Search dblp for Publications

export results for "stream:streams/series/ais:"

 download as .bib file

@book{DBLP:series/ais/FernandezOP24,
  author       = {Javier Hernandez Fernandez and
                  Aymen Omri and
                  Roberto Di Pietro},
  title        = {Physical Layer Security in Power Line Communications - Fundamentals,
                  Models and Applications},
  series       = {Advances in Information Security},
  volume       = {108},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57349-1},
  doi          = {10.1007/978-3-031-57349-1},
  isbn         = {978-3-031-57348-4},
  timestamp    = {Wed, 17 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FernandezOP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Moller23,
  author       = {Dietmar P. F. M{\"{o}}ller},
  title        = {Guide to Cybersecurity in Digital Transformation - Trends, Methods,
                  Technologies, Applications and Best Practices},
  series       = {Advances in Information Security},
  volume       = {103},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-26845-8},
  doi          = {10.1007/978-3-031-26845-8},
  isbn         = {978-3-031-26844-1},
  timestamp    = {Sun, 14 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Moller23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Montasari23,
  author       = {Reza Montasari},
  title        = {Countering Cyberterrorism - The Confluence of Artificial Intelligence,
                  Cyber Forensics and Digital Policing in {US} and {UK} National Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {101},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-21920-7},
  doi          = {10.1007/978-3-031-21920-7},
  isbn         = {978-3-031-21919-1},
  timestamp    = {Mon, 16 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Montasari23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/KarbabDDM21,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  title        = {Android Malware Detection using Machine Learning - Data-Driven Fingerprinting
                  and Threat Intelligence},
  series       = {Advances in Information Security},
  volume       = {86},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-74664-3},
  doi          = {10.1007/978-3-030-74664-3},
  isbn         = {978-3-030-74663-6},
  timestamp    = {Mon, 19 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KarbabDDM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/PietroRCC21,
  author       = {Roberto Di Pietro and
                  Simone Raponi and
                  Maurantonio Caprolu and
                  Stefano Cresci},
  title        = {New Dimensions of Information Warfare},
  series       = {Advances in Information Security},
  volume       = {84},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-60618-3},
  doi          = {10.1007/978-3-030-60618-3},
  isbn         = {978-3-030-60617-6},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/PietroRCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Ryan21,
  author       = {Matthew Ryan},
  title        = {Ransomware Revolution: The Rise of a Prodigious Cyber Threat},
  series       = {Advances in Information Security},
  volume       = {85},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-66583-8},
  doi          = {10.1007/978-3-030-66583-8},
  isbn         = {978-3-030-66582-1},
  timestamp    = {Mon, 08 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Ryan21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/AlrabaeeDSWYRNMHH20,
  author       = {Saed Alrabaee and
                  Mourad Debbabi and
                  Paria Shirani and
                  Lingyu Wang and
                  Amr M. Youssef and
                  Ashkan Rahimian and
                  Lina Nouh and
                  Djedjiga Mouheb and
                  He Huang and
                  Aiman Hanna},
  title        = {Binary Code Fingerprinting for Cybersecurity - Application to Malicious
                  Code Fingerprinting},
  series       = {Advances in Information Security},
  volume       = {78},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-34238-8},
  doi          = {10.1007/978-3-030-34238-8},
  isbn         = {978-3-030-34237-1},
  timestamp    = {Fri, 06 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/AlrabaeeDSWYRNMHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/DingPS20,
  author       = {Jintai Ding and
                  Albrecht Petzoldt and
                  Dieter S. Schmidt},
  title        = {Multivariate Public Key Cryptosystems, Second Edition},
  series       = {Advances in Information Security},
  volume       = {80},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-1-0716-0987-3},
  doi          = {10.1007/978-1-0716-0987-3},
  isbn         = {978-1-0716-0985-9},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/DingPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Omondi20,
  author       = {Amos R. Omondi},
  title        = {Cryptography Arithmetic - Algorithms and Hardware Architectures},
  series       = {Advances in Information Security},
  volume       = {77},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-34142-8},
  doi          = {10.1007/978-3-030-34142-8},
  isbn         = {978-3-030-34141-1},
  timestamp    = {Mon, 03 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Omondi20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/ZhuX20,
  author       = {Quanyan Zhu and
                  Zhiheng Xu},
  title        = {Cross-Layer Design for Secure and Resilient Cyber-Physical Systems
                  - {A} Decision and Game Theoretic Approach, 3},
  series       = {Advances in Information Security},
  volume       = {81},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-60251-2},
  doi          = {10.1007/978-3-030-60251-2},
  isbn         = {978-3-030-60250-5},
  timestamp    = {Wed, 25 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/ZhuX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BelloP20,
  author       = {Gabriel Bello and
                  Alfredo J. Perez},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {On the Application of Financial Security Standards in Blockchain Platforms},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {247--267},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_13},
  doi          = {10.1007/978-3-030-38181-3\_13},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BelloP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ClickSPSD20,
  author       = {Kelly Click and
                  Amritraj Singh and
                  Reza M. Parizi and
                  Gautam Srivastava and
                  Ali Dehghantanha},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Immutable and Secure {IP} Address Protection Using Blockchain},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {233--246},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_12},
  doi          = {10.1007/978-3-030-38181-3\_12},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/ClickSPSD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/EkramifardASDP20,
  author       = {Ala Ekramifard and
                  Haleh Amintoosi and
                  Amin Hosseini Seno and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {A Systematic Literature Review of Integration of Blockchain and Artificial
                  Intelligence},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {147--160},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_8},
  doi          = {10.1007/978-3-030-38181-3\_8},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/EkramifardASDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/IslamK20,
  author       = {Md. Nazmul Islam and
                  Sandip Kundu},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {IoT Security, Privacy and Trust in Home-Sharing Economy via Blockchain},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {33--50},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_3},
  doi          = {10.1007/978-3-030-38181-3\_3},
  timestamp    = {Sun, 19 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/IslamK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KumarT20,
  author       = {Randhir Kumar and
                  Rakesh Tripathi},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Secure Healthcare Framework Using Blockchain and Public Key Cryptography},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {185--202},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_10},
  doi          = {10.1007/978-3-030-38181-3\_10},
  timestamp    = {Sun, 19 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KumarT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LiuHZPK20,
  author       = {Liyuan Liu and
                  Meng Han and
                  Yiyun Zhou and
                  Reza M. Parizi and
                  Mohammed Korayem},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Blockchain-Based Certification for Education, Employment, and Skill
                  with Incentive Mechanism},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {269--290},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_14},
  doi          = {10.1007/978-3-030-38181-3\_14},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LiuHZPK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MohNMK20,
  author       = {Melody Moh and
                  David Nguyen and
                  Teng{-}Sheng Moh and
                  Brian Khieu},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Blockchain for Efficient Public Key Infrastructure and Fault-Tolerant
                  Distributed Consensus},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {69--97},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_5},
  doi          = {10.1007/978-3-030-38181-3\_5},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/MohNMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/OmarB20,
  author       = {Ahmad Sghaier Omar and
                  Otman Basir},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Capability-Based Non-fungible Tokens Approach for a Decentralized
                  {AAA} Framework in IoT},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {7--31},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_2},
  doi          = {10.1007/978-3-030-38181-3\_2},
  timestamp    = {Sun, 19 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/OmarB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PariziDAC20,
  author       = {Reza M. Parizi and
                  Ali Dehghantanha and
                  Amin Azmoodeh and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Blockchain in Cybersecurity Realm: An Overview},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_1},
  doi          = {10.1007/978-3-030-38181-3\_1},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PariziDAC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RouzbahaniKDP20,
  author       = {Hossein Mohammadi Rouzbahani and
                  Hadis Karimipour and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Blockchain Applications in Power Systems: {A} Bibliometric Analysis},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_7},
  doi          = {10.1007/978-3-030-38181-3\_7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RouzbahaniKDP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SinghPHDKC20,
  author       = {Amritraj Singh and
                  Reza M. Parizi and
                  Meng Han and
                  Ali Dehghantanha and
                  Hadis Karimipour and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Public Blockchains Scalability: An Examination of Sharding and Segregated
                  Witness},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {203--232},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_11},
  doi          = {10.1007/978-3-030-38181-3\_11},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SinghPHDKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SrivastavaPD20,
  author       = {Gautam Srivastava and
                  Reza M. Parizi and
                  Ali Dehghantanha},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {The Future of Blockchain Technology in Healthcare Internet of Things
                  Security},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {161--184},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_9},
  doi          = {10.1007/978-3-030-38181-3\_9},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/SrivastavaPD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/TibaPZDKC20,
  author       = {Kevin Tiba and
                  Reza M. Parizi and
                  Qi Zhang and
                  Ali Dehghantanha and
                  Hadis Karimipour and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Secure Blockchain-Based Traffic Load Balancing Using Edge Computing
                  and Reinforcement Learning},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {99--128},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_6},
  doi          = {10.1007/978-3-030-38181-3\_6},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/TibaPZDKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Worley0BOSAMM20,
  author       = {Carl R. Worley and
                  Lu Yu and
                  Richard R. Brooks and
                  Jon Oakley and
                  Anthony Skjellum and
                  Amani Altarawneh and
                  Sai Medury and
                  Ujan Mukhopadhyay},
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Scrybe: {A} Second-Generation Blockchain Technology with Lightweight
                  Mining for Secure Provenance and Related Applications},
  booktitle    = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  pages        = {51--67},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3\_4},
  doi          = {10.1007/978-3-030-38181-3\_4},
  timestamp    = {Sun, 19 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Worley0BOSAMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/79,
  editor       = {Kim{-}Kwang Raymond Choo and
                  Ali Dehghantanha and
                  Reza M. Parizi},
  title        = {Blockchain Cybersecurity, Trust and Privacy},
  series       = {Advances in Information Security},
  volume       = {79},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38181-3},
  doi          = {10.1007/978-3-030-38181-3},
  isbn         = {978-3-030-38180-6},
  timestamp    = {Sun, 19 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/79.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/JiangWYLXZ19,
  author       = {Jiaojiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Bo Liu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Malicious Attack Propagation and Source Identification},
  series       = {Advances in Information Security},
  volume       = {73},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-02179-5},
  doi          = {10.1007/978-3-030-02179-5},
  isbn         = {978-3-030-02178-8},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/JiangWYLXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/MajumdarMWTOAJPWD19,
  author       = {Suryadipta Majumdar and
                  Taous Madi and
                  Yushun Wang and
                  Azadeh Tabiban and
                  Momen Oqaily and
                  Amir Alimohammadifar and
                  Yosr Jarraya and
                  Makan Pourzandi and
                  Lingyu Wang and
                  Mourad Debbabi},
  title        = {Cloud Security Auditing},
  series       = {Advances in Information Security},
  volume       = {76},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-23128-6},
  doi          = {10.1007/978-3-030-23128-6},
  isbn         = {978-3-030-23127-9},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/MajumdarMWTOAJPWD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AmbassaKWM18,
  author       = {Pacome L. Ambassa and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {Inferring Private User Behaviour Based on Information Leakage},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_7},
  doi          = {10.1007/978-3-319-91427-5\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AmbassaKWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GulW18,
  author       = {Ammara Gul and
                  Stephen D. Wolthusen},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {A Review on Attacks and Their Countermeasures in Power System State
                  Estimation},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {9--28},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_2},
  doi          = {10.1007/978-3-319-91427-5\_2},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GulW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KayemMW18,
  author       = {Anne V. D. M. Kayem and
                  Christoph Meinel and
                  Stephen D. Wolthusen},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {A Resilient Smart Micro-Grid Architecture for Resource Constrained
                  Environments},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {71--101},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_5},
  doi          = {10.1007/978-3-319-91427-5\_5},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KayemMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KayemWM18,
  author       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {Power Systems: {A} Matter of Security and Privacy},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_1},
  doi          = {10.1007/978-3-319-91427-5\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KayemWM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KishimotoYO18,
  author       = {Hikaru Kishimoto and
                  Naoto Yanai and
                  Shingo Okamura},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {An Anonymous Authentication Protocol for the Smart Grid},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {29--52},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_3},
  doi          = {10.1007/978-3-319-91427-5\_3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/KishimotoYO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LimbasiyaA18,
  author       = {Trupil Limbasiya and
                  Aakriti Arya},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {Attacks on Authentication and Authorization Models in Smart Grid},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {53--70},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_4},
  doi          = {10.1007/978-3-319-91427-5\_4},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LimbasiyaA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MarufuKW18,
  author       = {Anesu M. C. Marufu and
                  Anne V. D. M. Kayem and
                  Stephen D. Wolthusen},
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {The Design and Classification of Cheating Attacks on Power Marketing
                  Schemes in Resource Constrained Smart Micro-Grids},
  booktitle    = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  pages        = {103--144},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5\_6},
  doi          = {10.1007/978-3-319-91427-5\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MarufuKW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/71,
  editor       = {Anne V. D. M. Kayem and
                  Stephen D. Wolthusen and
                  Christoph Meinel},
  title        = {Smart Micro-Grid Systems Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {71},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-91427-5},
  doi          = {10.1007/978-3-319-91427-5},
  isbn         = {978-3-319-91426-8},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/71.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/ZhuLZY17,
  author       = {Tianqing Zhu and
                  Gang Li and
                  Wanlei Zhou and
                  Philip S. Yu},
  title        = {Differential Privacy and Applications},
  series       = {Advances in Information Security},
  volume       = {69},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-62004-6},
  doi          = {10.1007/978-3-319-62004-6},
  isbn         = {978-3-319-62002-2},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ZhuLZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Al-ShaerR16,
  author       = {Ehab Al{-}Shaer and
                  Mohammad Ashiqur Rahman},
  title        = {Security and Resiliency Analytics for Smart Grids - Static and Dynamic
                  Approaches},
  series       = {Advances in Information Security},
  volume       = {67},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-32871-3},
  doi          = {10.1007/978-3-319-32871-3},
  isbn         = {978-3-319-32870-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Al-ShaerR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/LiuW16,
  author       = {Wen Ming Liu and
                  Lingyu Wang},
  title        = {Preserving Privacy Against Side-Channel Leaks - From Data Publishing
                  to Web Applications},
  series       = {Advances in Information Security},
  volume       = {68},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-42644-0},
  doi          = {10.1007/978-3-319-42644-0},
  isbn         = {978-3-319-42642-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LiuW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Conti15,
  author       = {Mauro Conti},
  title        = {Secure Wireless Sensor Networks - Threats and Solutions},
  series       = {Advances in Information Security},
  volume       = {65},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-1-4939-3460-7},
  doi          = {10.1007/978-1-4939-3460-7},
  isbn         = {978-1-4939-3458-4},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Conti15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/HeckmanSTST15,
