Search dblp for Publications

export results for "toc:db/conf/eisa/eisa2021.bht:"

 download as .bib file

@proceedings{DBLP:conf/eisa/2021,
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-93956-4},
  doi          = {10.1007/978-3-030-93956-4},
  isbn         = {978-3-030-93955-7},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/0001FO21,
  author       = {Muhammad Imran Khan and
                  Simon N. Foley and
                  Barry O'Sullivan},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Database Intrusion Detection Systems (DIDs): Insider Threat Detection
                  via Behaviour-Based Anomaly Detection Systems - {A} Brief Survey of
                  Concepts and Approaches},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {178--197},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_11},
  doi          = {10.1007/978-3-030-93956-4\_11},
  timestamp    = {Wed, 02 Mar 2022 16:47:49 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/0001FO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/0002KR21,
  author       = {Martin Grimmer and
                  Tim Kaelble and
                  Erhard Rahm},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Improving Host-Based Intrusion Detection Using Thread Information},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {159--177},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_10},
  doi          = {10.1007/978-3-030-93956-4\_10},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/0002KR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/GreavesCL21,
  author       = {Brian Greaves and
                  Marijke Coetzee and
                  Wai Sze Leung},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Digital Twin Monitoring for Cyber-Physical Access Control},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {144--158},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_9},
  doi          = {10.1007/978-3-030-93956-4\_9},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/GreavesCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/GuptaKNG21,
  author       = {Sanonda Datta Gupta and
                  Stephen Kaplan and
                  Aubree Nygaard and
                  Sepideh Ghanavati},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {A Two-Fold Study to Investigate Users' Perception of IoT Information
                  Sensitivity Levels and Their Willingness to Share the Information},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {87--107},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_6},
  doi          = {10.1007/978-3-030-93956-4\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/GuptaKNG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/HeC21,
  author       = {Yueyue He and
                  Jiageng Chen},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {AMLChain: Supporting Anti-money Laundering, Privacy-Preserving, Auditable
                  Distributed Ledger},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {50--67},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_4},
  doi          = {10.1007/978-3-030-93956-4\_4},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/HeC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/JingYH21,
  author       = {Pujie Jing and
                  Shixiong Yao and
                  Yueyue He},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {{APHC:} Auditable and Privacy Preserving Health {QR} Code Based on
                  Blockchain},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {36--49},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_3},
  doi          = {10.1007/978-3-030-93956-4\_3},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/JingYH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/Lyu0ZYHH21,
  author       = {Ting Lyu and
                  Liang Liu and
                  Fangzhou Zhu and
                  Jingxiu Yang and
                  Simin Hu and
                  Yanxi Huang},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {{NEEX:} An Automated and Efficient Tool for Detecting Browser Extension
                  Fingerprint},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {21--35},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_2},
  doi          = {10.1007/978-3-030-93956-4\_2},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/Lyu0ZYHH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/ShresthaITD21,
  author       = {Sunny Shrestha and
                  Esa Irby and
                  Raghav Thapa and
                  Sanchari Das},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {SoK: {A} Systematic Literature Review of Bluetooth Security Threats
                  and Mitigation Measures},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {108--127},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_7},
  doi          = {10.1007/978-3-030-93956-4\_7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eisa/ShresthaITD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/YeLHZYW21,
  author       = {Renjun Ye and
                  Liang Liu and
                  Simin Hu and
                  Fangzhou Zhu and
                  Jingxiu Yang and
                  Feng Wang},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {{JSLIM:} Reducing the Known Vulnerabilities of JavaScript Application
                  by Debloating},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {128--143},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_8},
  doi          = {10.1007/978-3-030-93956-4\_8},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/YeLHZYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/ZhangC21,
  author       = {Jixin Zhang and
                  Jiageng Chen},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Practical and Provable Secure Vehicular Component Protection Scheme},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {1--20},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_1},
  doi          = {10.1007/978-3-030-93956-4\_1},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/ZhangC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eisa/ZhangGMT21,
  author       = {Boyun Zhang and
                  Puneet Gill and
                  Nelu Mihai and
                  Mahesh Tripunitara},
  editor       = {Weizhi Meng and
                  Sokratis K. Katsikas},
  title        = {Granularity and Usability in Authorization Policies},
  booktitle    = {Emerging Information Security and Applications - Second International
                  Symposium, {EISA} 2021, Copenhagen, Denmark, November 12-13, 2021,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1403},
  pages        = {68--86},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-93956-4\_5},
  doi          = {10.1007/978-3-030-93956-4\_5},
  timestamp    = {Wed, 02 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eisa/ZhangGMT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics