Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Dan Geer
@article{DBLP:journals/ieeesp/Geer21, author = {Daniel E. Geer Jr.}, title = {Auto-Update Considered Harmful}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {2}, pages = {79--80}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3050248}, doi = {10.1109/MSEC.2021.3050248}, timestamp = {Fri, 06 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer21a, author = {Daniel E. Geer Jr.}, title = {Convergence}, journal = {{IEEE} Secur. Priv.}, volume = {19}, number = {6}, pages = {123--124}, year = {2021}, url = {https://doi.org/10.1109/MSEC.2021.3106594}, doi = {10.1109/MSEC.2021.3106594}, timestamp = {Fri, 05 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer20, author = {Daniel E. Geer Jr.}, title = {Security Theater, the Beat Goes On}, journal = {{IEEE} Secur. Priv.}, volume = {18}, number = {4}, pages = {75--76}, year = {2020}, url = {https://doi.org/10.1109/MSEC.2020.2992210}, doi = {10.1109/MSEC.2020.2992210}, timestamp = {Tue, 28 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer20, author = {Dan Geer}, title = {For Good Measure: Cyberjobsecurity}, journal = {login Usenix Mag.}, volume = {45}, number = {1}, year = {2020}, url = {https://www.usenix.org/publications/login/mar20/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerS20, author = {Dan Geer and George P. Sieniawski}, title = {Who Will Pay the Piper for Open Source Software Maintenance? Can We Increase Reliability as We Increase Reliance?}, journal = {login Usenix Mag.}, volume = {45}, number = {2}, year = {2020}, url = {https://www.usenix.org/publications/login/summer2020/geer}, timestamp = {Fri, 26 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer20a, author = {Dan Geer}, title = {For Good Measure: Security Measurement in the Present Tense}, journal = {login Usenix Mag.}, volume = {45}, number = {3}, year = {2020}, url = {https://www.usenix.org/publications/login/fall2020/geer}, timestamp = {Fri, 02 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerTM20, author = {Dan Geer and Bentz Tozer and John Speed Meyers}, title = {For Good Measure: Counting Broken Links: {A} Quant's View of Software Supply Chain Security}, journal = {login Usenix Mag.}, volume = {45}, number = {4}, year = {2020}, url = {https://www.usenix.org/publications/login/winter2020/geer}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerTM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecrime/LeverettJBGG20, author = {{\'{E}}ireann Leverett and Eric Jardine and Erin Burns and Ankit Gangwal and Dan Geer}, title = {Averages don't characterise the heavy tails of ransoms}, booktitle = {{APWG} Symposium on Electronic Crime Research, eCrime 2020, Boston, MA, USA, November 16-19, 2020}, pages = {1--12}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/eCrime51433.2020.9493256}, doi = {10.1109/ECRIME51433.2020.9493256}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecrime/LeverettJBGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer19, author = {Daniel E. Geer Jr.}, title = {Unknowable Unknowns}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {2}, pages = {80--79}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2898636}, doi = {10.1109/MSEC.2019.2898636}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer19a, author = {Daniel E. Geer Jr.}, title = {Ownership}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {4}, pages = {100--99}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2914845}, doi = {10.1109/MSEC.2019.2914845}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerP19, author = {Daniel E. Geer Jr. and Dale Peterson}, title = {Failure as Design}, journal = {{IEEE} Secur. Priv.}, volume = {17}, number = {6}, pages = {89--90}, year = {2019}, url = {https://doi.org/10.1109/MSEC.2019.2936706}, doi = {10.1109/MSEC.2019.2936706}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerG19, author = {Dan Geer and Scott B. Guthery}, title = {For Good Measure: Patent Activity as a Measure of Cybersecurity Innovation}, journal = {login Usenix Mag.}, volume = {44}, number = {1}, year = {2019}, url = {https://www.usenix.org/publications/login/spring2019/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer19, author = {Dan Geer}, title = {For Good Measure: Curves of Error}, journal = {login Usenix Mag.}, volume = {44}, number = {2}, year = {2019}, url = {https://www.usenix.org/publications/login/summer2019/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerB19, author = {Dan Geer and Wade Baker}, title = {For Good Measure: Is the Cloud Less Secure than On-Prem?}, journal = {login Usenix Mag.}, volume = {44}, number = {3}, year = {2019}, url = {https://www.usenix.org/publications/login/fall2019/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerC19, author = {Dan Geer and Jason Crabtree}, title = {For Good Measure: The Imperative of Reclaiming Metrics Terminology}, journal = {login Usenix Mag.}, volume = {44}, number = {4}, year = {2019}, url = {https://www.usenix.org/publications/login/winter2019/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer18, author = {Daniel E. Geer Jr.}, title = {Trading Places}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {1}, pages = {104}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.1331041}, doi = {10.1109/MSP.2018.1331041}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer18a, author = {Daniel E. Geer Jr.}, title = {You Are What You Eat}, journal = {{IEEE} Secur. Priv.}, volume = {16}, number = {4}, pages = {96}, year = {2018}, url = {https://doi.org/10.1109/MSP.2018.3111250}, doi = {10.1109/MSP.2018.3111250}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerC18, author = {Dan Geer and Dan Conway}, title = {For Good Measure: Between a Block and a Hard Place}, journal = {login Usenix Mag.