  author       = {Kristin E. Heckman and
                  Frank J. Stech and
                  Roshan K. Thomas and
                  Ben S. Schmoker and
                  Alexander W. Tsow},
  title        = {Cyber Denial, Deception and Counter Deception - {A} Framework for
                  Supporting Active Cyber Defense},
  series       = {Advances in Information Security},
  volume       = {64},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25133-2},
  doi          = {10.1007/978-3-319-25133-2},
  isbn         = {978-3-319-25131-8},
  timestamp    = {Wed, 29 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HeckmanSTST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Livraga15,
  author       = {Giovanni Livraga},
  title        = {Protecting Privacy in Data Release},
  series       = {Advances in Information Security},
  volume       = {57},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16109-9},
  doi          = {10.1007/978-3-319-16109-9},
  isbn         = {978-3-319-16108-2},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Livraga15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Al-ShaerR15,
  author       = {Ehab Al{-}Shaer and
                  Mohammad Ashiqur Rahman},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Attribution, Temptation, and Expectation: {A} Formal Framework for
                  Defense-by-Deception in Cyberwarfare},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {57--80},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_4},
  doi          = {10.1007/978-3-319-14039-1\_4},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Al-ShaerR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Ben-AsherG15,
  author       = {Noam Ben{-}Asher and
                  Cleotilde Gonzalez},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {CyberWar Game: {A} Paradigm for Understanding New Challenges of Cyber
                  War},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {207--220},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_10},
  doi          = {10.1007/978-3-319-14039-1\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Ben-AsherG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Dumitras15,
  author       = {Tudor Dumitras},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Understanding the Vulnerability Lifecycle for Risk Assessment and
                  Defense Against Sophisticated Cyber Attacks},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {265--285},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_13},
  doi          = {10.1007/978-3-319-14039-1\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Dumitras15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ElderLY15,
  author       = {Robert J. Elder and
                  Alexander H. Levis and
                  Bahram Yousefi},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Alternatives to Cyber Warfare: Deterrence and Assurance},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {15--35},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_2},
  doi          = {10.1007/978-3-319-14039-1\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ElderLY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GoelH15,
  author       = {Sanjay Goel and
                  Yuan Hong},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber War Games: Strategic Jostling Among Traditional Adversaries},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_1},
  doi          = {10.1007/978-3-319-14039-1\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GoelH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Hamilton15,
  author       = {Samuel N. Hamilton},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Automated Adversary Profiling},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {141--149},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_7},
  doi          = {10.1007/978-3-319-14039-1\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Hamilton15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/HeckmanS15,
  author       = {Kristin E. Heckman and
                  Frank J. Stech},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Counterdeception: How to Detect Denial {\&} Deception (D{\&}D)},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {103--140},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_6},
  doi          = {10.1007/978-3-319-14039-1\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HeckmanS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KiekintveldLP15,
  author       = {Christopher Kiekintveld and
                  Viliam Lis{\'{y}} and
                  Radek P{\'{\i}}bil},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Game-Theoretic Foundations for the Strategic Use of Honeypots in Network
                  Security},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {81--101},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_5},
  doi          = {10.1007/978-3-319-14039-1\_5},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KiekintveldLP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MarbleLMCAS15,
  author       = {Julie L. Marble and
                  William F. Lawless and
                  Ranjeev Mittu and
                  Joseph T. Coyne and
                  Myriam Abramson and
                  Ciara Sibley},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {The Human Factor in Cybersecurity: Robust {\&} Intelligent Defense},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {173--206},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_9},
  doi          = {10.1007/978-3-319-14039-1\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MarbleLMCAS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PaxtonRMH15,
  author       = {Napoleon C. Paxton and
                  Stephen Russell and
                  Ira S. Moskowitz and
                  Paul Hyden},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {A Survey of Community Detection Algorithms Based On Analysis-Intent},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {237--263},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_12},
  doi          = {10.1007/978-3-319-14039-1\_12},
  timestamp    = {Wed, 28 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PaxtonRMH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Prakash15,
  author       = {B. Aditya Prakash},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Graph Mining for Cyber Security},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {287--306},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_14},
  doi          = {10.1007/978-3-319-14039-1\_14},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Prakash15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PuzisE15,
  author       = {Rami Puzis and
                  Yuval Elovici},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Active Discovery of Hidden Profiles in Social Networks Using Malware},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {221--235},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_11},
  doi          = {10.1007/978-3-319-14039-1\_11},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PuzisE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RuefR15,
  author       = {Andrew Ruef and
                  Chris Rohlf},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Programming Language Theoretic Security in the Real World: {A} Mirage
                  or the Future?},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_15},
  doi          = {10.1007/978-3-319-14039-1\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RuefR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ShakarianSMP15,
  author       = {Paulo Shakarian and
                  Gerardo I. Simari and
                  Geoffrey Moores and
                  Simon Parsons},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Attribution: An Argumentation-Based Approach},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {151--171},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_8},
  doi          = {10.1007/978-3-319-14039-1\_8},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ShakarianSMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SweeneyC15,
  author       = {Patrick Sweeney and
                  George Cybenko},
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Identifying and Exploiting the Cyber High Ground for Botnets},
  booktitle    = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  pages        = {37--56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1\_3},
  doi          = {10.1007/978-3-319-14039-1\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SweeneyC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/56,
  editor       = {Sushil Jajodia and
                  Paulo Shakarian and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Warfare - Building the Scientific Foundation},
  series       = {Advances in Information Security},
  volume       = {56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-14039-1},
  doi          = {10.1007/978-3-319-14039-1},
  isbn         = {978-3-319-14038-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/56.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/GenovesePS14,
  author       = {Angelo Genovese and
                  Vincenzo Piuri and
                  Fabio Scotti},
  title        = {Touchless Palmprint Recognition Systems},
  series       = {Advances in Information Security},
  volume       = {60},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10365-5},
  doi          = {10.1007/978-3-319-10365-5},
  isbn         = {978-3-319-10364-8},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/GenovesePS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AlbaneseCJ14,
  author       = {Massimiliano Albanese and
                  Hasan {\c{C}}am and
                  Sushil Jajodia},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Automated Cyber Situation Awareness Tools and Models for Improving
                  Analyst Performance},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {47--60},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_3},
  doi          = {10.1007/978-3-319-10374-7\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AlbaneseCJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AlbaneseEJMPPSS14,
  author       = {Massimiliano Albanese and
                  Robert F. Erbacher and
                  Sushil Jajodia and
                  Cristian Molinaro and
                  Fabio Persia and
                  Antonio Picariello and
                  Giancarlo Sperl{\`{\i}} and
                  V. S. Subrahmanian},
  editor       = {Robinson E. Pino},
  title        = {Recognizing Unexplained Behavior in Network Traffic},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {39--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_3},
  doi          = {10.1007/978-1-4614-7597-2\_3},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AlbaneseEJMPPSS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AlbaneseJ14,
  author       = {Massimiliano Albanese and
                  Sushil Jajodia},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Formation of Awareness},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {47--62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_4},
  doi          = {10.1007/978-3-319-11391-3\_4},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AlbaneseJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Anderson14,
  author       = {Gustave W. Anderson},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Trusted Computation Through Biologically Inspired Processes},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {75--84},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_5},
  doi          = {10.1007/978-3-319-10374-7\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Anderson14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AtaharyDT14,
  author       = {Tanvir Atahary and
                  Scott Douglass and
                  Tarek M. Taha},
  editor       = {Robinson E. Pino},
  title        = {Hardware Accelerated Mining of Domain Knowledge},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {251--271},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_16},
  doi          = {10.1007/978-1-4614-7597-2\_16},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AtaharyDT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Berkovich14,
  author       = {Simon Y. Berkovich},
  editor       = {Robinson E. Pino},
  title        = {Formation of Artificial and Natural Intelligence in Big Data Environment},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {189--203},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_12},
  doi          = {10.1007/978-1-4614-7597-2\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Berkovich14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Berkovich14a,
  author       = {Simon Y. Berkovich},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Sustainability Problems and a Novelty in the Concept of Energy},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {119--133},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_8},
  doi          = {10.1007/978-3-319-10374-7\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Berkovich14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BlowersFFWCN14,
  author       = {Misty K. Blowers and
                  Stefan Fernandez and
                  Brandon Froberg and
                  Jonathan Williams and
                  George Corbin and
                  Kevin Nelson},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Data Mining in Cyber Operations},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {61--73},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_4},
  doi          = {10.1007/978-3-319-10374-7\_4},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BlowersFFWCN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BlowersW14,
  author       = {Misty K. Blowers and
                  Jonathan Williams},
  editor       = {Robinson E. Pino},
  title        = {Machine Learning Applied to Cyber Operations},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {155--175},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_10},
  doi          = {10.1007/978-1-4614-7597-2\_10},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BlowersW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CamMP14,
  author       = {Hasan {\c{C}}am and
                  Pierre A. Mouallem and
                  Robinson E. Pino},
  editor       = {Robinson E. Pino},
  title        = {Alert Data Aggregation and Transmission Prioritization over Mobile
                  Networks},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {205--220},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_13},
  doi          = {10.1007/978-1-4614-7597-2\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CamMP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ChengDLDSO14,
  author       = {Yi Cheng and
                  Julia Deng and
                  Jason H. Li and
                  Scott A. DeLoach and
                  Anoop Singhal and
                  Xinming Ou},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Metrics of Security},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {263--295},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_13},
  doi          = {10.1007/978-3-319-11391-3\_13},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/ChengDLDSO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/EndsleyC14,
  author       = {Mica R. Endsley and
                  Erik S. Connors},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Foundation and Challenges},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {7--27},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_2},
  doi          = {10.1007/978-3-319-11391-3\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/EndsleyC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/EvancichLLCTX14,
  author       = {Nicholas Evancich and
                  Zhuo Lu and
                  Jason H. Li and
                  Yi Cheng and
                  Joshua Tuttle and
                  Peng Xie},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Network-Wide Awareness},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {63--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_5},
  doi          = {10.1007/978-3-319-11391-3\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/EvancichLLCTX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GonzalezBOL14,
  author       = {Cleotilde Gonzalez and
                  Noam Ben{-}Asher and
                  Alessandro Oltramari and
                  Christian Lebiere},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Cognition and Technology},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {93--117},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_6},
  doi          = {10.1007/978-3-319-11391-3\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GonzalezBOL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Harang14,
  author       = {Richard E. Harang},
  editor       = {Robinson E. Pino},
  title        = {Bridging the Semantic Gap: Human Factors in Anomaly-Based Intrusion
                  Detection Systems},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {15--37},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_2},
  doi          = {10.1007/978-1-4614-7597-2\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Harang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Harang14a,
  author       = {Richard E. Harang},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Learning and Semantics},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {201--217},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_10},
  doi          = {10.1007/978-3-319-11391-3\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Harang14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/HealeyHH14,
  author       = {Christopher G. Healey and
                  Lihua Hao and
                  Steve E. Hutchinson},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Visualizations and Analysts},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {145--165},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_8},
  doi          = {10.1007/978-3-319-11391-3\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HealeyHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/HolsoppleSY14,
  author       = {Jared Holsopple and
                  Moises Sudit and
                  Shanchieh Jay Yang},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Impact Assessment},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {219--238},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_11},
  doi          = {10.1007/978-3-319-11391-3\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HolsoppleSY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Hutchinson14,
  author       = {Steve Hutchinson},
  editor       = {Robinson E. Pino},
  title        = {Semantic Features from Web-Traffic Streams},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {221--237},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_14},
  doi          = {10.1007/978-1-4614-7597-2\_14},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Hutchinson14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Jakobson14,
  author       = {Gabriel Jakobson},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Mission Resilience},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {297--322},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_14},
  doi          = {10.1007/978-3-319-11391-3\_14},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Jakobson14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Kott14,
  author       = {Alexander Kott},
  editor       = {Robinson E. Pino},
  title        = {Towards Fundamental Science of Cyber Security},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_1},
  doi          = {10.1007/978-1-4614-7597-2\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Kott14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KottBS14,
  author       = {Alexander Kott and
                  Norbou Buchler and
                  Kristin E. Schaefer},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Kinetic and Cyber},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {29--45},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_3},
  doi          = {10.1007/978-3-319-11391-3\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KottBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KottWE14,
  author       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Preview},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_1},
  doi          = {10.1007/978-3-319-11391-3\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KottWE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KottWE14a,
  author       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Concluding Thoughts},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {323--328},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_15},
  doi          = {10.1007/978-3-319-11391-3\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KottWE14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KudithipudiMSRP14,
  author       = {Dhireesha Kudithipudi and
                  Cory E. Merkel and
                  Michael Soltiz and
                  Garrett S. Rose and
                  Robinson E. Pino},
  editor       = {Robinson E. Pino},
  title        = {Design of Neuromorphic Architectures with Memristors},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {93--103},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_6},
