, author = {Vasilis Pappas and Michalis Polychronakis and Angelos D. Keromytis}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Practical Software Diversification Using In-Place Code Randomization}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {175--202}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_9}, doi = {10.1007/978-1-4614-5416-8\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PappasPK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/TorrieriZJ13, author = {Don J. Torrieri and Sencun Zhu and Sushil Jajodia}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Cyber Maneuver Against External Adversaries and Compromised Nodes}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {87--96}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_5}, doi = {10.1007/978-1-4614-5416-8\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/TorrieriZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/YackoskiBYL13, author = {Justin Yackoski and Harry Bullen and Xiang Yu and Jason H. Li}, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Applying Self-Shielding Dynamics to the Network Architecture}, booktitle = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, pages = {97--115}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8\_6}, doi = {10.1007/978-1-4614-5416-8\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/YackoskiBYL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/100, editor = {Sushil Jajodia and Anup K. Ghosh and V. S. Subrahmanian and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Moving Target Defense {II} - Application of Game Theory and Adversarial Modeling}, series = {Advances in Information Security}, volume = {100}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-1-4614-5416-8}, doi = {10.1007/978-1-4614-5416-8}, isbn = {978-1-4614-5415-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/100.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Aycock11, author = {John Aycock}, title = {Spyware and Adware}, series = {Advances in Information Security}, volume = {50}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-0-387-77741-2}, doi = {10.1007/978-0-387-77741-2}, isbn = {978-0-387-77740-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Aycock11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Foresti11, author = {Sara Foresti}, title = {Preserving Privacy in Data Outsourcing}, series = {Advances in Information Security}, volume = {51}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-7659-8}, doi = {10.1007/978-1-4419-7659-8}, isbn = {978-1-4419-7658-1}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Foresti11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Al-Shaer11, author = {Ehab Al{-}Shaer}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Toward Network Configuration Randomization for Moving Target Defense}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {153--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_9}, doi = {10.1007/978-1-4614-0977-9\_9}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Al-Shaer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ChristodorescuFJG11, author = {Mihai Christodorescu and Matthew Fredrikson and Somesh Jha and Jonathon T. Giffin}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {End-to-End Software Diversification of Internet Services}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {117--130}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_7}, doi = {10.1007/978-1-4614-0977-9\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ChristodorescuFJG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CuiS11, author = {Ang Cui and Salvatore J. Stolfo}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Symbiotes and defensive Mutualism: Moving Target Defense}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {99--108}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_5}, doi = {10.1007/978-1-4614-0977-9\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CuiS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/EvansNK11, author = {David Evans and Anh Nguyen{-}Tuong and John C. Knight}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Effectiveness of Moving Target Defenses}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {29--48}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_2}, doi = {10.1007/978-1-4614-0977-9\_2}, timestamp = {Tue, 13 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/EvansNK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/HuangG11, author = {Yih Huang and Anup K. Ghosh}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Introducing Diversity and Uncertainty to Create Moving Attack Surfaces for Web Services}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {131--151}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_8}, doi = {10.1007/978-1-4614-0977-9\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/HuangG11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/JacksonSHMWGBWF11, author = {Todd Jackson and Babak Salamat and Andrei Homescu and Karthikeyan Manivannan and Gregor Wagner and Andreas Gal and Stefan Brunthaler and Christian Wimmer and Michael Franz}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Compiler-Generated Software Diversity}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {77--98}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_4}, doi = {10.1007/978-1-4614-0977-9\_4}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/JacksonSHMWGBWF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Kant11, author = {Krishna Kant}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Configuration Management Security in Data Center Environments}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {161--181}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_10}, doi = {10.1007/978-1-4614-0977-9\_10}, timestamp = {Thu, 13 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Kant11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ManadhataW11, author = {Pratyusa K. Manadhata and Jeannette M. Wing}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {A Formal Model for a System's Attack Surface}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {1--28}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_1}, doi = {10.1007/978-1-4614-0977-9\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ManadhataW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PortokalidisK11, author = {Georgios Portokalidis and Angelos D. Keromytis}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Global {ISR:} Toward a Comprehensive Defense Against Unauthorized Code Execution}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {49--76}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_3}, doi = {10.1007/978-1-4614-0977-9\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PortokalidisK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Rinard11, author = {Martin C. Rinard}, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Manipulating Program Functionality to Eliminate Security Vulnerabilities}, booktitle = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, pages = {109--115}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9\_6}, doi = {10.1007/978-1-4614-0977-9\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Rinard11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/54, editor = {Sushil Jajodia and Anup K. Ghosh and Vipin Swarup and Cliff Wang and Xiaoyang Sean Wang}, title = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats}, series = {Advances in Information Security}, volume = {54}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4614-0977-9}, doi = {10.1007/978-1-4614-0977-9}, isbn = {978-1-4614-0976-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/54.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/GhorbaniLT10, author = {Ali A. Ghorbani and Wei Lu and Mahbod Tavallaee}, title = {Network Intrusion Detection and Prevention - Concepts and Techniques}, series = {Advances in Information Security}, volume = {47}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-88771-5}, doi = {10.1007/978-0-387-88771-5}, isbn = {978-0-387-88770-8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GhorbaniLT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/KayemAM10, author = {Anne V. D. M. Kayem and Selim G. Akl and Patrick Martin}, title = {Adaptive Cryptographic Access Control}, series = {Advances in Information Security}, volume = {48}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-6655-1}, doi = {10.1007/978-1-4419-6655-1}, isbn = {978-0-387-77265-3}, timestamp = {Mon, 20 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/KayemAM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/KiayiasP10, author = {Aggelos Kiayias and Serdar Pehlivanoglu}, title = {Encryption for Digital Content}, series = {Advances in Information Security}, volume = {52}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0044-9}, doi = {10.1007/978-1-4419-0044-9}, isbn = {978-1-4419-0043-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KiayiasP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/ShoniregunDM10, author = {Charles A. Shoniregun and Kudakwashe Dube and Fredrick Mtenzi}, title = {Electronic Healthcare Information Security}, series = {Advances in Information Security}, volume = {53}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-0-387-84919-5}, doi = {10.1007/978-0-387-84919-5}, isbn = {978-0-387-84817-4}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ShoniregunDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordCGLPY10, author = {Paul Barford and Yan Chen and Anup Goyal and Zhichun Li and Vern Paxson and Vinod Yegneswaran}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Employing Honeynets For Network Situational Awareness}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {71--102}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_5}, doi = {10.1007/978-1-4419-0140-8\_5}, timestamp = {Wed, 25 Sep 2019 17:41:05 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordCGLPY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10, author = {Paul Barford and Marc Dacier and Thomas G. Dietterich and Matt Fredrikson and Jonathon T. Giffin and Sushil Jajodia and Somesh Jha and Jason H. Li and Peng Liu and Peng Ning and Xinming Ou and Dawn Song and Laura Strater and Vipin Swarup and George P. Tadda and C. Wang and John Yen}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Cyber {SA:} Situational Awareness for Cyber Defense}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {3--13}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_1}, doi = {10.1007/978-1-4419-0140-8\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BishopEFGGPW10, author = {Matt Bishop and Sophie Engle and Deborah A. Frincke and Carrie Gates and Frank L. Greitzer and Sean Peisert and Sean Whalen}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {A Risk Management Approach to the "Insider Threat"}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {115--137}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_6}, doi = {10.1007/978-1-4419-7133-3\_6}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BishopEFGGPW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BowenSKS10, author = {Brian M. Bowen and Malek Ben Salem and Angelos D. Keromytis and Salvatore J. Stolfo}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Monitoring Technologies for Mitigating Insider Threats}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {197--217}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_9}, doi = {10.1007/978-1-4419-7133-3\_9}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BowenSKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Coles-KempT10, author = {Lizzie Coles{-}Kemp and Marianthi Theoharidou}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Insider Threat and Information Security Management}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {45--71}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_3}, doi = {10.1007/978-1-4419-7133-3\_3}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Coles-KempT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CramptonH10, author = {Jason Crampton and Michael Huth}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Towards an Access-Control Framework for Countering Insider Threats}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {173--195}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_8}, doi = {10.1007/978-1-4419-7133-3\_8}, timestamp = {Mon, 11 