}, volume = {43}, number = {1}, year = {2018}, url = {https://www.usenix.org/publications/login/spring2018/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerR18, author = {Dan Geer and Mike Roytman}, title = {For Good Measure: Remember the Recall}, journal = {login Usenix Mag.}, volume = {43}, number = {2}, year = {2018}, url = {https://www.usenix.org/publications/login/summer2018/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer18, author = {Dan Geer}, title = {For Good Measure: Numbers Are Where You Find Them}, journal = {login Usenix Mag.}, volume = {43}, number = {3}, year = {2018}, url = {https://www.usenix.org/publications/login/fall-2018-vol-43-no-2/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerV18, author = {Dan Geer and Paul Vixie}, title = {For Good Measure: Nameless Dread}, journal = {login Usenix Mag.}, volume = {43}, number = {4}, year = {2018}, url = {https://www.usenix.org/publications/login/winter-2018-vol-43-no-4/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerD17, author = {Daniel E. Geer Jr. and Richard Danzig}, title = {Mutual Dependence Demands Mutual Sharing}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {1}, pages = {87--88}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.17}, doi = {10.1109/MSP.2017.17}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer17, author = {Daniel E. Geer Jr.}, title = {Attribution}, journal = {{IEEE} Secur. Priv.}, volume = {15}, number = {4}, pages = {88}, year = {2017}, url = {https://doi.org/10.1109/MSP.2017.3151333}, doi = {10.1109/MSP.2017.3151333}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerJ17, author = {Dan Geer and Eric Jardine}, title = {Cybersecurity Workload Trends}, journal = {login Usenix Mag.}, volume = {42}, number = {1}, year = {2017}, url = {https://www.usenix.org/publications/login/spring2017/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerC17, author = {Dan Geer and Jon Callas}, title = {For Good Measure: To Burn or Not to Burn}, journal = {login Usenix Mag.}, volume = {42}, number = {2}, year = {2017}, url = {https://www.usenix.org/publications/login/summer2017/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer17, author = {Dan Geer}, title = {For Good Measure: When Opinion Is Data}, journal = {login Usenix Mag.}, volume = {42}, number = {3}, year = {2017}, url = {https://www.usenix.org/publications/login/fall2017/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer17a, author = {Dan Geer}, title = {For Good Measure: Letting Go of the Steering Wheel}, journal = {login Usenix Mag.}, volume = {42}, number = {4}, year = {2017}, url = {https://www.usenix.org/publications/login/winter2017/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer16, author = {Daniel E. Geer Jr.}, title = {Provenance}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {2}, pages = {88}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.34}, doi = {10.1109/MSP.2016.34}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer16a, author = {Daniel E. Geer Jr.}, title = {Privacy's Paradigm}, journal = {{IEEE} Secur. Priv.}, volume = {14}, number = {4}, pages = {87--88}, year = {2016}, url = {https://doi.org/10.1109/MSP.2016.73}, doi = {10.1109/MSP.2016.73}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer16, author = {Dan Geer}, title = {For Good Measure: Betting on Growth versus Magnitude}, journal = {login Usenix Mag.}, volume = {41}, number = {1}, year = {2016}, url = {https://www.usenix.org/publications/login/spring2016/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer16a, author = {Dan Geer}, title = {For Good Measure: Five Years of Listening to Security Operations}, journal = {login Usenix Mag.}, volume = {41}, number = {2}, year = {2016}, url = {https://www.usenix.org/publications/login/summer2016/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer16b, author = {Dan Geer}, title = {For Good Measure: Paradigm}, journal = {login Usenix Mag.}, volume = {41}, number = {3}, year = {2016}, url = {https://www.usenix.org/publications/login/fall2016/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer16c, author = {Dan Geer}, title = {For Good Measure: Implications of IoT}, journal = {login Usenix Mag.}, volume = {41}, number = {4}, year = {2016}, url = {https://www.usenix.org/publications/login/winter2016/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer16c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer15, author = {Daniel E. Geer Jr.}, title = {Less Is More: Saving the Internet from Itself}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {1}, pages = {80}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.6}, doi = {10.1109/MSP.2015.6}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer15a, author = {Daniel E. Geer Jr.}, title = {The Right to Be Unobserved}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {4}, pages = {88}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.76}, doi = {10.1109/MSP.2015.76}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer15b, author = {Daniel E. Geer Jr.}, title = {Children of the Magenta}, journal = {{IEEE} Secur. Priv.}, volume = {13}, number = {5}, pages = {104}, year = {2015}, url = {https://doi.org/10.1109/MSP.2015.91}, doi = {10.1109/MSP.2015.91}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer15, author = {Dan Geer}, title = {For Good Measure: Cyberjobsecurity}, journal = {login Usenix Mag.}, volume = {40}, number = {1}, year = {2015}, url = {https://www.usenix.org/publications/login/feb15/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer15a, author = {Dan Geer}, title = {For Good Measure: The Undiscovered}, journal = {login Usenix Mag.