  doi          = {10.1007/978-1-4614-7597-2\_6},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/KudithipudiMSRP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LohnMADM14,
  author       = {Andrew J. Lohn and
                  Patrick R. Mickel and
                  James B. Aimone and
                  Erik P. DeBenedictis and
                  Matthew J. Marinella},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Memristors as Synapses in Artificial Neural Networks: Biomimicry Beyond
                  Weight Change},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {135--150},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_9},
  doi          = {10.1007/978-3-319-10374-7\_9},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/LohnMADM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LykeE14,
  author       = {James Lyke and
                  Arthur H. Edwards},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Cyber Security Considerations for Reconfigurable Systems},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {183--209},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_13},
  doi          = {10.1007/978-3-319-10374-7\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LykeE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/McCormick14,
  author       = {Bruce McCormick},
  editor       = {Robinson E. Pino},
  title        = {Applying Cognitive Memory to CyberSecurity},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {63--73},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_4},
  doi          = {10.1007/978-1-4614-7597-2\_4},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/McCormick14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/McLean14,
  author       = {M. R. McLean},
  editor       = {Robinson E. Pino},
  title        = {Concurrent Learning Algorithm and the Importance Map},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {239--250},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_15},
  doi          = {10.1007/978-1-4614-7597-2\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/McLean14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/NixonCML14,
  author       = {Kent W. Nixon and
                  Yiran Chen and
                  Zhi{-}Hong Mao and
                  Kang Li},
  editor       = {Robinson E. Pino},
  title        = {User Classification and Authentication for Mobile Device Based on
                  Gesture Recognition},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {125--135},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_8},
  doi          = {10.1007/978-1-4614-7597-2\_8},
  timestamp    = {Mon, 04 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/NixonCML14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PerlovskyS14,
  author       = {Leonid I. Perlovsky and
                  Olexander Shevchenko},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Dynamic Logic Machine Learning for Cybersecurity},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {85--98},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_6},
  doi          = {10.1007/978-3-319-10374-7\_6},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PerlovskyS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PinoK14,
  author       = {Robinson E. Pino and
                  Alexander Kott},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Neuromorphic Computing for Cognitive Augmentation in Cyber Defense},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {19--45},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_2},
  doi          = {10.1007/978-3-319-10374-7\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PinoK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PinoOC14,
  author       = {Robinson E. Pino and
                  Antonio S. Oblea and
                  Kristy A. Campbell},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Memristor {SPICE} Model Simulation and Device Hardware Correlation},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {169--174},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_11},
  doi          = {10.1007/978-3-319-10374-7\_11},
  timestamp    = {Wed, 19 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PinoOC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PinoP14,
  author       = {Robinson E. Pino and
                  Youngok K. Pino},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Reconfigurable Memristor Based Computing Logic},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {175--182},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_12},
  doi          = {10.1007/978-3-319-10374-7\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PinoP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RoseKKMWY14,
  author       = {Garrett S. Rose and
                  Dhireesha Kudithipudi and
                  Ganesh Khedkar and
                  Nathan R. McDonald and
                  Bryant T. Wysocki and
                  Lok{-}Kwong Yan},
  editor       = {Robinson E. Pino},
  title        = {Nanoelectronics and Hardware Security},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {105--123},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_7},
  doi          = {10.1007/978-1-4614-7597-2\_7},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/RoseKKMWY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ShevenellSEP14,
  author       = {Michael J. Shevenell and
                  Justin L. Shumaker and
                  Arthur H. Edwards and
                  Robinson E. Pino},
  editor       = {Robinson E. Pino},
  title        = {Memristors and the Future of Cyber Security Hardware},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {273--285},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_17},
  doi          = {10.1007/978-1-4614-7597-2\_17},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ShevenellSEP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/TahaHYM14,
  author       = {Tarek M. Taha and
                  Raqibul Hasan and
                  Chris Yakopcic and
                  Mark R. McLean},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Low Power Neuromorphic Architectures to Enable Pervasive Deployment
                  of Intrusion Detection Systems},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {151--168},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_10},
  doi          = {10.1007/978-3-319-10374-7\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/TahaHYM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/UlicnyMKAS14,
  author       = {Brian E. Ulicny and
                  Jakub J. Moskal and
                  Mieczyslaw M. Kokar and
                  Keith Abe and
                  John Kei Smith},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Inference and Ontologies},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {167--199},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_9},
  doi          = {10.1007/978-3-319-11391-3\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/UlicnyMKAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WangK14,
  author       = {Xueyang Wang and
                  Ramesh Karri},
  editor       = {Robinson E. Pino},
  title        = {Detecting Kernel Control-Flow Modifying Rootkits},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {177--187},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_11},
  doi          = {10.1007/978-1-4614-7597-2\_11},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/WangK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WysockiMTRG14,
  author       = {Bryant T. Wysocki and
                  Nathan R. McDonald and
                  Clare Thiem and
                  Garrett S. Rose and
                  Mario Gomez II},
  editor       = {Robinson E. Pino},
  title        = {Hardware-Based Computational Intelligence for Size, Weight, and Power
                  Constrained Environments},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {137--153},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_9},
  doi          = {10.1007/978-1-4614-7597-2\_9},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/WysockiMTRG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/YangDHS14,
  author       = {Shanchieh Jay Yang and
                  Haitao Du and
                  Jared Holsopple and
                  Moises Sudit},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Attack Projection},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {239--261},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_12},
  doi          = {10.1007/978-3-319-11391-3\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/YangDHS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/YenEZ014,
  author       = {John Yen and
                  Robert F. Erbacher and
                  Chen Zhong and
                  Peng Liu},
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Cognitive Process},
  booktitle    = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  pages        = {119--144},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3\_7},
  doi          = {10.1007/978-3-319-11391-3\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/YenEZ014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/YuGXF14,
  author       = {Wei Yu and
                  Linqiang Ge and
                  Guobin Xu and
                  Xinwen Fu},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Towards Neural Network Based Malware Detection on Android Mobile Devices},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {99--117},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_7},
  doi          = {10.1007/978-3-319-10374-7\_7},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/YuGXF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Yufik14,
  author       = {Yan M. Yufik},
  editor       = {Robinson E. Pino},
  title        = {Understanding Cyber Warfare},
  booktitle    = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  pages        = {75--91},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2\_5},
  doi          = {10.1007/978-1-4614-7597-2\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Yufik14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Yufik14a,
  author       = {Yan Yufik},
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Situational Awareness, Sensemaking, and Situation Understanding in
                  Cyber Warfare},
  booktitle    = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7\_1},
  doi          = {10.1007/978-3-319-10374-7\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Yufik14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/55,
  editor       = {Robinson E. Pino},
  title        = {Network Science and Cybersecurity},
  series       = {Advances in Information Security},
  volume       = {55},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-1-4614-7597-2},
  doi          = {10.1007/978-1-4614-7597-2},
  isbn         = {978-1-4614-7596-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/55.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/61,
  editor       = {Robinson E. Pino and
                  Alexander Kott and
                  Michael J. Shevenell},
  title        = {Cybersecurity Systems for Human Cognition Augmentation},
  series       = {Advances in Information Security},
  volume       = {61},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10374-7},
  doi          = {10.1007/978-3-319-10374-7},
  isbn         = {978-3-319-10373-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/61.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/62,
  editor       = {Alexander Kott and
                  Cliff Wang and
                  Robert F. Erbacher},
  title        = {Cyber Defense and Situational Awareness},
  series       = {Advances in Information Security},
  volume       = {62},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11391-3},
  doi          = {10.1007/978-3-319-11391-3},
  isbn         = {978-3-319-11390-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/62.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/RathgebUW13,
  author       = {Christian Rathgeb and
                  Andreas Uhl and
                  Peter Wild},
  title        = {Iris Biometrics - From Segmentation to Template Security},
  series       = {Advances in Information Security},
  volume       = {59},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5571-4},
  doi          = {10.1007/978-1-4614-5571-4},
  isbn         = {978-1-4614-5570-7},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/RathgebUW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BilarCM13,
  author       = {Daniel Bilar and
                  George Cybenko and
                  John P. Murphy},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Adversarial Dynamics: The Conficker Case Study},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {41--71},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_3},
  doi          = {10.1007/978-1-4614-5416-8\_3},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BilarCM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Gonzalez13,
  author       = {Cleotilde Gonzalez},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {From Individual Decisions from Experience to Behavioral Game Theory:
                  Lessons for Cybersecurity},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_4},
  doi          = {10.1007/978-1-4614-5416-8\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Gonzalez13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GouesNCDFHKG13,
  author       = {Claire {Le Goues} and
                  Anh Nguyen{-}Tuong and
                  Hao Chen and
                  Jack W. Davidson and
                  Stephanie Forrest and
                  Jason Hiser and
                  John C. Knight and
                  Matthew Van Gundy},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Moving Target Defenses in the Helix Self-Regenerative Architecture},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {117--149},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_7},
  doi          = {10.1007/978-1-4614-5416-8\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GouesNCDFHKG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/JacksonHCLBF13,
  author       = {Todd Jackson and
                  Andrei Homescu and
                  Stephen Crane and
                  Per Larsen and
                  Stefan Brunthaler and
                  Michael Franz},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Diversifying the Software Stack Using Randomized {NOP} Insertion},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {151--173},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_8},
  doi          = {10.1007/978-1-4614-5416-8\_8},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/JacksonHCLBF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/JainAT13,
  author       = {Manish Jain and
                  Bo An and
                  Milind Tambe},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Security Games Applied to Real-World: Research Contributions and Challenges},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {15--39},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_2},
  doi          = {10.1007/978-1-4614-5416-8\_2},
  timestamp    = {Wed, 06 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/JainAT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Manadhata13,
  author       = {Pratyusa K. Manadhata},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Game Theoretic Approaches to Attack Surface Shifting},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {1--13},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_1},
  doi          = {10.1007/978-1-4614-5416-8\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Manadhata13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PappasPK13,
  author       = {Vasilis Pappas and
                  Michalis Polychronakis and
                  Angelos D. Keromytis},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Practical Software Diversification Using In-Place Code Randomization},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {175--202},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_9},
  doi          = {10.1007/978-1-4614-5416-8\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PappasPK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/TorrieriZJ13,
  author       = {Don J. Torrieri and
                  Sencun Zhu and
                  Sushil Jajodia},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Cyber Maneuver Against External Adversaries and Compromised Nodes},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {87--96},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_5},
  doi          = {10.1007/978-1-4614-5416-8\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/TorrieriZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/YackoskiBYL13,
  author       = {Justin Yackoski and
                  Harry Bullen and
                  Xiang Yu and
                  Jason H. Li},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Applying Self-Shielding Dynamics to the Network Architecture},
  booktitle    = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  pages        = {97--115},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8\_6},
  doi          = {10.1007/978-1-4614-5416-8\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/YackoskiBYL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/100,
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  V. S. Subrahmanian and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Moving Target Defense {II} - Application of Game Theory and Adversarial
                  Modeling},
  series       = {Advances in Information Security},
  volume       = {100},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-1-4614-5416-8},
  doi          = {10.1007/978-1-4614-5416-8},
  isbn         = {978-1-4614-5415-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/100.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Aycock11,
  author       = {John Aycock},
  title        = {Spyware and Adware},
  series       = {Advances in Information Security},
  volume       = {50},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-0-387-77741-2},
  doi          = {10.1007/978-0-387-77741-2},
  isbn         = {978-0-387-77740-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Aycock11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Foresti11,
  author       = {Sara Foresti},
  title        = {Preserving Privacy in Data Outsourcing},
  series       = {Advances in Information Security},
  volume       = {51},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4419-7659-8},
  doi          = {10.1007/978-1-4419-7659-8},
  isbn         = {978-1-4419-7658-1},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Foresti11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Al-Shaer11,
  author       = {Ehab Al{-}Shaer},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Toward Network Configuration Randomization for Moving Target Defense},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {153--159},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_9},
  doi          = {10.1007/978-1-4614-0977-9\_9},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Al-Shaer11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ChristodorescuFJG11,
  author       = {Mihai Christodorescu and
                  Matthew Fredrikson and
                  Somesh Jha and
                  Jonathon T. Giffin},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {End-to-End Software Diversification of Internet Services},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {117--130},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_7},
  doi          = {10.1007/978-1-4614-0977-9\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ChristodorescuFJG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CuiS11,
  author       = {Ang Cui and
                  Salvatore J. Stolfo},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Symbiotes and defensive Mutualism: Moving Target Defense},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {99--108},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_5},
  doi          = {10.1007/978-1-4614-0977-9\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CuiS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/EvansNK11,
  author       = {David Evans and
                  Anh Nguyen{-}Tuong and
                  John C. Knight},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Effectiveness of Moving Target Defenses},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {29--48},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_2},
  doi          = {10.1007/978-1-4614-0977-9\_2},
  timestamp    = {Tue, 13 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/EvansNK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/HuangG11,
  author       = {Yih Huang and
                  Anup K. Ghosh},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Introducing Diversity and Uncertainty to Create Moving Attack Surfaces
                  for Web Services},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {131--151},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_8},
  doi          = {10.1007/978-1-4614-0977-9\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HuangG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/JacksonSHMWGBWF11,
  author       = {Todd Jackson and
                  Babak Salamat and
                  Andrei Homescu and
                  Karthikeyan Manivannan and
                  Gregor Wagner and
                  Andreas Gal and
                  Stefan Brunthaler and
                  Christian Wimmer and