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CramptonH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/DacierLTPK10, author = {Marc Dacier and Corrado Leita and Olivier Thonnard and Hau{-}Van Pham and Engin Kirda}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Assessing Cybercrime Through the Eyes of the {WOMBAT}}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {103--136}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_6}, doi = {10.1007/978-1-4419-0140-8\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/DacierLTPK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/DietterichBKS10, author = {Thomas G. Dietterich and Xinlong Bao and Victoria Keiser and Jianqiang Shen}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Machine Learning Methods for High Level Cyber Situation Awareness}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {227--247}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_11}, doi = {10.1007/978-1-4419-0140-8\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/DietterichBKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FlegelKMMWL10, author = {Ulrich Flegel and Florian Kerschbaum and Philip Miseldine and Ganna Monakova and Richard Wacker and Frank Leymann}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Legally Sustainable Solutions for Privacy Issues in Collaborative Fraud Detection}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {139--171}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_7}, doi = {10.1007/978-1-4419-7133-3\_7}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FlegelKMMWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FlegelVB10, author = {Ulrich Flegel and Julien Vayssi{\`{e}}re and Gunter Bitz}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {A State of the Art Survey of Fraud Detection Technology}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {73--84}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_4}, doi = {10.1007/978-1-4419-7133-3\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FlegelVB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FredriksonCGJ10, author = {Matt Fredrikson and Mihai Christodorescu and Jonathon T. Giffin and Somesh Jha}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {A Declarative Framework for Intrusion Analysis}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {179--200}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_9}, doi = {10.1007/978-1-4419-0140-8\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FredriksonCGJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GreitzerF10, author = {Frank L. Greitzer and Deborah A. Frincke}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {85--113}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_5}, doi = {10.1007/978-1-4419-7133-3\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GreitzerF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/JajodiaN10, author = {Sushil Jajodia and Steven Noel}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Topological Vulnerability Analysis}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {139--154}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_7}, doi = {10.1007/978-1-4419-0140-8\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/JajodiaN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LiOR10, author = {Jason H. Li and Xinming Ou and Siva Raj Rajagopalan}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Uncertainty and Risk Management in Cyber Situational Awareness}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {51--68}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_4}, doi = {10.1007/978-1-4419-0140-8\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LiOR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LiuJZXJBL10, author = {Peng Liu and Xiaoqi Jia and Shengzhi Zhang and Xi Xiong and Yoon{-}chan Jhi and Kun Bai and Jason H. Li}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Cross-Layer Damage Assessment for Cyber Situational Awareness}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {155--176}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_8}, doi = {10.1007/978-1-4419-0140-8\_8}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LiuJZXJBL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MagklarasF10, author = {George Magklaras and Steven Furnell}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Insider Threat Specification as a Threat Mitigation Technique}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {219--244}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_10}, doi = {10.1007/978-1-4419-7133-3\_10}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MagklarasF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Neumann10, author = {Peter G. Neumann}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Combatting Insider Threats}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {17--44}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_2}, doi = {10.1007/978-1-4419-7133-3\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Neumann10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ProbstHGB10, author = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Aspects of Insider Threats}, booktitle = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, pages = {1--15}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3\_1}, doi = {10.1007/978-1-4419-7133-3\_1}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/ProbstHGB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SezerKN10, author = {Emre Can Sezer and Chongkyung Kil and Peng Ning}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Automated Software Vulnerability Analysis}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {201--223}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_10}, doi = {10.1007/978-1-4419-0140-8\_10}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/SezerKN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/TaddaS10, author = {George P. Tadda and John S. Salerno}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Overview of Cyber Situation Awareness}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {15--35}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_2}, doi = {10.1007/978-1-4419-0140-8\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/TaddaS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/YenMMHFL10, author = {John Yen and Michael D. McNeese and Tracy Mullen and David L. Hall and Xiaocong Fan and Peng Liu}, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {RPD-based Hypothesis Reasoning for Cyber Situation Awareness}, booktitle = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, pages = {39--49}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8\_3}, doi = {10.1007/978-1-4419-0140-8\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/YenMMHFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/46, editor = {Sushil Jajodia and Peng Liu and Vipin Swarup and Cliff Wang}, title = {Cyber Situational Awareness - Issues and Research}, series = {Advances in Information Security}, volume = {46}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-0140-8}, doi = {10.1007/978-1-4419-0140-8}, isbn = {978-1-4419-0139-2}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/46.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/49, editor = {Christian W. Probst and Jeffrey Hunker and Dieter Gollmann and Matt Bishop}, title = {Insider Threats in Cyber Security}, series = {Advances in Information Security}, volume = {49}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-1-4419-7133-3}, doi = {10.1007/978-1-4419-7133-3}, isbn = {978-1-4419-7132-6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/49.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Yan09, author = {Song Y. Yan}, title = {Primality Testing and Integer Factorization in Public-Key Cryptography}, series = {Advances in Information Security}, volume = {11}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-77268-4}, doi = {10.1007/978-0-387-77268-4}, isbn = {978-0-387-77267-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Yan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Choo09, author = {Kim{-}Kwang Raymond Choo}, title = {Secure Key Establishment}, series = {Advances in Information Security}, volume = {41}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-87969-7}, doi = {10.1007/978-0-387-87969-7}, isbn = {978-0-387-87968-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Choo09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/OnievaLZ09, author = {Jose Antonio Onieva and Javier L{\'{o}}pez and Jianying Zhou}, title = {Secure Multi-Party Non-Repudiation Protocols and Applications}, series = {Advances in Information Security}, volume = {43}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-75630-1}, doi = {10.1007/978-0-387-75630-1}, isbn = {978-0-387-75629-5}, timestamp = {Mon, 08 Jan 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/OnievaLZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/PortnoyG09, author = {Michael Portnoy and Seymour E. Goodman}, title = {Global Initiatives to Secure Cyberspace - An Emerging Landscape}, series = {Advances in Information Security}, volume = {42}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-09764-0}, doi = {10.1007/978-0-387-09764-0}, isbn = {978-0-387-09763-3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PortnoyG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Singh09, author = {Abhishek Singh}, title = {Identifying Malicious Code Through Reverse Engineering}, series = {Advances in Information Security}, volume = {44}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-89468-3}, doi = {10.1007/978-0-387-89468-3}, isbn = {978-0-387-09824-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Singh09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ArmenterosGMM09, author = {{\'{A}}lvaro Armenteros and Laura Garc{\'{\i}}a and Antonio Mu{\~{n}}oz and Antonio Ma{\~{n}}a}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Realising the Potential of Serenity in Emerging AmI Ecosystems: Implications and Challenges}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {323--342}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_18}, doi = {10.1007/978-0-387-88775-3\_18}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/ArmenterosGMM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BenameurKSS09, author = {Azzedine Benameur and Paul El Khoury and Magali Seguran and Smriti Kumar Sinha}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {{SERENITY} in e-Business and Smart Item Scenarios}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {305--322}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_17}, doi = {10.1007/978-0-387-88775-3\_17}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BenameurKSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CrespoPSSM09, author = {Beatriz Gallego{-}Nicasio Crespo and Ana Pi{\~{n}}uela and Pedro Soria{-}Rodriguez and Daniel Serrano and Antonio Ma{\~{n}}a}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {The {SERENITY} Runtime Framework}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {183--198}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_11}, doi = {10.1007/978-0-387-88775-3\_11}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CrespoPSSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CrespoPSSM09a, author = {Beatriz Gallego{-}Nicasio Crespo and Ana Pi{\~{n}}uela and Pedro Soria{-}Rodriguez and Daniel Serrano and Antonio Ma{\~{n}}a}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Pattern Driven Selection and Configuration of S{\&}D Mechanisms at Runtime}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {199--212}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_12}, doi = {10.1007/978-0-387-88775-3\_12}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CrespoPSSM09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FeliciMTR09, author = {Massimo Felici and Valentino Meduri and Alessandra Tedeschi and Carlo Riccucci}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {{SERENITY} in Air Traffic Management}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {359--378}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_20}, doi = {10.1007/978-0-387-88775-3\_20}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FeliciMTR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Fernandez09, author = {Eduardo B. Fern{\'{a}}ndez}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Security Patterns and {A} Methodology