}, volume = {40}, number = {2}, year = {2015}, url = {https://www.usenix.org/publications/login/apr15/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerC15, author = {Dan Geer and Dan Conway}, title = {For Good Measure: Much Ado about Metadata}, journal = {login Usenix Mag.}, volume = {40}, number = {3}, year = {2015}, url = {https://www.usenix.org/publications/login/june15/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerM15, author = {Dan Geer and H. D. Moore}, title = {Balkanization from Above}, journal = {login Usenix Mag.}, volume = {40}, number = {4}, year = {2015}, url = {https://www.usenix.org/publications/login/aug15/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer15b, author = {Dan Geer}, title = {For Good Measure: The Denominator}, journal = {login Usenix Mag.}, volume = {40}, number = {5}, year = {2015}, url = {https://www.usenix.org/publications/login/oct15/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer15b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer15c, author = {Dan Geer}, title = {For Good Measure: Why Speculate?}, journal = {login Usenix Mag.}, volume = {40}, number = {6}, year = {2015}, url = {https://www.usenix.org/publications/login/dec15/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer15c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer14, author = {Daniel E. Geer Jr.}, title = {Polarization}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {1}, pages = {88}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.9}, doi = {10.1109/MSP.2014.9}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerK14, author = {Daniel E. Geer Jr. and Poul{-}Henning Kamp}, title = {Inviting More Heartbleed}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {46--50}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.71}, doi = {10.1109/MSP.2014.71}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer14a, author = {Daniel E. Geer Jr.}, title = {Personal Data and Government Surveillance}, journal = {{IEEE} Secur. Priv.}, volume = {12}, number = {4}, pages = {90--96}, year = {2014}, url = {https://doi.org/10.1109/MSP.2014.73}, doi = {10.1109/MSP.2014.73}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerP14, author = {Dan Geer and Gunnar Peterson}, title = {Margin of Safety or Speculation? Measuring Security Book Value}, journal = {login Usenix Mag.}, volume = {39}, number = {1}, year = {2014}, url = {https://www.usenix.org/publications/login/feb14/margin-safety-or-speculation}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerB14, author = {Dan Geer and Richard Bejtlich}, title = {Measure Like You Meant It}, journal = {login Usenix Mag.}, volume = {39}, number = {2}, year = {2014}, url = {https://www.usenix.org/publications/login/april14/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerJ14, author = {Dan Geer and Jay Jacobs}, title = {Exploring with a Purpose}, journal = {login Usenix Mag.}, volume = {39}, number = {3}, year = {2014}, url = {https://www.usenix.org/publications/login/june14/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerC14, author = {Dan Geer and Joshua Corman}, title = {Almost Too Big to Fail}, journal = {login Usenix Mag.}, volume = {39}, number = {4}, year = {2014}, url = {https://www.usenix.org/publications/login/august14/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer14, author = {Dan Geer}, title = {For Good Measure: Testing}, journal = {login Usenix Mag.}, volume = {39}, number = {5}, year = {2014}, url = {https://www.usenix.org/publications/login/october-2014-vol-39-no-5/good-measure-testing}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer14a, author = {Dan Geer}, title = {For Good Measure: Stress Analysis}, journal = {login Usenix Mag.}, volume = {39}, number = {6}, year = {2014}, url = {https://www.usenix.org/publications/login/dec14/geer}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/Geer13, author = {Dan Geer}, title = {Resolved: the internet is no place for critical infrastructure}, journal = {Commun. {ACM}}, volume = {56}, number = {6}, pages = {48--53}, year = {2013}, url = {https://doi.org/10.1145/2461256.2461273}, doi = {10.1145/2461256.2461273}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/Geer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC13, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {The Times, They Are a Changin'}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {1}, pages = {94--95}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.21}, doi = {10.1109/MSP.2013.21}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer13, author = {Daniel E. Geer Jr.}, title = {Identity as Privacy}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {1}, pages = {96}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.11}, doi = {10.1109/MSP.2013.11}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer13a, author = {Daniel E. Geer Jr.}, title = {On Abandonment}, journal = {{IEEE} Secur. Priv.}, volume = {11}, number = {4}, pages = {96}, year = {2013}, url = {https://doi.org/10.1109/MSP.2013.92}, doi = {10.1109/MSP.2013.92}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Geer13, author = {Dan Geer}, title = {Resolved: the Internet Is No Place for Critical Infrastructure}, journal = {{ACM} Queue}, volume = {11}, number = {4}, pages = {20}, year = {2013}, url = {https://doi.org/10.1145/2466486.2479677}, doi = {10.1145/2466486.2479677}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/queue/Geer13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerC13, author = {Dan Geer and Daniel G. Conway}, title = {For Good Measure: The Price of Anything Is the Foregone Alternative}, journal = {login Usenix Mag.