                  Michael Franz},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Compiler-Generated Software Diversity},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {77--98},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_4},
  doi          = {10.1007/978-1-4614-0977-9\_4},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/JacksonSHMWGBWF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Kant11,
  author       = {Krishna Kant},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Configuration Management Security in Data Center Environments},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {161--181},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_10},
  doi          = {10.1007/978-1-4614-0977-9\_10},
  timestamp    = {Thu, 13 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Kant11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ManadhataW11,
  author       = {Pratyusa K. Manadhata and
                  Jeannette M. Wing},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {A Formal Model for a System's Attack Surface},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {1--28},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_1},
  doi          = {10.1007/978-1-4614-0977-9\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ManadhataW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PortokalidisK11,
  author       = {Georgios Portokalidis and
                  Angelos D. Keromytis},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Global {ISR:} Toward a Comprehensive Defense Against Unauthorized
                  Code Execution},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {49--76},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_3},
  doi          = {10.1007/978-1-4614-0977-9\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PortokalidisK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Rinard11,
  author       = {Martin C. Rinard},
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Manipulating Program Functionality to Eliminate Security Vulnerabilities},
  booktitle    = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  pages        = {109--115},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9\_6},
  doi          = {10.1007/978-1-4614-0977-9\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Rinard11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/54,
  editor       = {Sushil Jajodia and
                  Anup K. Ghosh and
                  Vipin Swarup and
                  Cliff Wang and
                  Xiaoyang Sean Wang},
  title        = {Moving Target Defense - Creating Asymmetric Uncertainty for Cyber
                  Threats},
  series       = {Advances in Information Security},
  volume       = {54},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-1-4614-0977-9},
  doi          = {10.1007/978-1-4614-0977-9},
  isbn         = {978-1-4614-0976-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/54.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/GhorbaniLT10,
  author       = {Ali A. Ghorbani and
                  Wei Lu and
                  Mahbod Tavallaee},
  title        = {Network Intrusion Detection and Prevention - Concepts and Techniques},
  series       = {Advances in Information Security},
  volume       = {47},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-88771-5},
  doi          = {10.1007/978-0-387-88771-5},
  isbn         = {978-0-387-88770-8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GhorbaniLT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/KayemAM10,
  author       = {Anne V. D. M. Kayem and
                  Selim G. Akl and
                  Patrick Martin},
  title        = {Adaptive Cryptographic Access Control},
  series       = {Advances in Information Security},
  volume       = {48},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-6655-1},
  doi          = {10.1007/978-1-4419-6655-1},
  isbn         = {978-0-387-77265-3},
  timestamp    = {Mon, 20 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/KayemAM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/KiayiasP10,
  author       = {Aggelos Kiayias and
                  Serdar Pehlivanoglu},
  title        = {Encryption for Digital Content},
  series       = {Advances in Information Security},
  volume       = {52},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0044-9},
  doi          = {10.1007/978-1-4419-0044-9},
  isbn         = {978-1-4419-0043-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KiayiasP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/ShoniregunDM10,
  author       = {Charles A. Shoniregun and
                  Kudakwashe Dube and
                  Fredrick Mtenzi},
  title        = {Electronic Healthcare Information Security},
  series       = {Advances in Information Security},
  volume       = {53},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-0-387-84919-5},
  doi          = {10.1007/978-0-387-84919-5},
  isbn         = {978-0-387-84817-4},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ShoniregunDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordCGLPY10,
  author       = {Paul Barford and
                  Yan Chen and
                  Anup Goyal and
                  Zhichun Li and
                  Vern Paxson and
                  Vinod Yegneswaran},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Employing Honeynets For Network Situational Awareness},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {71--102},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_5},
  doi          = {10.1007/978-1-4419-0140-8\_5},
  timestamp    = {Wed, 25 Sep 2019 17:41:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordCGLPY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordDDFGJJLLNOSSSTWY10,
  author       = {Paul Barford and
                  Marc Dacier and
                  Thomas G. Dietterich and
                  Matt Fredrikson and
                  Jonathon T. Giffin and
                  Sushil Jajodia and
                  Somesh Jha and
                  Jason H. Li and
                  Peng Liu and
                  Peng Ning and
                  Xinming Ou and
                  Dawn Song and
                  Laura Strater and
                  Vipin Swarup and
                  George P. Tadda and
                  C. Wang and
                  John Yen},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber {SA:} Situational Awareness for Cyber Defense},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {3--13},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_1},
  doi          = {10.1007/978-1-4419-0140-8\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordDDFGJJLLNOSSSTWY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BishopEFGGPW10,
  author       = {Matt Bishop and
                  Sophie Engle and
                  Deborah A. Frincke and
                  Carrie Gates and
                  Frank L. Greitzer and
                  Sean Peisert and
                  Sean Whalen},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {A Risk Management Approach to the "Insider Threat"},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {115--137},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_6},
  doi          = {10.1007/978-1-4419-7133-3\_6},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BishopEFGGPW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BowenSKS10,
  author       = {Brian M. Bowen and
                  Malek Ben Salem and
                  Angelos D. Keromytis and
                  Salvatore J. Stolfo},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Monitoring Technologies for Mitigating Insider Threats},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {197--217},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_9},
  doi          = {10.1007/978-1-4419-7133-3\_9},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BowenSKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Coles-KempT10,
  author       = {Lizzie Coles{-}Kemp and
                  Marianthi Theoharidou},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Insider Threat and Information Security Management},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {45--71},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_3},
  doi          = {10.1007/978-1-4419-7133-3\_3},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Coles-KempT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CramptonH10,
  author       = {Jason Crampton and
                  Michael Huth},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Towards an Access-Control Framework for Countering Insider Threats},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {173--195},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_8},
  doi          = {10.1007/978-1-4419-7133-3\_8},
  timestamp    = {Mon, 11 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CramptonH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/DacierLTPK10,
  author       = {Marc Dacier and
                  Corrado Leita and
                  Olivier Thonnard and
                  Hau{-}Van Pham and
                  Engin Kirda},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Assessing Cybercrime Through the Eyes of the {WOMBAT}},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {103--136},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_6},
  doi          = {10.1007/978-1-4419-0140-8\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/DacierLTPK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/DietterichBKS10,
  author       = {Thomas G. Dietterich and
                  Xinlong Bao and
                  Victoria Keiser and
                  Jianqiang Shen},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Machine Learning Methods for High Level Cyber Situation Awareness},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {227--247},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_11},
  doi          = {10.1007/978-1-4419-0140-8\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/DietterichBKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FlegelKMMWL10,
  author       = {Ulrich Flegel and
                  Florian Kerschbaum and
                  Philip Miseldine and
                  Ganna Monakova and
                  Richard Wacker and
                  Frank Leymann},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Legally Sustainable Solutions for Privacy Issues in Collaborative
                  Fraud Detection},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {139--171},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_7},
  doi          = {10.1007/978-1-4419-7133-3\_7},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FlegelKMMWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FlegelVB10,
  author       = {Ulrich Flegel and
                  Julien Vayssi{\`{e}}re and
                  Gunter Bitz},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {A State of the Art Survey of Fraud Detection Technology},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {73--84},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_4},
  doi          = {10.1007/978-1-4419-7133-3\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FlegelVB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FredriksonCGJ10,
  author       = {Matt Fredrikson and
                  Mihai Christodorescu and
                  Jonathon T. Giffin and
                  Somesh Jha},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {A Declarative Framework for Intrusion Analysis},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {179--200},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_9},
  doi          = {10.1007/978-1-4419-0140-8\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FredriksonCGJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GreitzerF10,
  author       = {Frank L. Greitzer and
                  Deborah A. Frincke},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Combining Traditional Cyber Security Audit Data with Psychosocial
                  Data: Towards Predictive Modeling for Insider Threat Mitigation},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {85--113},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_5},
  doi          = {10.1007/978-1-4419-7133-3\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GreitzerF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/JajodiaN10,
  author       = {Sushil Jajodia and
                  Steven Noel},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Topological Vulnerability Analysis},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {139--154},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_7},
  doi          = {10.1007/978-1-4419-0140-8\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/JajodiaN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LiOR10,
  author       = {Jason H. Li and
                  Xinming Ou and
                  Siva Raj Rajagopalan},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Uncertainty and Risk Management in Cyber Situational Awareness},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {51--68},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_4},
  doi          = {10.1007/978-1-4419-0140-8\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LiOR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LiuJZXJBL10,
  author       = {Peng Liu and
                  Xiaoqi Jia and
                  Shengzhi Zhang and
                  Xi Xiong and
                  Yoon{-}chan Jhi and
                  Kun Bai and
                  Jason H. Li},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cross-Layer Damage Assessment for Cyber Situational Awareness},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {155--176},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_8},
  doi          = {10.1007/978-1-4419-0140-8\_8},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LiuJZXJBL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MagklarasF10,
  author       = {George Magklaras and
                  Steven Furnell},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Insider Threat Specification as a Threat Mitigation Technique},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {219--244},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_10},
  doi          = {10.1007/978-1-4419-7133-3\_10},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MagklarasF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Neumann10,
  author       = {Peter G. Neumann},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Combatting Insider Threats},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {17--44},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_2},
  doi          = {10.1007/978-1-4419-7133-3\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Neumann10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ProbstHGB10,
  author       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Aspects of Insider Threats},
  booktitle    = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3\_1},
  doi          = {10.1007/978-1-4419-7133-3\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/ProbstHGB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SezerKN10,
  author       = {Emre Can Sezer and
                  Chongkyung Kil and
                  Peng Ning},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Automated Software Vulnerability Analysis},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {201--223},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_10},
  doi          = {10.1007/978-1-4419-0140-8\_10},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/SezerKN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/TaddaS10,
  author       = {George P. Tadda and
                  John S. Salerno},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Overview of Cyber Situation Awareness},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {15--35},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_2},
  doi          = {10.1007/978-1-4419-0140-8\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/TaddaS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/YenMMHFL10,
  author       = {John Yen and
                  Michael D. McNeese and
                  Tracy Mullen and
                  David L. Hall and
                  Xiaocong Fan and
                  Peng Liu},
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {RPD-based Hypothesis Reasoning for Cyber Situation Awareness},
  booktitle    = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  pages        = {39--49},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8\_3},
  doi          = {10.1007/978-1-4419-0140-8\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/YenMMHFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/46,
  editor       = {Sushil Jajodia and
                  Peng Liu and
                  Vipin Swarup and
                  Cliff Wang},
  title        = {Cyber Situational Awareness - Issues and Research},
  series       = {Advances in Information Security},
  volume       = {46},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-0140-8},
  doi          = {10.1007/978-1-4419-0140-8},
  isbn         = {978-1-4419-0139-2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/46.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/49,
  editor       = {Christian W. Probst and
                  Jeffrey Hunker and
                  Dieter Gollmann and
                  Matt Bishop},
  title        = {Insider Threats in Cyber Security},
  series       = {Advances in Information Security},
  volume       = {49},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-1-4419-7133-3},
  doi          = {10.1007/978-1-4419-7133-3},
  isbn         = {978-1-4419-7132-6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/49.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Yan09,
  author       = {Song Y. Yan},
  title        = {Primality Testing and Integer Factorization in Public-Key Cryptography},
  series       = {Advances in Information Security},
  volume       = {11},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-77268-4},
  doi          = {10.1007/978-0-387-77268-4},
  isbn         = {978-0-387-77267-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Yan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Choo09,
  author       = {Kim{-}Kwang Raymond Choo},
  title        = {Secure Key Establishment},
  series       = {Advances in Information Security},
  volume       = {41},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-87969-7},
  doi          = {10.1007/978-0-387-87969-7},
  isbn         = {978-0-387-87968-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Choo09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/OnievaLZ09,
  author       = {Jose Antonio Onieva and
                  Javier L{\'{o}}pez and
                  Jianying Zhou},
  title        = {Secure Multi-Party Non-Repudiation Protocols and Applications},
  series       = {Advances in Information Security},
  volume       = {43},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-75630-1},
  doi          = {10.1007/978-0-387-75630-1},
  isbn         = {978-0-387-75629-5},
  timestamp    = {Mon, 08 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/OnievaLZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/PortnoyG09,
  author       = {Michael Portnoy and
                  Seymour E. Goodman},
  title        = {Global Initiatives to Secure Cyberspace - An Emerging Landscape},
  series       = {Advances in Information Security},
  volume       = {42},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-09764-0},
  doi          = {10.1007/978-0-387-09764-0},
  isbn         = {978-0-387-09763-3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PortnoyG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Singh09,
  author       = {Abhishek Singh},
  title        = {Identifying Malicious Code Through Reverse Engineering},
  series       = {Advances in Information Security},
  volume       = {44},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-89468-3},
  doi          = {10.1007/978-0-387-89468-3},
  isbn         = {978-0-387-09824-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Singh09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ArmenterosGMM09,
  author       = {{\'{A}}lvaro Armenteros and
                  Laura Garc{\'{\i}}a and
                  Antonio Mu{\~{n}}oz and
                  Antonio Ma{\~{n}}a},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Realising the Potential of Serenity in Emerging AmI Ecosystems: Implications
                  and Challenges},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {323--342},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_18},
  doi          = {10.1007/978-0-387-88775-3\_18},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/ArmenterosGMM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BenameurKSS09,
  author       = {Azzedine Benameur and
                  Paul El Khoury and
                  Magali Seguran and
                  Smriti Kumar Sinha},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {{SERENITY} in e-Business and Smart Item Scenarios},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {305--322},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_17},
  doi          = {10.1007/978-0-387-88775-3\_17},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BenameurKSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CrespoPSSM09,
  author       = {Beatriz Gallego{-}Nicasio Crespo and
                  Ana Pi{\~{n}}uela and
                  Pedro Soria{-}Rodriguez and
                  Daniel Serrano and
                  Antonio Ma{\~{n}}a},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {The {SERENITY} Runtime Framework},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {183--198},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_11},