to Apply them}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {37--46}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_3}, doi = {10.1007/978-0-387-88775-3\_3}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Fernandez09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GiacomoPR09, author = {Valentina Di Giacomo and Domenico Presenza and Carlo Riccucci}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Organisational Pattern Driven Recovery Mechanisms}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {275--290}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_15}, doi = {10.1007/978-0-387-88775-3\_15}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GiacomoPR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GurgensF09, author = {Sigrid G{\"{u}}rgens and Andreas Fuchs}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Security and Dependability Solutions for Networks and Devices}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {107--123}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_7}, doi = {10.1007/978-0-387-88775-3\_7}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GurgensF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GurgensP09, author = {Sigrid G{\"{u}}rgens and Gimena Pujol}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Specification of Security and Dependability Properties}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {49--67}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_4}, doi = {10.1007/978-0-387-88775-3\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GurgensP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Jurjens09, author = {Jan J{\"{u}}rjens}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Security and Dependability Engineering}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {21--36}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_2}, doi = {10.1007/978-0-387-88775-3\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Jurjens09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KokolakisRBS09, author = {Spyros Kokolakis and Panagiotis Rizomiliotis and Azzedine Benameur and Smriti Kumar Sinha}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Security and Dependability Solutions for Web Services and Workflows}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {97--106}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_6}, doi = {10.1007/978-0-387-88775-3\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KokolakisRBS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KrausovaD09, author = {Alzbeta Krausov{\'{a}} and Jos Dumortier}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Legal Issues of Ambient Intelligence in the {SERENITY} Project}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {291--302}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_16}, doi = {10.1007/978-0-387-88775-3\_16}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KrausovaD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ManaSK09, author = {Antonio Ma{\~{n}}a and George Spanoudakis and Spyros Kokolakis}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Introduction: The {SERENITY} vision}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {1--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_1}, doi = {10.1007/978-0-387-88775-3\_1}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ManaSK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ManaSK09a, author = {Antonio Ma{\~{n}}a and George Spanoudakis and Spyros Kokolakis}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Future Directions}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {379--383}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_21}, doi = {10.1007/978-0-387-88775-3\_21}, timestamp = {Tue, 01 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ManaSK09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PorekarKSG09, author = {Jan Porekar and Tomaz Klobucar and Svetlana Saljic and Dusan Gabrijelcic}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Applying the {SERENITY} Methodology to the Domain of Trusted Electronic Archiving}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {343--357}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_19}, doi = {10.1007/978-0-387-88775-3\_19}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PorekarKSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RudolphCCMR09, author = {Carsten Rudolph and Luca Compagna and Roberto Carbone and Antonio Mu{\~{n}}oz and J{\"{u}}rgen Repp}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Verification of S{\&}D Solutions for Network Communications and Devices}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {143--163}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_9}, doi = {10.1007/978-0-387-88775-3\_9}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/RudolphCCMR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Sanchez-CidMSKSM09, author = {Francisco S{\'{a}}nchez{-}Cid and Antonio Ma{\~{n}}a and George Spanoudakis and Christos Kloukinas and Daniel Serrano and Antonio Mu{\~{n}}oz}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Representation of Security and Dependability Solutions}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {69--95}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_5}, doi = {10.1007/978-0-387-88775-3\_5}, timestamp = {Thu, 28 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Sanchez-CidMSKSM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SerranoMLCL09, author = {Daniel Serrano and Antonio Ma{\~{n}}a and Rafael Llarena and Beatriz Gallego{-}Nicasio Crespo and Keqin Li}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {{SERENITY} Aware Development of Security and Dependability Solutions}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {127--141}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_8}, doi = {10.1007/978-0-387-88775-3\_8}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SerranoMLCL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SerranoMLCL09a, author = {Daniel Serrano and Antonio Ma{\~{n}}a and Rafael Llarena and Beatriz Gallego{-}Nicasio Crespo and Keqin Li}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {{SERENITY} Aware System Development Process}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {165--179}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_10}, doi = {10.1007/978-0-387-88775-3\_10}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SerranoMLCL09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SpanoudakisKM09, author = {George Spanoudakis and Christos Kloukinas and Khaled Mahbub}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {The {SERENITY} Runtime Monitoring Framework}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {213--237}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_13}, doi = {10.1007/978-0-387-88775-3\_13}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/SpanoudakisKM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/TsigkritisSKL09, author = {Theocharis Tsigkritis and George Spanoudakis and Christos Kloukinas and Davide Lorenzoli}, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Diagnosis and Threat Detection Capabilities of the {SERENITY} Monitoring Framework}, booktitle = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, pages = {239--271}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3\_14}, doi = {10.1007/978-0-387-88775-3\_14}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/TsigkritisSKL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/45, editor = {Spyros Kokolakis and Antonio Ma{\~{n}}a G{\'{o}}mez and George Spanoudakis}, title = {Security and Dependability for Ambient Intelligence}, series = {Advances in Information Security}, volume = {45}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-0-387-88775-3}, doi = {10.1007/978-0-387-88775-3}, isbn = {978-0-387-88774-6}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/45.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/SinghSJ08, author = {Abhishek Singh and Baibhav Singh and Hirosh Joseph}, title = {Vulnerability Analysis and Defense for the Internet}, series = {Advances in Information Security}, volume = {37}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-74390-5}, doi = {10.1007/978-0-387-74390-5}, isbn = {978-0-387-74389-9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/SinghSJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/TraynorMP08, author = {Patrick Traynor and Patrick D. McDaniel and Thomas La Porta}, title = {Security for Telecommunications Networks}, series = {Advances in Information Security}, volume = {40}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-72442-3}, doi = {10.1007/978-0-387-72442-3}, isbn = {978-0-387-72441-6}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/sp/TraynorMP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BambenekK08, author = {John Bambenek and Agnes Klus}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Botnets and Proactive System Defense}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {117--130}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_6}, doi = {10.1007/978-0-387-68768-1\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BambenekK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Bellovin08, author = {Steven M. Bellovin}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {The Insider Attack Problem Nature and Scope}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {1--4}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_1}, doi = {10.1007/978-0-387-77322-3\_1}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/Bellovin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BrumleyHLNSY08, author = {David Brumley and Cody Hartwig and Zhenkai Liang and James Newsome and Dawn Xiaodong Song and Heng Yin}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Automatically Identifying Trigger-based Behavior in Malware}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {65--88}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_4}, doi = {10.1007/978-0-387-68768-1\_4}, timestamp = {Sat, 17 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/BrumleyHLNSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/DagonGL08, author = {David Dagon and Guofei Gu and Christopher P. Lee}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {A Taxonomy of Botnet Structures}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {143--164}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_8}, doi = {10.1007/978-0-387-68768-1\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/DagonGL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FranklinLMSPD08, author = {Jason Franklin and Mark Luk and Jonathan M. McCune and Arvind Seshadri and Adrian Perrig and Leendert van Doorn}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Towards Sound Detection of Virtual Machines}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {89--116}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_5}, doi = {10.1007/978-0-387-68768-1\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FranklinLMSPD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GligorC08, author = {Virgil D. Gligor and C. Sekar Chandersekaran}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Surviving Insider Attacks: {A} Call for System Experiments}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {153--164}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_9}, doi = {10.1007/978-0-387-77322-3\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GligorC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Hunker08, author = {Jeffrey Hunker}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Taking Stock and Looking Forward - An Outsider's Perspective on the Insider Threat}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {195--214}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_11}, doi = {10.1007/978-0-387-77322-3\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Hunker08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/IyerDNK08, author = {Ravishankar K. Iyer and Paul Dabrowski and Nithin Nakka and Zbigniew Kalbarczyk}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted {ILLIAC} Approach}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {133--152}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_8}, doi = {10.1007/978-0-387-77322-3\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/IyerDNK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Keromytis08, author = {Angelos