  doi          = {10.1007/978-0-387-88775-3\_11},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CrespoPSSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CrespoPSSM09a,
  author       = {Beatriz Gallego{-}Nicasio Crespo and
                  Ana Pi{\~{n}}uela and
                  Pedro Soria{-}Rodriguez and
                  Daniel Serrano and
                  Antonio Ma{\~{n}}a},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Pattern Driven Selection and Configuration of S{\&}D Mechanisms
                  at Runtime},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {199--212},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_12},
  doi          = {10.1007/978-0-387-88775-3\_12},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CrespoPSSM09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FeliciMTR09,
  author       = {Massimo Felici and
                  Valentino Meduri and
                  Alessandra Tedeschi and
                  Carlo Riccucci},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {{SERENITY} in Air Traffic Management},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {359--378},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_20},
  doi          = {10.1007/978-0-387-88775-3\_20},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FeliciMTR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Fernandez09,
  author       = {Eduardo B. Fern{\'{a}}ndez},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Security Patterns and {A} Methodology to Apply them},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {37--46},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_3},
  doi          = {10.1007/978-0-387-88775-3\_3},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Fernandez09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GiacomoPR09,
  author       = {Valentina Di Giacomo and
                  Domenico Presenza and
                  Carlo Riccucci},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Organisational Pattern Driven Recovery Mechanisms},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {275--290},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_15},
  doi          = {10.1007/978-0-387-88775-3\_15},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GiacomoPR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GurgensF09,
  author       = {Sigrid G{\"{u}}rgens and
                  Andreas Fuchs},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Security and Dependability Solutions for Networks and Devices},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {107--123},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_7},
  doi          = {10.1007/978-0-387-88775-3\_7},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GurgensF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GurgensP09,
  author       = {Sigrid G{\"{u}}rgens and
                  Gimena Pujol},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Specification of Security and Dependability Properties},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {49--67},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_4},
  doi          = {10.1007/978-0-387-88775-3\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GurgensP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Jurjens09,
  author       = {Jan J{\"{u}}rjens},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Security and Dependability Engineering},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_2},
  doi          = {10.1007/978-0-387-88775-3\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Jurjens09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KokolakisRBS09,
  author       = {Spyros Kokolakis and
                  Panagiotis Rizomiliotis and
                  Azzedine Benameur and
                  Smriti Kumar Sinha},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Security and Dependability Solutions for Web Services and Workflows},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {97--106},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_6},
  doi          = {10.1007/978-0-387-88775-3\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KokolakisRBS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KrausovaD09,
  author       = {Alzbeta Krausov{\'{a}} and
                  Jos Dumortier},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Legal Issues of Ambient Intelligence in the {SERENITY} Project},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {291--302},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_16},
  doi          = {10.1007/978-0-387-88775-3\_16},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KrausovaD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ManaSK09,
  author       = {Antonio Ma{\~{n}}a and
                  George Spanoudakis and
                  Spyros Kokolakis},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Introduction: The {SERENITY} vision},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_1},
  doi          = {10.1007/978-0-387-88775-3\_1},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ManaSK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ManaSK09a,
  author       = {Antonio Ma{\~{n}}a and
                  George Spanoudakis and
                  Spyros Kokolakis},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Future Directions},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {379--383},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_21},
  doi          = {10.1007/978-0-387-88775-3\_21},
  timestamp    = {Tue, 01 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ManaSK09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PorekarKSG09,
  author       = {Jan Porekar and
                  Tomaz Klobucar and
                  Svetlana Saljic and
                  Dusan Gabrijelcic},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Applying the {SERENITY} Methodology to the Domain of Trusted Electronic
                  Archiving},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {343--357},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_19},
  doi          = {10.1007/978-0-387-88775-3\_19},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PorekarKSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RudolphCCMR09,
  author       = {Carsten Rudolph and
                  Luca Compagna and
                  Roberto Carbone and
                  Antonio Mu{\~{n}}oz and
                  J{\"{u}}rgen Repp},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Verification of S{\&}D Solutions for Network Communications and
                  Devices},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {143--163},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_9},
  doi          = {10.1007/978-0-387-88775-3\_9},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RudolphCCMR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Sanchez-CidMSKSM09,
  author       = {Francisco S{\'{a}}nchez{-}Cid and
                  Antonio Ma{\~{n}}a and
                  George Spanoudakis and
                  Christos Kloukinas and
                  Daniel Serrano and
                  Antonio Mu{\~{n}}oz},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Representation of Security and Dependability Solutions},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {69--95},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_5},
  doi          = {10.1007/978-0-387-88775-3\_5},
  timestamp    = {Thu, 28 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Sanchez-CidMSKSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SerranoMLCL09,
  author       = {Daniel Serrano and
                  Antonio Ma{\~{n}}a and
                  Rafael Llarena and
                  Beatriz Gallego{-}Nicasio Crespo and
                  Keqin Li},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {{SERENITY} Aware Development of Security and Dependability Solutions},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {127--141},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_8},
  doi          = {10.1007/978-0-387-88775-3\_8},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SerranoMLCL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SerranoMLCL09a,
  author       = {Daniel Serrano and
                  Antonio Ma{\~{n}}a and
                  Rafael Llarena and
                  Beatriz Gallego{-}Nicasio Crespo and
                  Keqin Li},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {{SERENITY} Aware System Development Process},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {165--179},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_10},
  doi          = {10.1007/978-0-387-88775-3\_10},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SerranoMLCL09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SpanoudakisKM09,
  author       = {George Spanoudakis and
                  Christos Kloukinas and
                  Khaled Mahbub},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {The {SERENITY} Runtime Monitoring Framework},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {213--237},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_13},
  doi          = {10.1007/978-0-387-88775-3\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/SpanoudakisKM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/TsigkritisSKL09,
  author       = {Theocharis Tsigkritis and
                  George Spanoudakis and
                  Christos Kloukinas and
                  Davide Lorenzoli},
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Diagnosis and Threat Detection Capabilities of the {SERENITY} Monitoring
                  Framework},
  booktitle    = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  pages        = {239--271},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3\_14},
  doi          = {10.1007/978-0-387-88775-3\_14},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/TsigkritisSKL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/45,
  editor       = {Spyros Kokolakis and
                  Antonio Ma{\~{n}}a G{\'{o}}mez and
                  George Spanoudakis},
  title        = {Security and Dependability for Ambient Intelligence},
  series       = {Advances in Information Security},
  volume       = {45},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-0-387-88775-3},
  doi          = {10.1007/978-0-387-88775-3},
  isbn         = {978-0-387-88774-6},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/45.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/SinghSJ08,
  author       = {Abhishek Singh and
                  Baibhav Singh and
                  Hirosh Joseph},
  title        = {Vulnerability Analysis and Defense for the Internet},
  series       = {Advances in Information Security},
  volume       = {37},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-74390-5},
  doi          = {10.1007/978-0-387-74390-5},
  isbn         = {978-0-387-74389-9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/SinghSJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/TraynorMP08,
  author       = {Patrick Traynor and
                  Patrick D. McDaniel and
                  Thomas La Porta},
  title        = {Security for Telecommunications Networks},
  series       = {Advances in Information Security},
  volume       = {40},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-72442-3},
  doi          = {10.1007/978-0-387-72442-3},
  isbn         = {978-0-387-72441-6},
  timestamp    = {Tue, 09 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/sp/TraynorMP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BambenekK08,
  author       = {John Bambenek and
                  Agnes Klus},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Botnets and Proactive System Defense},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {117--130},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_6},
  doi          = {10.1007/978-0-387-68768-1\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BambenekK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Bellovin08,
  author       = {Steven M. Bellovin},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {The Insider Attack Problem Nature and Scope},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {1--4},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_1},
  doi          = {10.1007/978-0-387-77322-3\_1},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Bellovin08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BrumleyHLNSY08,
  author       = {David Brumley and
                  Cody Hartwig and
                  Zhenkai Liang and
                  James Newsome and
                  Dawn Xiaodong Song and
                  Heng Yin},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Automatically Identifying Trigger-based Behavior in Malware},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {65--88},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_4},
  doi          = {10.1007/978-0-387-68768-1\_4},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/BrumleyHLNSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/DagonGL08,
  author       = {David Dagon and
                  Guofei Gu and
                  Christopher P. Lee},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {A Taxonomy of Botnet Structures},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {143--164},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_8},
  doi          = {10.1007/978-0-387-68768-1\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/DagonGL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FranklinLMSPD08,
  author       = {Jason Franklin and
                  Mark Luk and
                  Jonathan M. McCune and
                  Arvind Seshadri and
                  Adrian Perrig and
                  Leendert van Doorn},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Towards Sound Detection of Virtual Machines},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {89--116},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_5},
  doi          = {10.1007/978-0-387-68768-1\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FranklinLMSPD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GligorC08,
  author       = {Virgil D. Gligor and
                  C. Sekar Chandersekaran},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Surviving Insider Attacks: {A} Call for System Experiments},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {153--164},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_9},
  doi          = {10.1007/978-0-387-77322-3\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GligorC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Hunker08,
  author       = {Jeffrey Hunker},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Taking Stock and Looking Forward - An Outsider's Perspective on the
                  Insider Threat},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {195--214},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_11},
  doi          = {10.1007/978-0-387-77322-3\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Hunker08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/IyerDNK08,
  author       = {Ravishankar K. Iyer and
                  Paul Dabrowski and
                  Nithin Nakka and
                  Zbigniew Kalbarczyk},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Reconfigurable Tamper-resistant Hardware Support Against Insider Threats:
                  The Trusted {ILLIAC} Approach},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {133--152},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_8},
  doi          = {10.1007/978-0-387-77322-3\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/IyerDNK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Keromytis08,
  author       = {Angelos D. Keromytis},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Hard Problems and Research Challenges},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {215--218},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_12},
  doi          = {10.1007/978-0-387-77322-3\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Keromytis08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Keromytis08a,
  author       = {Angelos D. Keromytis},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Hard Problems and Research Challenges Concluding Remarks},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {219--222},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_13},
  doi          = {10.1007/978-0-387-77322-3\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Keromytis08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KillourhyM08,
  author       = {Kevin S. Killourhy and
                  Roy A. Maxion},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Naive Bayes as a Masquerade Detector: Addressing a Chronic Failure},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {91--112},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_6},
  doi          = {10.1007/978-0-387-77322-3\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KillourhyM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LiGC08,
  author       = {Zhichun Li and
                  Anup Goyal and
                  Yan Chen},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Honeynet-based Botnet Scan Traffic Analysis},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {25--44},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_2},
  doi          = {10.1007/978-0-387-68768-1\_2},
  timestamp    = {Fri, 20 Oct 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LiGC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/McCormick08,
  author       = {Michael McCormick},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Data Theft: {A} Prototypical Insider Threat},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_4},
  doi          = {10.1007/978-0-387-77322-3\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/McCormick08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MooreCT08,
  author       = {Andrew P. Moore and
                  Dawn M. Cappelli and
                  Randall F. Trzeciak},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {The "Big Picture" of Insider {IT} Sabotage Across {U.S.} Critical
                  Infrastructures},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {17--52},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_3},
  doi          = {10.1007/978-0-387-77322-3\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MooreCT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Pfleeger08,
  author       = {Charles P. Pfleeger},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Reflections on the Insider Threat},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {5--16},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_2},
  doi          = {10.1007/978-0-387-77322-3\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Pfleeger08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RamachandranFD08,
  author       = {Anirudh Ramachandran and
                  Nick Feamster and
                  David Dagon},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Detecting Botnet Membership with {DNSBL} Counterintelligence},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {131--142},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_7},
  doi          = {10.1007/978-0-387-68768-1\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RamachandranFD08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SahitaS08,
  author       = {Ravi Sahita and
                  Uday R. Savagaonkar},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Towards a Virtualization-enabled Framework for Information Traceability
                  {(VFIT)}},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {113--132},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_7},
  doi          = {10.1007/978-0-387-77322-3\_7},
  timestamp    = {Fri, 29 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SahitaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SalemHS08,
  author       = {Malek Ben Salem and
                  Shlomo Hershkop and
                  Salvatore J. Stolfo},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {A Survey of Insider Attack Detection Research},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {69--90},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_5},
  doi          = {10.1007/978-0-387-77322-3\_5},
  timestamp    = {Wed, 15 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SalemHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SinclairS08,
  author       = {Sara Sinclair and
                  Sean W. Smith},
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Preventative Directions For Insider Threat Mitigation Via Access Control},
  booktitle    = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  pages        = {165--194},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3\_10},
  doi          = {10.1007/978-0-387-77322-3\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SinclairS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/StinsonM08,
  author       = {Elizabeth Stinson and
                  John C. Mitchell},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Characterizing Bots' Remote Control Behavior},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_3},
  doi          = {10.1007/978-0-387-68768-1\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/StinsonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/StrayerLWL08,
  author       = {W. Timothy Strayer and
                  David E. Lapsley and
                  Robert Walsh and
                  Carl Livadas},
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Botnet Detection Based on Network Behavior},