D. Keromytis}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Hard Problems and Research Challenges}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {215--218}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_12}, doi = {10.1007/978-0-387-77322-3\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Keromytis08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Keromytis08a, author = {Angelos D. Keromytis}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Hard Problems and Research Challenges Concluding Remarks}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {219--222}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_13}, doi = {10.1007/978-0-387-77322-3\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Keromytis08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KillourhyM08, author = {Kevin S. Killourhy and Roy A. Maxion}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {91--112}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_6}, doi = {10.1007/978-0-387-77322-3\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KillourhyM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LiGC08, author = {Zhichun Li and Anup Goyal and Yan Chen}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Honeynet-based Botnet Scan Traffic Analysis}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {25--44}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_2}, doi = {10.1007/978-0-387-68768-1\_2}, timestamp = {Fri, 20 Oct 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LiGC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/McCormick08, author = {Michael McCormick}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Data Theft: {A} Prototypical Insider Threat}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {53--68}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_4}, doi = {10.1007/978-0-387-77322-3\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/McCormick08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MooreCT08, author = {Andrew P. Moore and Dawn M. Cappelli and Randall F. Trzeciak}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {The "Big Picture" of Insider {IT} Sabotage Across {U.S.} Critical Infrastructures}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {17--52}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_3}, doi = {10.1007/978-0-387-77322-3\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MooreCT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Pfleeger08, author = {Charles P. Pfleeger}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Reflections on the Insider Threat}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {5--16}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_2}, doi = {10.1007/978-0-387-77322-3\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Pfleeger08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RamachandranFD08, author = {Anirudh Ramachandran and Nick Feamster and David Dagon}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Detecting Botnet Membership with {DNSBL} Counterintelligence}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {131--142}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_7}, doi = {10.1007/978-0-387-68768-1\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/RamachandranFD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SahitaS08, author = {Ravi Sahita and Uday R. Savagaonkar}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Towards a Virtualization-enabled Framework for Information Traceability {(VFIT)}}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {113--132}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_7}, doi = {10.1007/978-0-387-77322-3\_7}, timestamp = {Fri, 29 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SahitaS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SalemHS08, author = {Malek Ben Salem and Shlomo Hershkop and Salvatore J. Stolfo}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {A Survey of Insider Attack Detection Research}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {69--90}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_5}, doi = {10.1007/978-0-387-77322-3\_5}, timestamp = {Wed, 15 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SalemHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SinclairS08, author = {Sara Sinclair and Sean W. Smith}, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Preventative Directions For Insider Threat Mitigation Via Access Control}, booktitle = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, pages = {165--194}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3\_10}, doi = {10.1007/978-0-387-77322-3\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SinclairS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/StinsonM08, author = {Elizabeth Stinson and John C. Mitchell}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Characterizing Bots' Remote Control Behavior}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {45--64}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_3}, doi = {10.1007/978-0-387-68768-1\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/StinsonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/StrayerLWL08, author = {W. Timothy Strayer and David E. Lapsley and Robert Walsh and Carl Livadas}, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Botnet Detection Based on Network Behavior}, booktitle = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, pages = {1--24}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-68768-1\_1}, doi = {10.1007/978-0-387-68768-1\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/StrayerLWL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/36, editor = {Wenke Lee and Cliff Wang and David Dagon}, title = {Botnet Detection: Countering the Largest Security Threat}, series = {Advances in Information Security}, volume = {36}, publisher = {Springer}, year = {2008}, isbn = {978-0-387-68768-1}, timestamp = {Wed, 19 Nov 2008 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/36.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/39, editor = {Salvatore J. Stolfo and Steven M. Bellovin and Angelos D. Keromytis and Shlomo Hershkop and Sean W. Smith and Sara Sinclair}, title = {Insider Attack and Cyber Security - Beyond the Hacker}, series = {Advances in Information Security}, volume = {39}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-0-387-77322-3}, doi = {10.1007/978-0-387-77322-3}, isbn = {978-0-387-77321-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/39.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Bleumer07, author = {Gerrit Bleumer}, title = {Electronic Postage Systems - Technology, Security, Economics}, series = {Advances in Information Security}, volume = {26}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44606-6}, doi = {10.1007/978-0-387-44606-6}, isbn = {978-0-387-29313-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Bleumer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Flegel07, author = {Ulrich Flegel}, title = {Privacy-Respecting Intrusion Detection}, series = {Advances in Information Security}, volume = {35}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-68254-9}, doi = {10.1007/978-0-387-68254-9}, isbn = {978-0-387-34346-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Flegel07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Frye07, author = {Douglas Frye}, title = {Network Security Policies and Procedures}, series = {Advances in Information Security}, volume = {32}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-47955-2}, doi = {10.1007/978-0-387-47955-2}, isbn = {978-0-387-30937-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Frye07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/LiuN07, author = {Donggang Liu and Peng Ning}, title = {Security for Wireless Sensor Networks}, series = {Advances in Information Security}, volume = {28}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46781-8}, doi = {10.1007/978-0-387-46781-8}, isbn = {978-0-387-32723-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/LiuN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Shoniregun07, author = {Charles A. Shoniregun}, title = {Synchronizing Internet Protocol Security (SIPSec)}, series = {Advances in Information Security}, volume = {34}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-68569-4}, doi = {10.1007/978-0-387-68569-4}, isbn = {978-0-387-32724-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Shoniregun07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/WangJW07, author = {Lingyu Wang and Sushil Jajodia and Duminda Wijesekera}, title = {Preserving Privacy in On-Line Analytical Processing {(OLAP)}}, series = {Advances in Information Security}, volume = {29}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46274-5}, doi = {10.1007/978-0-387-46274-5}, isbn = {978-0-387-46273-8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/WangJW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/Singhal07, author = {Anoop Singhal}, title = {Data Warehousing and Data Mining Techniques for Cyber Security}, series = {Advances in Information Security}, volume = {31}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-47653-7}, doi = {10.1007/978-0-387-47653-7}, isbn = {978-0-387-26409-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Singhal07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AntoniouBBNO07, author = {Grigoris Antoniou and Matteo Baldoni and Piero A. Bonatti and Wolfgang Nejdl and Daniel Olmedilla}, editor = {Ting Yu and Sushil Jajodia}, title = {Rule-based Policy Specification}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {169--216}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_6}, doi = {10.1007/978-0-387-27696-0\_6}, timestamp = {Mon, 04 Apr 2022 16:00:08 +0200}, biburl = {https://dblp.org/rec/series/ais/AntoniouBBNO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BarfordY07, author = {Paul Barford and Vinod Yegneswaran}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {An Inside Look at Botnets}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {171--191}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_8}, doi = {10.1007/978-0-387-44599-1\_8}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/BarfordY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BearlyK07, author = {Terry Bearly and Vijay Kumar}, editor = {Ting Yu and Sushil Jajodia}, title = {Building Trust and Security in Peer-to-Peer Systems}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {259--287}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_8}, doi = {10.1007/978-0-387-27696-0\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BearlyK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BrumleyNS07, author = {David Brumley and James Newsome and Dawn Song}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Sting: An End-to-End Self-Healing System for Defending against Internet Worms}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {147--170}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_7}, doi = {10.1007/978-0-387-44599-1\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BrumleyNS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Capkun07, author = {Srdjan Capkun}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Securing Localization in Wireless Networks \emph{(using Verifiable Multilateration and Covert Base Stations)}}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {249--278}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_11}, doi = {10.1007/978-0-387-46276-9\_11}, timestamp = {Mon, 15 Jun 2020 07:44:16 +0200}, biburl = {https://dblp.org/rec/series/ais/Capkun07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CapkunGHS07, author = {Srdjan Capkun and Saurabh Ganeriwal and Simon Han and Mani B. Srivastava}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Securing Timing Synchronization in Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {369--389}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_16}, doi = {10.1007/978-0-387-46276-9\_16}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CapkunGHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ChristodorescuR07, author = {Mihai Christodorescu and Shai Rubin}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {193--209}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_9}, doi = {10.1007/978-0-387-44599-1\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ChristodorescuR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CirianiVFS07, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Pierangela