  booktitle    = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  pages        = {1--24},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-68768-1\_1},
  doi          = {10.1007/978-0-387-68768-1\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/StrayerLWL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/36,
  editor       = {Wenke Lee and
                  Cliff Wang and
                  David Dagon},
  title        = {Botnet Detection: Countering the Largest Security Threat},
  series       = {Advances in Information Security},
  volume       = {36},
  publisher    = {Springer},
  year         = {2008},
  isbn         = {978-0-387-68768-1},
  timestamp    = {Wed, 19 Nov 2008 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/36.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/39,
  editor       = {Salvatore J. Stolfo and
                  Steven M. Bellovin and
                  Angelos D. Keromytis and
                  Shlomo Hershkop and
                  Sean W. Smith and
                  Sara Sinclair},
  title        = {Insider Attack and Cyber Security - Beyond the Hacker},
  series       = {Advances in Information Security},
  volume       = {39},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-0-387-77322-3},
  doi          = {10.1007/978-0-387-77322-3},
  isbn         = {978-0-387-77321-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/39.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Bleumer07,
  author       = {Gerrit Bleumer},
  title        = {Electronic Postage Systems - Technology, Security, Economics},
  series       = {Advances in Information Security},
  volume       = {26},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44606-6},
  doi          = {10.1007/978-0-387-44606-6},
  isbn         = {978-0-387-29313-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Bleumer07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Flegel07,
  author       = {Ulrich Flegel},
  title        = {Privacy-Respecting Intrusion Detection},
  series       = {Advances in Information Security},
  volume       = {35},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-68254-9},
  doi          = {10.1007/978-0-387-68254-9},
  isbn         = {978-0-387-34346-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Flegel07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Frye07,
  author       = {Douglas Frye},
  title        = {Network Security Policies and Procedures},
  series       = {Advances in Information Security},
  volume       = {32},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-47955-2},
  doi          = {10.1007/978-0-387-47955-2},
  isbn         = {978-0-387-30937-8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Frye07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/LiuN07,
  author       = {Donggang Liu and
                  Peng Ning},
  title        = {Security for Wireless Sensor Networks},
  series       = {Advances in Information Security},
  volume       = {28},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46781-8},
  doi          = {10.1007/978-0-387-46781-8},
  isbn         = {978-0-387-32723-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/LiuN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Shoniregun07,
  author       = {Charles A. Shoniregun},
  title        = {Synchronizing Internet Protocol Security (SIPSec)},
  series       = {Advances in Information Security},
  volume       = {34},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-68569-4},
  doi          = {10.1007/978-0-387-68569-4},
  isbn         = {978-0-387-32724-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Shoniregun07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/WangJW07,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  title        = {Preserving Privacy in On-Line Analytical Processing {(OLAP)}},
  series       = {Advances in Information Security},
  volume       = {29},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46274-5},
  doi          = {10.1007/978-0-387-46274-5},
  isbn         = {978-0-387-46273-8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/WangJW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/Singhal07,
  author       = {Anoop Singhal},
  title        = {Data Warehousing and Data Mining Techniques for Cyber Security},
  series       = {Advances in Information Security},
  volume       = {31},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-47653-7},
  doi          = {10.1007/978-0-387-47653-7},
  isbn         = {978-0-387-26409-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Singhal07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AntoniouBBNO07,
  author       = {Grigoris Antoniou and
                  Matteo Baldoni and
                  Piero A. Bonatti and
                  Wolfgang Nejdl and
                  Daniel Olmedilla},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Rule-based Policy Specification},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {169--216},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_6},
  doi          = {10.1007/978-0-387-27696-0\_6},
  timestamp    = {Mon, 04 Apr 2022 16:00:08 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AntoniouBBNO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BarfordY07,
  author       = {Paul Barford and
                  Vinod Yegneswaran},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {An Inside Look at Botnets},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {171--191},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_8},
  doi          = {10.1007/978-0-387-44599-1\_8},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BarfordY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BearlyK07,
  author       = {Terry Bearly and
                  Vijay Kumar},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Building Trust and Security in Peer-to-Peer Systems},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {259--287},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_8},
  doi          = {10.1007/978-0-387-27696-0\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BearlyK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BrumleyNS07,
  author       = {David Brumley and
                  James Newsome and
                  Dawn Song},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Sting: An End-to-End Self-Healing System for Defending against Internet
                  Worms},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {147--170},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_7},
  doi          = {10.1007/978-0-387-44599-1\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BrumleyNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Capkun07,
  author       = {Srdjan Capkun},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Securing Localization in Wireless Networks \emph{(using Verifiable
                  Multilateration and Covert Base Stations)}},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {249--278},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_11},
  doi          = {10.1007/978-0-387-46276-9\_11},
  timestamp    = {Mon, 15 Jun 2020 07:44:16 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Capkun07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CapkunGHS07,
  author       = {Srdjan Capkun and
                  Saurabh Ganeriwal and
                  Simon Han and
                  Mani B. Srivastava},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Securing Timing Synchronization in Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {369--389},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_16},
  doi          = {10.1007/978-0-387-46276-9\_16},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CapkunGHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ChristodorescuR07,
  author       = {Mihai Christodorescu and
                  Shai Rubin},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Can Cooperative Intrusion Detectors Challenge the Base-Rate Fallacy?},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {193--209},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_9},
  doi          = {10.1007/978-0-387-44599-1\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ChristodorescuR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CirianiVFS07,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Pierangela Samarati},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Microdata Protection},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {291--321},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_9},
  doi          = {10.1007/978-0-387-27696-0\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CirianiVFS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CirianiVFS07a,
  author       = {Valentina Ciriani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Pierangela Samarati},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {\emph{k}-Anonymity},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {323--353},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_10},
  doi          = {10.1007/978-0-387-27696-0\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CirianiVFS07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FangDN07,
  author       = {Lei Fang and
                  Wenliang Du and
                  Peng Ning},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {A Beacon-Less Location Discovery Scheme for Wireless Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {33--55},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_2},
  doi          = {10.1007/978-0-387-46276-9\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FangDN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/HacigumusHIM07,
  author       = {Hakan Hacig{\"{u}}m{\"{u}}s and
                  Bijit Hore and
                  Balakrishna R. Iyer and
                  Sharad Mehrotra},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Search on Encrypted Data},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {383--425},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_12},
  doi          = {10.1007/978-0-387-27696-0\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HacigumusHIM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/HalfondO07,
  author       = {William G. J. Halfond and
                  Alessandro Orso},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Detection and Prevention of {SQL} Injection Attacks},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {85--109},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_5},
  doi          = {10.1007/978-0-387-44599-1\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HalfondO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/HuangYMS07,
  author       = {Leping Huang and
                  Hiroshi Yamane and
                  Kanta Matsuura and
                  Kaoru Sezaki},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Location Privacy in Wireless {LAN}},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {299--322},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_13},
  doi          = {10.1007/978-0-387-46276-9\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/HuangYMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/JajodiaY07,
  author       = {Sushil Jajodia and
                  Ting Yu},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Basic Security Concepts},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_1},
  doi          = {10.1007/978-0-387-27696-0\_1},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/JajodiaY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KrishnamachariY07,
  author       = {Bhaskar Krishnamachari and
                  Kiran Yedavalli},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Secure Sequence-based Localization for Wireless Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {237--247},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_10},
  doi          = {10.1007/978-0-387-46276-9\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KrishnamachariY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Kruegel07,
  author       = {Christopher Kruegel},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Behavioral and Structural Properties of Malicious Code},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {63--83},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_4},
  doi          = {10.1007/978-0-387-44599-1\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Kruegel07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KudoQ07,
  author       = {Michiharu Kudo and
                  Naizhen Qi},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Access Control Policy Models for {XML}},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {97--126},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_4},
  doi          = {10.1007/978-0-387-27696-0\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KudoQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LazosP07,
  author       = {Loukas Lazos and
                  Radha Poovendran},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Secure Localization for Wireless Sensor Networks using Range-Independent
                  Methods},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {185--214},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_8},
  doi          = {10.1007/978-0-387-46276-9\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LazosP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LeeSWY07,
  author       = {Adam J. Lee and
                  Kent E. Seamons and
                  Marianne Winslett and
                  Ting Yu},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Automated Trust Negotiation in Open Systems},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {217--258},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_7},
  doi          = {10.1007/978-0-387-27696-0\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LeeSWY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LymberopoulosS07,
  author       = {Dimitrios Lymberopoulos and
                  Andreas Savvides},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Experiences from the Empirical Evaluation of Two Physical Layers for
                  Node Localization},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {105--134},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_5},
  doi          = {10.1007/978-0-387-46276-9\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LymberopoulosS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MeadowsPPCS07,
  author       = {Catherine Meadows and
                  Radha Poovendran and
                  Dusko Pavlovic and
                  LiWu Chang and
                  Paul F. Syverson},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Distance Bounding Protocols: Authentication Logic Analysis and Collusion
                  Attacks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {279--298},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_12},
  doi          = {10.1007/978-0-387-46276-9\_12},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MeadowsPPCS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/NingLD07,
  author       = {Peng Ning and
                  Donggang Liu and
                  Wenliang Du},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Secure and Resilient Localization in Wireless Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {161--184},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_7},
  doi          = {10.1007/978-0-387-46276-9\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/NingLD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PandeyAA07,
  author       = {Santosh Pandey and
                  Farooq Anjum and
                  Prathima Agrawal},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {TRaVarSeL-Transmission Range Variation based Secure Localization},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {215--236},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_9},
  doi          = {10.1007/978-0-387-46276-9\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PandeyAA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PathiranaBSJD07,
  author       = {Pubudu N. Pathirana and
                  Nirupama Bulusu and
                  Andrey V. Savkin and
                  Sanjay K. Jha and
                  Thanh Dang},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Node Localization Using Mobile Robots in Delay-Tolerant Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {83--103},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_4},
  doi          = {10.1007/978-0-387-46276-9\_4},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/PathiranaBSJD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/PatwariHC07,
  author       = {Neal Patwari and
                  Alfred O. Hero III and
                  Jose A. Costa},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Learning Sensor Location from Signal Strength and Connectivity},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {57--81},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_3},
  doi          = {10.1007/978-0-387-46276-9\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/PatwariHC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RepsBLT07,
  author       = {Thomas W. Reps and
                  Gogul Balakrishnan and
                  Junghee Lim and
                  Tim Teitelbaum},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {A Next-Generation Platform for Analyzing Executables},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {43--61},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_3},
  doi          = {10.1007/978-0-387-44599-1\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RepsBLT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RoostaMS07,
  author       = {Tanya G. Roosta and
                  Michael Manzo and
                  Shankar Sastry},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Time Synchronization Attacks in Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {325--345},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_14},
  doi          = {10.1007/978-0-387-46276-9\_14},
  timestamp    = {Tue, 07 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RoostaMS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SeshadriLPDK07,
  author       = {Arvind Seshadri and
                  Mark Luk and
                  Adrian Perrig and
                  Leendert van Doorn and
                  Pradeep K. Khosla},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Pioneer: Verifying Code Integrity and Enforcing Untampered Code Execution
                  on Legacy Systems},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {253--289},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_12},
  doi          = {10.1007/978-0-387-44599-1\_12},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/SeshadriLPDK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SidiroglouK07,
  author       = {Stelios Sidiroglou and
                  Angelos D. Keromytis},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Composite Hybrid Techniques For Defending Against Targeted Attacks},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {213--229},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_10},
  doi          = {10.1007/978-0-387-44599-1\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SidiroglouK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Sion07,
  author       = {Radu Sion},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Rights Assessment for Relational Data},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {427--457},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_13},
  doi          = {10.1007/978-0-387-27696-0\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Sion07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Smith07,
  author       = {Geoffrey Smith},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Principles of Secure Information Flow Analysis},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {291--307},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_13},
  doi          = {10.1007/978-0-387-44599-1\_13},
  timestamp    = {Mon, 19 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Smith07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/StoleruHS07,
  author       = {Radu Stoleru and
                  Tian He and
                  John A. Stankovic},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Range-Free Localization},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_1},
  doi          = {10.1007/978-0-387-46276-9\_1},
  timestamp    = {Fri, 13 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/StoleruHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/StolfoWL07,
  author       = {Salvatore J. Stolfo and
                  Ke Wang and
                  Wei{-}Jen Li},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Towards Stealthy Malware Detection},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {231--249},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_11},
  doi          = {10.1007/978-0-387-44599-1\_11},
  timestamp    = {Thu, 24 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/StolfoWL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SunNW07,
  author       = {Kun Sun and
                  Peng Ning and
                  Cliff Wang},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Secure and Resilient Time Synchronization in Wireless Sensor Networks},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {347--367},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_15},
  doi          = {10.1007/978-0-387-46276-9\_15},
  timestamp    = {Thu, 02 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SunNW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Vigna07,