Samarati}, editor = {Ting Yu and Sushil Jajodia}, title = {Microdata Protection}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {291--321}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_9}, doi = {10.1007/978-0-387-27696-0\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CirianiVFS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CirianiVFS07a, author = {Valentina Ciriani and Sabrina De Capitani di Vimercati and Sara Foresti and Pierangela Samarati}, editor = {Ting Yu and Sushil Jajodia}, title = {\emph{k}-Anonymity}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {323--353}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_10}, doi = {10.1007/978-0-387-27696-0\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CirianiVFS07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FangDN07, author = {Lei Fang and Wenliang Du and Peng Ning}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {33--55}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_2}, doi = {10.1007/978-0-387-46276-9\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FangDN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/HacigumusHIM07, author = {Hakan Hacig{\"{u}}m{\"{u}}s and Bijit Hore and Balakrishna R. Iyer and Sharad Mehrotra}, editor = {Ting Yu and Sushil Jajodia}, title = {Search on Encrypted Data}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {383--425}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_12}, doi = {10.1007/978-0-387-27696-0\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/HacigumusHIM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/HalfondO07, author = {William G. J. Halfond and Alessandro Orso}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Detection and Prevention of {SQL} Injection Attacks}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {85--109}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_5}, doi = {10.1007/978-0-387-44599-1\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/HalfondO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/HuangYMS07, author = {Leping Huang and Hiroshi Yamane and Kanta Matsuura and Kaoru Sezaki}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Location Privacy in Wireless {LAN}}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {299--322}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_13}, doi = {10.1007/978-0-387-46276-9\_13}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/HuangYMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/JajodiaY07, author = {Sushil Jajodia and Ting Yu}, editor = {Ting Yu and Sushil Jajodia}, title = {Basic Security Concepts}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {3--20}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_1}, doi = {10.1007/978-0-387-27696-0\_1}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/JajodiaY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KrishnamachariY07, author = {Bhaskar Krishnamachari and Kiran Yedavalli}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Secure Sequence-based Localization for Wireless Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {237--247}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_10}, doi = {10.1007/978-0-387-46276-9\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KrishnamachariY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Kruegel07, author = {Christopher Kruegel}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Behavioral and Structural Properties of Malicious Code}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {63--83}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_4}, doi = {10.1007/978-0-387-44599-1\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Kruegel07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KudoQ07, author = {Michiharu Kudo and Naizhen Qi}, editor = {Ting Yu and Sushil Jajodia}, title = {Access Control Policy Models for {XML}}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {97--126}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_4}, doi = {10.1007/978-0-387-27696-0\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KudoQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LazosP07, author = {Loukas Lazos and Radha Poovendran}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Secure Localization for Wireless Sensor Networks using Range-Independent Methods}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {185--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_8}, doi = {10.1007/978-0-387-46276-9\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LazosP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LeeSWY07, author = {Adam J. Lee and Kent E. Seamons and Marianne Winslett and Ting Yu}, editor = {Ting Yu and Sushil Jajodia}, title = {Automated Trust Negotiation in Open Systems}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {217--258}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_7}, doi = {10.1007/978-0-387-27696-0\_7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LeeSWY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LymberopoulosS07, author = {Dimitrios Lymberopoulos and Andreas Savvides}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Experiences from the Empirical Evaluation of Two Physical Layers for Node Localization}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {105--134}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_5}, doi = {10.1007/978-0-387-46276-9\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LymberopoulosS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MeadowsPPCS07, author = {Catherine Meadows and Radha Poovendran and Dusko Pavlovic and LiWu Chang and Paul F. Syverson}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {279--298}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_12}, doi = {10.1007/978-0-387-46276-9\_12}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MeadowsPPCS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/NingLD07, author = {Peng Ning and Donggang Liu and Wenliang Du}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Secure and Resilient Localization in Wireless Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {161--184}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_7}, doi = {10.1007/978-0-387-46276-9\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/NingLD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PandeyAA07, author = {Santosh Pandey and Farooq Anjum and Prathima Agrawal}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {TRaVarSeL-Transmission Range Variation based Secure Localization}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {215--236}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_9}, doi = {10.1007/978-0-387-46276-9\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PandeyAA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PathiranaBSJD07, author = {Pubudu N. Pathirana and Nirupama Bulusu and Andrey V. Savkin and Sanjay K. Jha and Thanh Dang}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {83--103}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_4}, doi = {10.1007/978-0-387-46276-9\_4}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/PathiranaBSJD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/PatwariHC07, author = {Neal Patwari and Alfred O. Hero III and Jose A. Costa}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Learning Sensor Location from Signal Strength and Connectivity}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {57--81}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_3}, doi = {10.1007/978-0-387-46276-9\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/PatwariHC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RepsBLT07, author = {Thomas W. Reps and Gogul Balakrishnan and Junghee Lim and Tim Teitelbaum}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {A Next-Generation Platform for Analyzing Executables}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {43--61}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_3}, doi = {10.1007/978-0-387-44599-1\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/RepsBLT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RoostaMS07, author = {Tanya G. Roosta and Michael Manzo and Shankar Sastry}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Time Synchronization Attacks in Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {325--345}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_14}, doi = {10.1007/978-0-387-46276-9\_14}, timestamp = {Tue, 07 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/RoostaMS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SeshadriLPDK07, author = {Arvind Seshadri and Mark Luk and Adrian Perrig and Leendert van Doorn and Pradeep K. Khosla}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution on Legacy Systems}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {253--289}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_12}, doi = {10.1007/978-0-387-44599-1\_12}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/SeshadriLPDK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SidiroglouK07, author = {Stelios Sidiroglou and Angelos D. Keromytis}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Composite Hybrid Techniques For Defending Against Targeted Attacks}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {213--229}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_10}, doi = {10.1007/978-0-387-44599-1\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SidiroglouK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Sion07, author = {Radu Sion}, editor = {Ting Yu and Sushil Jajodia}, title = {Rights Assessment for Relational Data}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {427--457}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_13}, doi = {10.1007/978-0-387-27696-0\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Sion07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Smith07, author = {Geoffrey Smith}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Principles of Secure Information Flow Analysis}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {291--307}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_13}, doi = {10.1007/978-0-387-44599-1\_13}, timestamp = {Mon, 19 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Smith07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/StoleruHS07, author = {Radu Stoleru and Tian He and John A. Stankovic}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Range-Free Localization}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {3--31}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_1}, doi = {10.1007/978-0-387-46276-9\_1}, timestamp = {Fri, 13 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/StoleruHS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/StolfoWL07, author = {Salvatore J. Stolfo and Ke Wang and Wei{-}Jen Li}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Towards Stealthy Malware Detection}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {231--249}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_11}, doi = {10.1007/978-0-387-44599-1\_11}, timestamp = {Thu, 24 Aug 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/StolfoWL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SunNW07, author = {Kun Sun and Peng Ning and Cliff Wang}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Secure and Resilient Time Synchronization in Wireless Sensor Networks}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {347--367}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_15}, doi = {10.1007/978-0-387-46276-9\_15}, timestamp = {Thu, 02 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SunNW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Vigna07, author = {Giovanni Vigna}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Static Disassembly and Code Analysis}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {19--41}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_2}, doi = {10.1007/978-0-387-44599-1\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Vigna07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/VimercatiFJS07, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Pierangela Samarati}, editor = {Ting Yu and Sushil Jajodia}, title = {Access Control Policies and Languages in Open Environments}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {21--58}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_2}, doi = {10.1007/978-0-387-27696-0\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/VimercatiFJS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/WangJW07, author = {Lingyu Wang and Sushil Jajodia and Duminda Wijesekera}, editor = {Ting Yu and Sushil Jajodia}, title = {Preserving Privacy in On-line Analytical Processing Data Cubes}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {355--380}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_11}, doi = {10.1007/978-0-387-27696-0\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/WangJW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/WangSLCA07, author = {Wendy Hui Wang and Divesh Srivastava and Laks V. S. Lakshmanan and SungRan Cho and Sihem Amer{-}Yahia}, editor = {Ting Yu and Sushil Jajodia}, title = {Optimizing Tree Pattern Queries over Secure {XML} Databases}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {127--165}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_5}, doi = {10.1007/978-0-387-27696-0\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/WangSLCA07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/WeaverSP07, author = {Nicholas Weaver and Stuart Staniford and Vern Paxson}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Very Fast Containment of Scanning Worms, Revisited}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {113--145}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_6}, doi = {10.1007/978-0-387-44599-1\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/WeaverSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/WittenN07, author = {Brian Witten and Carey Nachenberg}, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Malware Evolution: {A} Snapshot of Threats and Countermeasures in 2005}, booktitle = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, pages = {3--15}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1\_1}, doi = {10.1007/978-0-387-44599-1\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/WittenN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/YuLZJ07, author = {Meng Yu and Peng Liu and Wanyu Zang and Sushil Jajodia}, editor = {Ting Yu and Sushil Jajodia}, title = {Trusted Recovery}, booktitle = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, pages = {59--94}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-27696-0\_3}, doi = {10.1007/978-0-387-27696-0\_3}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/YuLZJ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ZhangTLJN07, author = {Yanyong Zhang and Wade Trappe and Zang Li and Manali Joglekar and Badri Nath}, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Robust Wireless Localization: Attacks and Defenses}, booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, pages = {137--160}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9\_6}, doi = {10.1007/978-0-387-46276-9\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ZhangTLJN07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/27, editor = {Mihai Christodorescu and Somesh Jha and Douglas Maughan and Dawn Song and Cliff Wang}, title = {Malware Detection}, series = {Advances in Information Security}, volume = {27}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-44599-1}, doi = {10.1007/978-0-387-44599-1}, isbn = {978-0-387-32720-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/27.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/30, editor = {Radha Poovendran and Sumit Roy and Cliff Wang}, title = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, series = {Advances in Information Security}, volume = {30}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-0-387-46276-9}, doi = {10.1007/978-0-387-46276-9}, isbn = {978-0-387-32721-1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/30.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/33, editor = {Ting Yu and Sushil Jajodia}, title = {Secure Data Management in Decentralized Systems}, series = {Advances in Information Security}, volume = {33}, publisher = {Springer}, year = {2007}, isbn = {978-0-387-27694-6}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/33.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/AxelssonS06, author = {Stefan Axelsson and David Sands}, title = {Understanding Intrusion Detection Through Visualization}, series = {Advances in Information Security}, volume = {24}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-27636-X}, doi = {10.1007/0-387-27636-X}, isbn = {978-0-387-27634-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/AxelssonS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Aycock06, author = {John Aycock}, title = {Computer Viruses and Malware}, series = {Advances in Information Security}, volume = {22}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-34188-9}, doi = {10.1007/0-387-34188-9}, isbn = {978-0-387-30236-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Aycock06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/CookK06, author = {Debra L. Cook and Angelos D. Keromytis}, title = {CryptoGraphics - Exploiting Graphics Cards for Security}, series = {Advances in Information Security}, volume = {20}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-34189-7}, doi = {10.1007/0-387-34189-7}, isbn = {978-0-387-29015-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/CookK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/DingGS06, author = {Jintai Ding and Jason E. Gower and Dieter Schmidt}, title = {Multivariate Public Key Cryptosystems}, series = {Advances in Information Security}, volume = {25}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36946-4}, doi = {10.1007/978-0-387-36946-4}, isbn = {978-0-387-32229-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/DingGS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/HuangG06, author = {Chin{-}Tser Huang and Mohamed G. Gouda}, title = {Hop Integrity in the Internet}, series = {Advances in Information Security}, volume = {21}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-29444-9}, doi = {10.1007/0-387-29444-9}, isbn = {978-0-387-24426-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/HuangG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/VaidyaZC06, author = {Jaideep Vaidya and Yu Zhu and Christopher W. Clifton}, title = {Privacy Preserving Data Mining}, series = {Advances in Information Security}, volume = {19}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-29489-6}, doi = {10.1007/978-0-387-29489-6}, isbn = {978-0-387-25886-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/VaidyaZC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Vielhauer06, author = {Claus Vielhauer}, title = {Biometric User Authentication for it Security - From Fundamentals to Handwriting}, series = {Advances in Information Security}, volume = {18}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/0-387-28094-4}, doi = {10.1007/0-387-28094-4}, isbn = {978-0-387-26194-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Vielhauer06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AlataDDKKNPP06, author = {Eric Alata and Marc Dacier and Yves Deswarte and M. Kaa{\^{a}}niche and K. Kortchinsky and Vincent Nicomette and Van{-}Hau Pham and Fabien Pouget}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Collection and analysis of attack data based on honeypots deployed on the Internet}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {79--91}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_7}, doi = {10.1007/978-0-387-36584-8\_7}, timestamp = {Sun, 02 Oct 2022 16:18:05 +0200}, biburl = {https://dblp.org/rec/series/ais/AlataDDKKNPP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AtzeniL06, author = {Andrea S. Atzeni and Antonio Lioy}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Why to adopt a security metric? {A} brief survey}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {1--12}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_1}, doi = {10.1007/978-0-387-36584-8\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/AtzeniL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BalzarottiMS06, author = {Davide Balzarotti and Mattia Monga and Sabrina Sicari}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Assessing the risk of using vulnerable components}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {65--77}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_6}, doi = {10.1007/978-0-387-36584-8\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/BalzarottiMS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CasolaMMR06, author = {Valentina Casola and Antonino Mazzeo and Nicola Mazzocca and Massimiliano Rak}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {A {SLA} evaluation methodology in Service Oriented Architectures}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {119--130}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_10}, doi = {10.1007/978-0-387-36584-8\_10}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/CasolaMMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Cervesato06, author = {Iliano Cervesato}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Towards a Notion of Quantitative Security Analysis}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {131--143}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_11}, doi = {10.1007/978-0-387-36584-8\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Cervesato06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/DamianiVFSV06, author = {Ernesto Damiani and Sabrina De Capitani di Vimercati and Sara Foresti and Pierangela Samarati and Marco Viviani}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Measuring Inference Exposure in Outsourced Encrypted Databases}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {185--195}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_15}, doi = {10.1007/978-0-387-36584-8\_15}, timestamp = {Mon, 21 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/DamianiVFSV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FoleyBOHS06, author = {Simon N. Foley and Stefano Bistarelli and Barry O'Sullivan and John Herbert and Garret Swart}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Multilevel Security and Quality of Protection}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {93--105}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_8}, doi = {10.1007/978-0-387-36584-8\_8}, timestamp = {Fri, 09 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FoleyBOHS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KarjothPSW06, author = {G{\"{u}}nter Karjoth and Birgit Pfitzmann and Matthias Schunter and Michael Waidner}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Service-oriented Assurance - Comprehensive Security by Explicit Assurances}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {13--24}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_2}, doi = {10.1007/978-0-387-36584-8\_2}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KarjothPSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KesdoganP06, author = {Dogan Kesdogan and Lexi Pimenidis}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {The Lower Bound of Attacks on Anonymity Systems - {A} Unicity Distance Approach}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {145--158}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_12}, doi = {10.1007/978-0-387-36584-8\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KesdoganP06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KesdoganPK06, author = {Dogan Kesdogan and Lexi Pimenidis and Tobias K{\"{o}}lsch}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {159--171}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_13}, doi = {10.1007/978-0-387-36584-8\_13}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KesdoganPK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LundinLBF06, author = {Reine Lundin and Stefan Lindskog and Anna Brunstr{\"{o}}m and Simone Fischer{-}H{\"{u}}bner}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Using Guesswork as a Measure for Confidentiality of Selectively Encrypted Messages}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {173--184}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_14}, doi = {10.1007/978-0-387-36584-8\_14}, timestamp = {Mon, 10 Dec 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/LundinLBF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/McQueenBFB06, author = {Miles A. McQueen and Wayne F. Boyer and Mark A. Flynn and George A. Beitel}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Time-to-Compromise Model for Cyber Risk Reduction