  author       = {Giovanni Vigna},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Static Disassembly and Code Analysis},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {19--41},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_2},
  doi          = {10.1007/978-0-387-44599-1\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Vigna07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/VimercatiFJS07,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Pierangela Samarati},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Access Control Policies and Languages in Open Environments},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {21--58},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_2},
  doi          = {10.1007/978-0-387-27696-0\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/VimercatiFJS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WangJW07,
  author       = {Lingyu Wang and
                  Sushil Jajodia and
                  Duminda Wijesekera},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Preserving Privacy in On-line Analytical Processing Data Cubes},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {355--380},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_11},
  doi          = {10.1007/978-0-387-27696-0\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/WangJW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WangSLCA07,
  author       = {Wendy Hui Wang and
                  Divesh Srivastava and
                  Laks V. S. Lakshmanan and
                  SungRan Cho and
                  Sihem Amer{-}Yahia},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Optimizing Tree Pattern Queries over Secure {XML} Databases},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {127--165},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_5},
  doi          = {10.1007/978-0-387-27696-0\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/WangSLCA07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WeaverSP07,
  author       = {Nicholas Weaver and
                  Stuart Staniford and
                  Vern Paxson},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Very Fast Containment of Scanning Worms, Revisited},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {113--145},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_6},
  doi          = {10.1007/978-0-387-44599-1\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/WeaverSP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WittenN07,
  author       = {Brian Witten and
                  Carey Nachenberg},
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Malware Evolution: {A} Snapshot of Threats and Countermeasures in
                  2005},
  booktitle    = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1\_1},
  doi          = {10.1007/978-0-387-44599-1\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/WittenN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/YuLZJ07,
  author       = {Meng Yu and
                  Peng Liu and
                  Wanyu Zang and
                  Sushil Jajodia},
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Trusted Recovery},
  booktitle    = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  pages        = {59--94},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-27696-0\_3},
  doi          = {10.1007/978-0-387-27696-0\_3},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/YuLZJ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ZhangTLJN07,
  author       = {Yanyong Zhang and
                  Wade Trappe and
                  Zang Li and
                  Manali Joglekar and
                  Badri Nath},
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Robust Wireless Localization: Attacks and Defenses},
  booktitle    = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  pages        = {137--160},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9\_6},
  doi          = {10.1007/978-0-387-46276-9\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ZhangTLJN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/27,
  editor       = {Mihai Christodorescu and
                  Somesh Jha and
                  Douglas Maughan and
                  Dawn Song and
                  Cliff Wang},
  title        = {Malware Detection},
  series       = {Advances in Information Security},
  volume       = {27},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-44599-1},
  doi          = {10.1007/978-0-387-44599-1},
  isbn         = {978-0-387-32720-4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/27.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/30,
  editor       = {Radha Poovendran and
                  Sumit Roy and
                  Cliff Wang},
  title        = {Secure Localization and Time Synchronization for Wireless Sensor and
                  Ad Hoc Networks},
  series       = {Advances in Information Security},
  volume       = {30},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-0-387-46276-9},
  doi          = {10.1007/978-0-387-46276-9},
  isbn         = {978-0-387-32721-1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/30.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/33,
  editor       = {Ting Yu and
                  Sushil Jajodia},
  title        = {Secure Data Management in Decentralized Systems},
  series       = {Advances in Information Security},
  volume       = {33},
  publisher    = {Springer},
  year         = {2007},
  isbn         = {978-0-387-27694-6},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/33.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/AxelssonS06,
  author       = {Stefan Axelsson and
                  David Sands},
  title        = {Understanding Intrusion Detection Through Visualization},
  series       = {Advances in Information Security},
  volume       = {24},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-27636-X},
  doi          = {10.1007/0-387-27636-X},
  isbn         = {978-0-387-27634-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/AxelssonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Aycock06,
  author       = {John Aycock},
  title        = {Computer Viruses and Malware},
  series       = {Advances in Information Security},
  volume       = {22},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-34188-9},
  doi          = {10.1007/0-387-34188-9},
  isbn         = {978-0-387-30236-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Aycock06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/CookK06,
  author       = {Debra L. Cook and
                  Angelos D. Keromytis},
  title        = {CryptoGraphics - Exploiting Graphics Cards for Security},
  series       = {Advances in Information Security},
  volume       = {20},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-34189-7},
  doi          = {10.1007/0-387-34189-7},
  isbn         = {978-0-387-29015-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/CookK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/DingGS06,
  author       = {Jintai Ding and
                  Jason E. Gower and
                  Dieter Schmidt},
  title        = {Multivariate Public Key Cryptosystems},
  series       = {Advances in Information Security},
  volume       = {25},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36946-4},
  doi          = {10.1007/978-0-387-36946-4},
  isbn         = {978-0-387-32229-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/DingGS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/HuangG06,
  author       = {Chin{-}Tser Huang and
                  Mohamed G. Gouda},
  title        = {Hop Integrity in the Internet},
  series       = {Advances in Information Security},
  volume       = {21},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-29444-9},
  doi          = {10.1007/0-387-29444-9},
  isbn         = {978-0-387-24426-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/HuangG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/VaidyaZC06,
  author       = {Jaideep Vaidya and
                  Yu Zhu and
                  Christopher W. Clifton},
  title        = {Privacy Preserving Data Mining},
  series       = {Advances in Information Security},
  volume       = {19},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-29489-6},
  doi          = {10.1007/978-0-387-29489-6},
  isbn         = {978-0-387-25886-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/VaidyaZC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Vielhauer06,
  author       = {Claus Vielhauer},
  title        = {Biometric User Authentication for it Security - From Fundamentals
                  to Handwriting},
  series       = {Advances in Information Security},
  volume       = {18},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/0-387-28094-4},
  doi          = {10.1007/0-387-28094-4},
  isbn         = {978-0-387-26194-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Vielhauer06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AlataDDKKNPP06,
  author       = {Eric Alata and
                  Marc Dacier and
                  Yves Deswarte and
                  M. Kaa{\^{a}}niche and
                  K. Kortchinsky and
                  Vincent Nicomette and
                  Van{-}Hau Pham and
                  Fabien Pouget},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Collection and analysis of attack data based on honeypots deployed
                  on the Internet},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {79--91},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_7},
  doi          = {10.1007/978-0-387-36584-8\_7},
  timestamp    = {Sun, 02 Oct 2022 16:18:05 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AlataDDKKNPP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AtzeniL06,
  author       = {Andrea S. Atzeni and
                  Antonio Lioy},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Why to adopt a security metric? {A} brief survey},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_1},
  doi          = {10.1007/978-0-387-36584-8\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AtzeniL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BalzarottiMS06,
  author       = {Davide Balzarotti and
                  Mattia Monga and
                  Sabrina Sicari},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Assessing the risk of using vulnerable components},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {65--77},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_6},
  doi          = {10.1007/978-0-387-36584-8\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/BalzarottiMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CasolaMMR06,
  author       = {Valentina Casola and
                  Antonino Mazzeo and
                  Nicola Mazzocca and
                  Massimiliano Rak},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {A {SLA} evaluation methodology in Service Oriented Architectures},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {119--130},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_10},
  doi          = {10.1007/978-0-387-36584-8\_10},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/CasolaMMR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Cervesato06,
  author       = {Iliano Cervesato},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Towards a Notion of Quantitative Security Analysis},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {131--143},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_11},
  doi          = {10.1007/978-0-387-36584-8\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Cervesato06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/DamianiVFSV06,
  author       = {Ernesto Damiani and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Pierangela Samarati and
                  Marco Viviani},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Measuring Inference Exposure in Outsourced Encrypted Databases},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {185--195},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_15},
  doi          = {10.1007/978-0-387-36584-8\_15},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/DamianiVFSV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FoleyBOHS06,
  author       = {Simon N. Foley and
                  Stefano Bistarelli and
                  Barry O'Sullivan and
                  John Herbert and
                  Garret Swart},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Multilevel Security and Quality of Protection},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {93--105},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_8},
  doi          = {10.1007/978-0-387-36584-8\_8},
  timestamp    = {Fri, 09 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FoleyBOHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KarjothPSW06,
  author       = {G{\"{u}}nter Karjoth and
                  Birgit Pfitzmann and
                  Matthias Schunter and
                  Michael Waidner},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Service-oriented Assurance - Comprehensive Security by Explicit Assurances},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {13--24},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_2},
  doi          = {10.1007/978-0-387-36584-8\_2},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KarjothPSW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KesdoganP06,
  author       = {Dogan Kesdogan and
                  Lexi Pimenidis},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {The Lower Bound of Attacks on Anonymity Systems - {A} Unicity Distance
                  Approach},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {145--158},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_12},
  doi          = {10.1007/978-0-387-36584-8\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KesdoganP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KesdoganPK06,
  author       = {Dogan Kesdogan and
                  Lexi Pimenidis and
                  Tobias K{\"{o}}lsch},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Intersection Attacks on Web-Mixes: Bringing the Theory into Praxis},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {159--171},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_13},
  doi          = {10.1007/978-0-387-36584-8\_13},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KesdoganPK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LundinLBF06,
  author       = {Reine Lundin and
                  Stefan Lindskog and
                  Anna Brunstr{\"{o}}m and
                  Simone Fischer{-}H{\"{u}}bner},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Using Guesswork as a Measure for Confidentiality of Selectively Encrypted
                  Messages},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {173--184},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_14},
  doi          = {10.1007/978-0-387-36584-8\_14},
  timestamp    = {Mon, 10 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/LundinLBF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/McQueenBFB06,
  author       = {Miles A. McQueen and
                  Wayne F. Boyer and
                  Mark A. Flynn and
                  George A. Beitel},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Time-to-Compromise Model for Cyber Risk Reduction Estimation},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {49--64},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_5},
  doi          = {10.1007/978-0-387-36584-8\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/McQueenBFB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MullenG06,
  author       = {Robert E. Mullen and
                  Swapna S. Gokhale},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {A Discrete Lognormal Model for Software Defects Affecting Quality
                  of Protection},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {37--47},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_4},
  doi          = {10.1007/978-0-387-36584-8\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MullenG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Ozment06,
  author       = {Andy Ozment},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Software Security Growth Modeling: Examining Vulnerabilities with
                  Reliability Growth Models},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {25--36},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_3},
  doi          = {10.1007/978-0-387-36584-8\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Ozment06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RossebeoLHR06,
  author       = {Judith E. Y. Rossebe{\o} and
                  Mass Soldal Lund and
                  Knut Eilif Husa and
                  Atle Refsdal},
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {A Conceptual Model for Service Availability},
  booktitle    = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  pages        = {107--118},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8\_9},
  doi          = {10.1007/978-0-387-36584-8\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RossebeoLHR06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/23,
  editor       = {Dieter Gollmann and
                  Fabio Massacci and
                  Artsiom Yautsiukhin},
  title        = {Quality of Protection - Security Measurements and Metrics},
  series       = {Advances in Information Security},
  volume       = {23},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-0-387-36584-8},
  doi          = {10.1007/978-0-387-36584-8},
  isbn         = {978-0-387-29016-4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/KruegelVV05,
  author       = {Christopher Kruegel and
                  Fredrik Valeur and
                  Giovanni Vigna},
  title        = {Intrusion Detection and Correlation - Challenges and Solutions},
  series       = {Advances in Information Security},
  volume       = {14},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b101493},
  doi          = {10.1007/B101493},
  isbn         = {978-0-387-23398-7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/KruegelVV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/McGuireG05,
  author       = {Tommy M. McGuire and
                  Mohamed G. Gouda},
  title        = {The Austin Protocol Compiler},
  series       = {Advances in Information Security},
  volume       = {13},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b101038},
  doi          = {10.1007/B101038},
  isbn         = {978-0-387-23227-0},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/McGuireG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Shoniregun05,
  author       = {Charles A. Shoniregun},
  title        = {Impacts and Risk Assessment of Technology for Internet Security -
                  Enabled Information Small-Medium Enterprises {(TEISMES)}},
  series       = {Advances in Information Security},
  volume       = {17},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137376},
  doi          = {10.1007/B137376},
  isbn         = {978-0-387-24343-6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Shoniregun05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Weippl05,
  author       = {Edgar R. Weippl},
  title        = {Security in E-Learning},
  series       = {Advances in Information Security},
  volume       = {16},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b136702},
  doi          = {10.1007/B136702},
  isbn         = {978-0-387-24341-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Weippl05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/X05,
  title        = {Image and Video Encryption - From Digital Rights Management to Secured
                  Personal Communication},
  series       = {Advances in Information Security},
  volume       = {15},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b101495},
  doi          = {10.1007/B101495},
  isbn         = {978-0-387-23402-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/X05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Acquisti04,
  author       = {Alessandro Acquisti},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Privacy and Security of Personal Information - Economic Incentives
                  and Technological Solutions},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {179--186},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_14},
  doi          = {10.1007/1-4020-8090-5\_14},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Acquisti04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AcquistiG04,
  author       = {Alessandro Acquisti and
                  Jens Grossklags},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Privacy Attitudes and Privacy Behavior - Losses, Gains, and Hyperbolic
                  Discounting},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {165--178},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_13},
  doi          = {10.1007/1-4020-8090-5\_13},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/AcquistiG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Anderson04,
  author       = {Ross J. Anderson},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Cryptography and Competition Policy - Issues with 'Trusted Computing'},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {35--52},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_3},
  doi          = {10.1007/1-4020-8090-5\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Anderson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CampW04,
  author       = {L. Jean Camp and
                  Catherine Wolfram},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Pricing Security - {A} Market in Vulnerabilities},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {17--34},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_2},