Estimation}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {49--64}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_5}, doi = {10.1007/978-0-387-36584-8\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/McQueenBFB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MullenG06, author = {Robert E. Mullen and Swapna S. Gokhale}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {A Discrete Lognormal Model for Software Defects Affecting Quality of Protection}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {37--47}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_4}, doi = {10.1007/978-0-387-36584-8\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MullenG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Ozment06, author = {Andy Ozment}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Software Security Growth Modeling: Examining Vulnerabilities with Reliability Growth Models}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {25--36}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_3}, doi = {10.1007/978-0-387-36584-8\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Ozment06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RossebeoLHR06, author = {Judith E. Y. Rossebe{\o} and Mass Soldal Lund and Knut Eilif Husa and Atle Refsdal}, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {A Conceptual Model for Service Availability}, booktitle = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, pages = {107--118}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8\_9}, doi = {10.1007/978-0-387-36584-8\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/RossebeoLHR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/23, editor = {Dieter Gollmann and Fabio Massacci and Artsiom Yautsiukhin}, title = {Quality of Protection - Security Measurements and Metrics}, series = {Advances in Information Security}, volume = {23}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36584-8}, doi = {10.1007/978-0-387-36584-8}, isbn = {978-0-387-29016-4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/KruegelVV05, author = {Christopher Kruegel and Fredrik Valeur and Giovanni Vigna}, title = {Intrusion Detection and Correlation - Challenges and Solutions}, series = {Advances in Information Security}, volume = {14}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b101493}, doi = {10.1007/B101493}, isbn = {978-0-387-23398-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/KruegelVV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/McGuireG05, author = {Tommy M. McGuire and Mohamed G. Gouda}, title = {The Austin Protocol Compiler}, series = {Advances in Information Security}, volume = {13}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b101038}, doi = {10.1007/B101038}, isbn = {978-0-387-23227-0}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/McGuireG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Shoniregun05, author = {Charles A. Shoniregun}, title = {Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises {(TEISMES)}}, series = {Advances in Information Security}, volume = {17}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b137376}, doi = {10.1007/B137376}, isbn = {978-0-387-24343-6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Shoniregun05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Weippl05, author = {Edgar R. Weippl}, title = {Security in E-Learning}, series = {Advances in Information Security}, volume = {16}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b136702}, doi = {10.1007/B136702}, isbn = {978-0-387-24341-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Weippl05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/X05, title = {Image and Video Encryption - From Digital Rights Management to Secured Personal Communication}, series = {Advances in Information Security}, volume = {15}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/b101495}, doi = {10.1007/B101495}, isbn = {978-0-387-23402-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/X05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Acquisti04, author = {Alessandro Acquisti}, editor = {L. Jean Camp and Stephen Lewis}, title = {Privacy and Security of Personal Information - Economic Incentives and Technological Solutions}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {179--186}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_14}, doi = {10.1007/1-4020-8090-5\_14}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Acquisti04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AcquistiG04, author = {Alessandro Acquisti and Jens Grossklags}, editor = {L. Jean Camp and Stephen Lewis}, title = {Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic Discounting}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {165--178}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_13}, doi = {10.1007/1-4020-8090-5\_13}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/AcquistiG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Anderson04, author = {Ross J. Anderson}, editor = {L. Jean Camp and Stephen Lewis}, title = {Cryptography and Competition Policy - Issues with 'Trusted Computing'}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {35--52}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_3}, doi = {10.1007/1-4020-8090-5\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Anderson04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/CampW04, author = {L. Jean Camp and Catherine Wolfram}, editor = {L. Jean Camp and Stephen Lewis}, title = {Pricing Security - {A} Market in Vulnerabilities}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {17--34}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_2}, doi = {10.1007/1-4020-8090-5\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/CampW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Cavusoglu04, author = {Huseyin Cavusoglu}, editor = {L. Jean Camp and Stephen Lewis}, title = {Economics of {IT} Security Management}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {71--83}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_6}, doi = {10.1007/1-4020-8090-5\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Cavusoglu04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/FarahmandNSE04, author = {Fariborz Farahmand and Shamkant B. Navathe and Gunter P. Sharp and Philip H. Enslow Jr.}, editor = {L. Jean Camp and Stephen Lewis}, title = {Evaluating Damages Caused by Information Systems Security Incidents}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {85--94}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_7}, doi = {10.1007/1-4020-8090-5\_7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/FarahmandNSE04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Gal-OrG04, author = {Esther Gal{-}Or and Anindya Ghose}, editor = {L. Jean Camp and Stephen Lewis}, title = {The Economic Consequences of Sharing Security Information}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {95--104}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_8}, doi = {10.1007/1-4020-8090-5\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Gal-OrG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/GordonL04, author = {Lawrence A. Gordon and Martin P. Loeb}, editor = {L. Jean Camp and Stephen Lewis}, title = {The Economics of Information Security Investment}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {105--125}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_9}, doi = {10.1007/1-4020-8090-5\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/GordonL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Landwehr04, author = {Carl E. Landwehr}, editor = {L. Jean Camp and Stephen Lewis}, title = {Improving Information Flow in the Information Security Market - DoD Experience and Future Directions}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {155--163}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_12}, doi = {10.1007/1-4020-8090-5\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Landwehr04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Lewis04, author = {Stephen Lewis}, editor = {L. Jean Camp and Stephen Lewis}, title = {How Much is Stronger {DRM} Worth?}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {53--57}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_4}, doi = {10.1007/1-4020-8090-5\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Lewis04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LookabaughS04, author = {Tom D. Lookabaugh and Douglas C. Sicker}, editor = {L. Jean Camp and Stephen Lewis}, title = {Security and Lock-In}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {225--246}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_17}, doi = {10.1007/1-4020-8090-5\_17}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/LookabaughS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Odlyzko04, author = {Andrew M. Odlyzko}, editor = {L. Jean Camp and Stephen Lewis}, title = {Privacy, Economics, and Price Discrimination on the Internet}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {187--211}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_15}, doi = {10.1007/1-4020-8090-5\_15}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Odlyzko04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/RosascoL04, author = {Nicholas Rosasco and David Larochelle}, editor = {L. Jean Camp and Stephen Lewis}, title = {How and Why More Secure Technologies Succeed in Legacy Markets - Lessons from the Success of {SSH}}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {247--254}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_18}, doi = {10.1007/1-4020-8090-5\_18}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/RosascoL04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SandriniC04, author = {Mauro Sandrini and Ferdinando Cerbone}, editor = {L. Jean Camp and Stephen Lewis}, title = {We Want Security but We Hate It - The Foundations of security technoeconomics in the social worldfrom Control to Surveillance}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {213--223}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_16}, doi = {10.1007/1-4020-8090-5\_16}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SandriniC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SchechterGS04, author = {Stuart E. Schechter and Rachel Greenstadt and Michael D. Smith}, editor = {L. Jean Camp and Stephen Lewis}, title = {Trusted Computing, Peer-to-Peer Distribution, and The Economics of Pirated Entertainment}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {59--69}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_5}, doi = {10.1007/1-4020-8090-5\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SchechterGS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Schneier04, author = {Bruce Schneier}, editor = {L. Jean Camp and Stephen Lewis}, title = {Evaluating Security Systems: {A} Five-Step Process}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {289--293}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_20}, doi = {10.1007/1-4020-8090-5\_20}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Schneier04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ShostackS04, author = {Adam Shostack and Paul Syverson}, editor = {L. Jean Camp and Stephen Lewis}, title = {What Price Privacy? - and why identity theft is about neither identity nor theft}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {129--142}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_10}, doi = {10.1007/1-4020-8090-5\_10}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ShostackS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/ThompsonCG04, author = {Paul Thompson and George Cybenko and Annarita Giani}, editor = {L. Jean Camp and Stephen Lewis}, title = {Cognitive Hacking}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {255--287}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_19}, doi = {10.1007/1-4020-8090-5\_19}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/ThompsonCG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Varian04, author = {Hal R. Varian}, editor = {L. Jean Camp and Stephen Lewis}, title = {System Reliability and Free Riding}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {1--15}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_1}, doi = {10.1007/1-4020-8090-5\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Varian04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/VilaGM04, author = {Tony Vila and Rachel Greenstadt and David Molnar}, editor = {L. Jean Camp and Stephen Lewis}, title = {Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy Economics as a Lemons Market}, booktitle = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, pages = {143--153}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/1-4020-8090-5\_11}, doi = {10.1007/1-4020-8090-5\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/VilaGM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/12, editor = {L. Jean Camp and Stephen Lewis}, title = {Economics of Information Security}, series = {Advances in Information Security}, volume = {12}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/b116816}, doi = {10.1007/B116816}, isbn = {1-4020-8089-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/NingJW03, author = {Peng Ning and Sushil Jajodia and Xiaoyang Sean Wang}, title = {Intrusion Detection in Distributed Systems - An Abstraction-Based Approach}, series = {Advances in Information Security}, volume = {9}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0467-2}, doi = {10.1007/978-1-4615-0467-2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/NingJW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Williams03, author = {Godfried Williams}, title = {Synchronizing E-Security}, series = {Advances in Information Security}, volume = {10}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0493-1}, doi = {10.1007/978-1-4615-0493-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Williams03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BruschiPR03, author = {Danilo Bruschi and Giusi Poletti and Emilia Rosti}, editor = {Dimitris Gritzalis}, title = {E-vote and Pki's: a Need, a Bliss or a Curse?}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {195--209}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_13}, doi = {10.1007/978-1-4615-0239-5\_13}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/BruschiPR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/BurmesterM03, author = {Mike Burmester and Emmanouil Magkos}, editor = {Dimitris Gritzalis}, title = {Towards Secure and Practical E-Elections in the New Era}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {63--76}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_5}, doi = {10.1007/978-1-4615-0239-5\_5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/BurmesterM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Chaum03, author = {David Chaum}, editor = {Dimitris Gritzalis}, title = {Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {211--219}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_14}, doi = {10.1007/978-1-4615-0239-5\_14}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Chaum03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Cranor03, author = {Lorrie Faith Cranor}, editor = {Dimitris Gritzalis}, title = {In Search of the Perfect Voting Technology: No Easy Answers}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {17--30}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_2}, doi = {10.1007/978-1-4615-0239-5\_2}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Cranor03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/DamgardGS03, author = {Ivan Damg{\aa}rd and Jens Groth and Gorm Salomonsen}, editor = {Dimitris Gritzalis}, title = {The Theory and Implementation of an Electronic Voting System}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {77--98}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_6}, doi = {10.1007/978-1-4615-0239-5\_6}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/DamgardGS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Gerck03, author = {Ed Gerck}, editor = {Dimitris Gritzalis}, title = {Private, Secure and Auditable Internet Voting}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {165--179}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_11}, doi = {10.1007/978-1-4615-0239-5\_11}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Gerck03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Jones03, author = {Douglas W. Jones}, editor = {Dimitris Gritzalis}, title = {The Evaluation of Voting Technology}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {3--16}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_1}, doi = {10.1007/978-1-4615-0239-5\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Jones03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/KiayiasY03, author = {Aggelos Kiayias and Moti Yung}, editor = {Dimitris Gritzalis}, title = {Robust Verifiable non-Interactive Zero-Sharing - {A} Plug-in Utility for Enhanced Voters' Privacy}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {139--151}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_9}, doi = {10.1007/978-1-4615-0239-5\_9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/KiayiasY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/LambrinoudakisGTKI03, author = {Costas Lambrinoudakis and Dimitris Gritzalis and Vassilis Tsoumas and Maria Karyda and Spyros Ikonomopoulos}, editor = {Dimitris Gritzalis}, title = {Secure Electronic Voting: the Current Landscape}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {101--122}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_7}, doi = {10.1007/978-1-4615-0239-5\_7}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/LambrinoudakisGTKI03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MercuriN03, author = {Rebecca T. Mercuri and Peter G. Neumann}, editor = {Dimitris Gritzalis}, title = {Verification for Electronic Balloting Systems}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {31--42}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_3}, doi = {10.1007/978-1-4615-0239-5\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MercuriN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/MitrouGKQ03, author = {Lilian Mitrou and Dimitris Gritzalis and Sokratis K. Katsikas and Gerald Quirchmayr}, editor = {Dimitris Gritzalis}, title = {Electronic Voting: Constitutional and Legal Requirements, and Their Technical Implications}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {43--60}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_4}, doi = {10.1007/978-1-4615-0239-5\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/MitrouGKQ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Peralta03, author = {Ren{\'{e}} Peralta}, editor = {Dimitris Gritzalis}, title = {Issues, Non-Issues, and Cryptographic Tools for Internet-Based Voting}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {153--164}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_10}, doi = {10.1007/978-1-4615-0239-5\_10}, timestamp = {Fri, 03 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/Peralta03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Saltman03, author = {Roy G. Saltman}, editor = {Dimitris Gritzalis}, title = {Public Confidence and Auditability in Voting Systems}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {125--137}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_8}, doi = {10.1007/978-1-4615-0239-5\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Saltman03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/TrechselMK03, author = {Alexander H. Trechsel and Fernando Mendez and Raphael Kies}, editor = {Dimitris Gritzalis}, title = {Remote Voting via the Internet? - The Canton of Geneva pilot project}, booktitle = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, pages = {181--194}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5\_12}, doi = {10.1007/978-1-4615-0239-5\_12}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/TrechselMK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/7, editor = {Dimitris Gritzalis}, title = {Secure Electronic Voting}, series = {Advances in Information Security}, volume = {7}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-1-4615-0239-5}, doi = {10.1007/978-1-4615-0239-5}, isbn = {1-4020-7301-1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/7.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/Kirli02, author = {Zeliha Dilsun Kirli}, title = {Mobile Computation with Functions}, series = {Advances in Information Security}, volume = {5}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-1007-9}, doi = {10.1007/978-1-4615-1007-9}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/Kirli02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/LiRP02, author = {Jun Li and Peter L. Reiher and Gerald J. Popek}, title = {Disseminating Security Updates at Internet Scale}, series = {Advances in Information Security}, volume = {8}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/978-1-4615-1021-5}, doi = {10.1007/978-1-4615-1021-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/LiRP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/AntonE01, author = {Annie I. Ant{\'{o}}n and Julia Brande Earp}, editor = {Anup K. Ghosh}, title = {Strategies for Developing Policies and Requirements for Secure and Private Electronic Commerce}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {67--86}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_5}, doi = {10.1007/978-1-4615-1467-1\_5}, timestamp = {Tue, 16 May 2017 14:24:25 +0200}, biburl = {https://dblp.org/rec/series/ais/AntonE01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Arkin01, author = {Brad Arkin}, editor = {Anup K. Ghosh}, title = {Software Security Analysis: an Example Case Study}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {17--28}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_2}, doi = {10.1007/978-1-4615-1467-1\_2}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Arkin01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/DuA01, author = {Wenliang Du and Mikhail J. Atallah}, editor = {Anup K. Ghosh}, title = {Protocols for Secure Remote Database Access with Approximate Matching}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {87--111}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_6}, doi = {10.1007/978-1-4615-1467-1\_6}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/DuA01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Ghosh01, author = {Anup K. Ghosh}, editor = {Anup K. Ghosh}, title = {New Security Issues in Mobile E-Commerce}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {29--46}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_3}, doi = {10.1007/978-1-4615-1467-1\_3}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Ghosh01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/Goodman01, author = {Marc D. Goodman}, editor = {Anup K. Ghosh}, title = {Problems in Policing E-Commerce Crime}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {47--63}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_4}, doi = {10.1007/978-1-4615-1467-1\_4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/Goodman01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/JajodiaKS01, author = {Sushil Jajodia and Michiharu Kudo and V. S. Subrahmanian}, editor = {Anup K. Ghosh}, title = {Provisional Authorizations}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {133--159}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_8}, doi = {10.1007/978-1-4615-1467-1\_8}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/JajodiaKS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/SantosVK01, author = {Andr{\'{e}} L. M. dos Santos and Giovanni Vigna and Richard A. Kemmerer}, editor = {Anup K. Ghosh}, title = {Security Testing of an Online Banking Service}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {3--15}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_1}, doi = {10.1007/978-1-4615-1467-1\_1}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/SantosVK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ais/WangVZ01, author = {Hongxue Wang and Vijay Varadharajan and Yan Zhang}, editor = {Anup K. Ghosh}, title = {A New Approach to Reasoning About Accountability in Cryptographic Protocols for E-Commerce}, booktitle = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, pages = {113--131}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1\_7}, doi = {10.1007/978-1-4615-1467-1\_7}, timestamp = {Wed, 07 Mar 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/WangVZ01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/2, editor = {Anup K. Ghosh}, title = {E-Commerce Security and Privacy}, series = {Advances in Information Security}, volume = {2}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/978-1-4615-1467-1}, doi = {10.1007/978-1-4615-1467-1}, isbn = {0-7923-7399-5}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ais/2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.