  doi          = {10.1007/1-4020-8090-5\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/CampW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Cavusoglu04,
  author       = {Huseyin Cavusoglu},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Economics of {IT} Security Management},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {71--83},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_6},
  doi          = {10.1007/1-4020-8090-5\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Cavusoglu04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/FarahmandNSE04,
  author       = {Fariborz Farahmand and
                  Shamkant B. Navathe and
                  Gunter P. Sharp and
                  Philip H. Enslow Jr.},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Evaluating Damages Caused by Information Systems Security Incidents},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {85--94},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_7},
  doi          = {10.1007/1-4020-8090-5\_7},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/FarahmandNSE04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Gal-OrG04,
  author       = {Esther Gal{-}Or and
                  Anindya Ghose},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {The Economic Consequences of Sharing Security Information},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {95--104},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_8},
  doi          = {10.1007/1-4020-8090-5\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Gal-OrG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/GordonL04,
  author       = {Lawrence A. Gordon and
                  Martin P. Loeb},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {The Economics of Information Security Investment},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {105--125},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_9},
  doi          = {10.1007/1-4020-8090-5\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/GordonL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Landwehr04,
  author       = {Carl E. Landwehr},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Improving Information Flow in the Information Security Market - DoD
                  Experience and Future Directions},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {155--163},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_12},
  doi          = {10.1007/1-4020-8090-5\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Landwehr04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Lewis04,
  author       = {Stephen Lewis},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {How Much is Stronger {DRM} Worth?},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {53--57},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_4},
  doi          = {10.1007/1-4020-8090-5\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Lewis04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LookabaughS04,
  author       = {Tom D. Lookabaugh and
                  Douglas C. Sicker},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Security and Lock-In},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {225--246},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_17},
  doi          = {10.1007/1-4020-8090-5\_17},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/LookabaughS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Odlyzko04,
  author       = {Andrew M. Odlyzko},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Privacy, Economics, and Price Discrimination on the Internet},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {187--211},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_15},
  doi          = {10.1007/1-4020-8090-5\_15},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Odlyzko04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/RosascoL04,
  author       = {Nicholas Rosasco and
                  David Larochelle},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {How and Why More Secure Technologies Succeed in Legacy Markets - Lessons
                  from the Success of {SSH}},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {247--254},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_18},
  doi          = {10.1007/1-4020-8090-5\_18},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/RosascoL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SandriniC04,
  author       = {Mauro Sandrini and
                  Ferdinando Cerbone},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {We Want Security but We Hate It - The Foundations of security technoeconomics
                  in the social worldfrom Control to Surveillance},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {213--223},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_16},
  doi          = {10.1007/1-4020-8090-5\_16},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SandriniC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SchechterGS04,
  author       = {Stuart E. Schechter and
                  Rachel Greenstadt and
                  Michael D. Smith},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Trusted Computing, Peer-to-Peer Distribution, and The Economics of
                  Pirated Entertainment},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {59--69},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_5},
  doi          = {10.1007/1-4020-8090-5\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SchechterGS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Schneier04,
  author       = {Bruce Schneier},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Evaluating Security Systems: {A} Five-Step Process},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {289--293},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_20},
  doi          = {10.1007/1-4020-8090-5\_20},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Schneier04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ShostackS04,
  author       = {Adam Shostack and
                  Paul Syverson},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {What Price Privacy? - and why identity theft is about neither identity
                  nor theft},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {129--142},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_10},
  doi          = {10.1007/1-4020-8090-5\_10},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ShostackS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/ThompsonCG04,
  author       = {Paul Thompson and
                  George Cybenko and
                  Annarita Giani},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Cognitive Hacking},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {255--287},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_19},
  doi          = {10.1007/1-4020-8090-5\_19},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/ThompsonCG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Varian04,
  author       = {Hal R. Varian},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {System Reliability and Free Riding},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_1},
  doi          = {10.1007/1-4020-8090-5\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Varian04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/VilaGM04,
  author       = {Tony Vila and
                  Rachel Greenstadt and
                  David Molnar},
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Why We Can't Be Bothered to Read Privacy Policies - Models of Privacy
                  Economics as a Lemons Market},
  booktitle    = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  pages        = {143--153},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/1-4020-8090-5\_11},
  doi          = {10.1007/1-4020-8090-5\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/VilaGM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/12,
  editor       = {L. Jean Camp and
                  Stephen Lewis},
  title        = {Economics of Information Security},
  series       = {Advances in Information Security},
  volume       = {12},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b116816},
  doi          = {10.1007/B116816},
  isbn         = {1-4020-8089-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/NingJW03,
  author       = {Peng Ning and
                  Sushil Jajodia and
                  Xiaoyang Sean Wang},
  title        = {Intrusion Detection in Distributed Systems - An Abstraction-Based
                  Approach},
  series       = {Advances in Information Security},
  volume       = {9},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0467-2},
  doi          = {10.1007/978-1-4615-0467-2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/NingJW03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Williams03,
  author       = {Godfried Williams},
  title        = {Synchronizing E-Security},
  series       = {Advances in Information Security},
  volume       = {10},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0493-1},
  doi          = {10.1007/978-1-4615-0493-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Williams03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BruschiPR03,
  author       = {Danilo Bruschi and
                  Giusi Poletti and
                  Emilia Rosti},
  editor       = {Dimitris Gritzalis},
  title        = {E-vote and Pki's: a Need, a Bliss or a Curse?},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {195--209},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_13},
  doi          = {10.1007/978-1-4615-0239-5\_13},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BruschiPR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/BurmesterM03,
  author       = {Mike Burmester and
                  Emmanouil Magkos},
  editor       = {Dimitris Gritzalis},
  title        = {Towards Secure and Practical E-Elections in the New Era},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {63--76},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_5},
  doi          = {10.1007/978-1-4615-0239-5\_5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/BurmesterM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Chaum03,
  author       = {David Chaum},
  editor       = {Dimitris Gritzalis},
  title        = {Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {211--219},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_14},
  doi          = {10.1007/978-1-4615-0239-5\_14},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Chaum03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Cranor03,
  author       = {Lorrie Faith Cranor},
  editor       = {Dimitris Gritzalis},
  title        = {In Search of the Perfect Voting Technology: No Easy Answers},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {17--30},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_2},
  doi          = {10.1007/978-1-4615-0239-5\_2},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Cranor03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/DamgardGS03,
  author       = {Ivan Damg{\aa}rd and
                  Jens Groth and
                  Gorm Salomonsen},
  editor       = {Dimitris Gritzalis},
  title        = {The Theory and Implementation of an Electronic Voting System},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {77--98},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_6},
  doi          = {10.1007/978-1-4615-0239-5\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/DamgardGS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Gerck03,
  author       = {Ed Gerck},
  editor       = {Dimitris Gritzalis},
  title        = {Private, Secure and Auditable Internet Voting},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {165--179},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_11},
  doi          = {10.1007/978-1-4615-0239-5\_11},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Gerck03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Jones03,
  author       = {Douglas W. Jones},
  editor       = {Dimitris Gritzalis},
  title        = {The Evaluation of Voting Technology},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {3--16},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_1},
  doi          = {10.1007/978-1-4615-0239-5\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Jones03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/KiayiasY03,
  author       = {Aggelos Kiayias and
                  Moti Yung},
  editor       = {Dimitris Gritzalis},
  title        = {Robust Verifiable non-Interactive Zero-Sharing - {A} Plug-in Utility
                  for Enhanced Voters' Privacy},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {139--151},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_9},
  doi          = {10.1007/978-1-4615-0239-5\_9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/KiayiasY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/LambrinoudakisGTKI03,
  author       = {Costas Lambrinoudakis and
                  Dimitris Gritzalis and
                  Vassilis Tsoumas and
                  Maria Karyda and
                  Spyros Ikonomopoulos},
  editor       = {Dimitris Gritzalis},
  title        = {Secure Electronic Voting: the Current Landscape},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {101--122},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_7},
  doi          = {10.1007/978-1-4615-0239-5\_7},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/LambrinoudakisGTKI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MercuriN03,
  author       = {Rebecca T. Mercuri and
                  Peter G. Neumann},
  editor       = {Dimitris Gritzalis},
  title        = {Verification for Electronic Balloting Systems},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {31--42},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_3},
  doi          = {10.1007/978-1-4615-0239-5\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MercuriN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/MitrouGKQ03,
  author       = {Lilian Mitrou and
                  Dimitris Gritzalis and
                  Sokratis K. Katsikas and
                  Gerald Quirchmayr},
  editor       = {Dimitris Gritzalis},
  title        = {Electronic Voting: Constitutional and Legal Requirements, and Their
                  Technical Implications},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {43--60},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_4},
  doi          = {10.1007/978-1-4615-0239-5\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/MitrouGKQ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Peralta03,
  author       = {Ren{\'{e}} Peralta},
  editor       = {Dimitris Gritzalis},
  title        = {Issues, Non-Issues, and Cryptographic Tools for Internet-Based Voting},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {153--164},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_10},
  doi          = {10.1007/978-1-4615-0239-5\_10},
  timestamp    = {Fri, 03 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/Peralta03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Saltman03,
  author       = {Roy G. Saltman},
  editor       = {Dimitris Gritzalis},
  title        = {Public Confidence and Auditability in Voting Systems},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {125--137},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_8},
  doi          = {10.1007/978-1-4615-0239-5\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Saltman03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/TrechselMK03,
  author       = {Alexander H. Trechsel and
                  Fernando Mendez and
                  Raphael Kies},
  editor       = {Dimitris Gritzalis},
  title        = {Remote Voting via the Internet? - The Canton of Geneva pilot project},
  booktitle    = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  pages        = {181--194},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5\_12},
  doi          = {10.1007/978-1-4615-0239-5\_12},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/TrechselMK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/7,
  editor       = {Dimitris Gritzalis},
  title        = {Secure Electronic Voting},
  series       = {Advances in Information Security},
  volume       = {7},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-1-4615-0239-5},
  doi          = {10.1007/978-1-4615-0239-5},
  isbn         = {1-4020-7301-1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/7.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/Kirli02,
  author       = {Zeliha Dilsun Kirli},
  title        = {Mobile Computation with Functions},
  series       = {Advances in Information Security},
  volume       = {5},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-1007-9},
  doi          = {10.1007/978-1-4615-1007-9},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/Kirli02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/LiRP02,
  author       = {Jun Li and
                  Peter L. Reiher and
                  Gerald J. Popek},
  title        = {Disseminating Security Updates at Internet Scale},
  series       = {Advances in Information Security},
  volume       = {8},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/978-1-4615-1021-5},
  doi          = {10.1007/978-1-4615-1021-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/LiRP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/AntonE01,
  author       = {Annie I. Ant{\'{o}}n and
                  Julia Brande Earp},
  editor       = {Anup K. Ghosh},
  title        = {Strategies for Developing Policies and Requirements for Secure and
                  Private Electronic Commerce},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {67--86},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_5},
  doi          = {10.1007/978-1-4615-1467-1\_5},
  timestamp    = {Tue, 16 May 2017 14:24:25 +0200},
  biburl       = {https://dblp.org/rec/series/ais/AntonE01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Arkin01,
  author       = {Brad Arkin},
  editor       = {Anup K. Ghosh},
  title        = {Software Security Analysis: an Example Case Study},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {17--28},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_2},
  doi          = {10.1007/978-1-4615-1467-1\_2},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Arkin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/DuA01,
  author       = {Wenliang Du and
                  Mikhail J. Atallah},
  editor       = {Anup K. Ghosh},
  title        = {Protocols for Secure Remote Database Access with Approximate Matching},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {87--111},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_6},
  doi          = {10.1007/978-1-4615-1467-1\_6},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/DuA01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Ghosh01,
  author       = {Anup K. Ghosh},
  editor       = {Anup K. Ghosh},
  title        = {New Security Issues in Mobile E-Commerce},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {29--46},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_3},
  doi          = {10.1007/978-1-4615-1467-1\_3},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Ghosh01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/Goodman01,
  author       = {Marc D. Goodman},
  editor       = {Anup K. Ghosh},
  title        = {Problems in Policing E-Commerce Crime},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {47--63},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_4},
  doi          = {10.1007/978-1-4615-1467-1\_4},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/Goodman01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/JajodiaKS01,
  author       = {Sushil Jajodia and
                  Michiharu Kudo and
                  V. S. Subrahmanian},
  editor       = {Anup K. Ghosh},
  title        = {Provisional Authorizations},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {133--159},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_8},
  doi          = {10.1007/978-1-4615-1467-1\_8},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/JajodiaKS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/SantosVK01,
  author       = {Andr{\'{e}} L. M. dos Santos and
                  Giovanni Vigna and
                  Richard A. Kemmerer},
  editor       = {Anup K. Ghosh},
  title        = {Security Testing of an Online Banking Service},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {3--15},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_1},
  doi          = {10.1007/978-1-4615-1467-1\_1},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/SantosVK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/WangVZ01,
  author       = {Hongxue Wang and
                  Vijay Varadharajan and
                  Yan Zhang},
  editor       = {Anup K. Ghosh},
  title        = {A New Approach to Reasoning About Accountability in Cryptographic
                  Protocols for E-Commerce},
  booktitle    = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  pages        = {113--131},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1\_7},
  doi          = {10.1007/978-1-4615-1467-1\_7},
  timestamp    = {Wed, 07 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/WangVZ01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/2,
  editor       = {Anup K. Ghosh},
  title        = {E-Commerce Security and Privacy},
  series       = {Advances in Information Security},
  volume       = {2},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/978-1-4615-1467-1},
  doi          = {10.1007/978-1-4615-1467-1},
  isbn         = {0-7923-7399-5},
  timestamp    = {Tue, 16 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/series/ais/2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}