}, volume = {38}, number = {3}, year = {2013}, url = {https://www.usenix.org/publications/login/june-2013-volume-38-number-3/good-measure-price-anything-foregone-alternative}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerW13, author = {Dan Geer and Chris Wysopal}, title = {For Good Measure: Security Debt}, journal = {login Usenix Mag.}, volume = {38}, number = {4}, year = {2013}, url = {https://www.usenix.org/publications/login/august-2013-volume-38-number-4/good-measure-security-debt}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerP13, author = {Dan Geer and Mukul Pareek}, title = {For Good Measure: Trending North}, journal = {login Usenix Mag.}, volume = {38}, number = {5}, year = {2013}, url = {https://www.usenix.org/publications/login/october-2013-volume-38-number-5/good-measure-trending-north}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/GeerR13, author = {Dan Geer and Michael Roytman}, title = {Measuring vs. Modeling}, journal = {login Usenix Mag.}, volume = {38}, number = {6}, year = {2013}, url = {https://www.usenix.org/publications/login/december-2013-volume-38-number-6/measuring-vs-modeling}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/GeerR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer12, author = {Daniel E. Geer Jr.}, title = {Power. Law}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {1}, pages = {94--95}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.19}, doi = {10.1109/MSP.2012.19}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer12a, author = {Daniel E. Geer Jr.}, title = {Numbers Worth Having}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {2}, pages = {102--103}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.46}, doi = {10.1109/MSP.2012.46}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerP12, author = {Daniel E. Geer Jr. and Mukul Pareek}, title = {{ICS} Update}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {3}, pages = {93--95}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.69}, doi = {10.1109/MSP.2012.69}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerB12, author = {Daniel E. Geer Jr. and Bob Blakley}, title = {Are You Smarter than the TSA? (Hint: No)}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {4}, pages = {94--95}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.91}, doi = {10.1109/MSP.2012.91}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerA12, author = {Daniel E. Geer Jr. and Jerry Archer}, title = {Stand Your Ground}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {4}, pages = {96}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.109}, doi = {10.1109/MSP.2012.109}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerA12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer12b, author = {Daniel E. Geer Jr.}, title = {Risk Aversion}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {5}, pages = {86--87}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.125}, doi = {10.1109/MSP.2012.125}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer12b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerL12, author = {Daniel E. Geer Jr. and Daniel B. Larremore}, title = {Progress Is Infectious}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {6}, pages = {94--95}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.151}, doi = {10.1109/MSP.2012.151}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer12, author = {Daniel E. Geer Jr.}, title = {The Future of Security: Criticality, Rejectionists, Risk Tolerance}, journal = {login Usenix Mag.}, volume = {37}, number = {4}, year = {2012}, url = {https://www.usenix.org/publications/login/august-2012-volume-37-number-4/future-security-criticality-rejectionists-risk}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer12a, author = {Daniel E. Geer Jr.}, title = {The Future of Security Nominal Delivery Draft, Rocky Mountain Information Security Conference, 18 May 2012}, journal = {login Usenix Mag.}, volume = {37}, number = {4}, year = {2012}, url = {https://www.usenix.org/publications/login/august-2012-volume-37-number-4/future-security-nominal-delivery-draft-rocky}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer11, author = {Daniel E. Geer Jr.}, title = {Does a Rising Tide Lift All Boats?}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {1}, pages = {93--94}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.7}, doi = {10.1109/MSP.2011.7}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer11a, author = {Daniel E. Geer Jr.}, title = {A Time for Choosing}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {1}, pages = {96}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.4}, doi = {10.1109/MSP.2011.4}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer11b, author = {Daniel E. Geer Jr.}, title = {Correlation Is Not Causation}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {2}, pages = {93--94}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.26}, doi = {10.1109/MSP.2011.26}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer11c, author = {Daniel E. Geer Jr.}, title = {New Measures}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {3}, pages = {86--87}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.59}, doi = {10.1109/MSP.2011.59}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer11c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer11d, author = {Daniel E. Geer Jr.}, title = {Attack Surface Inflation}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {4}, pages = {85--86}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.78}, doi = {10.1109/MSP.2011.78}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer11d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer11e, author = {Daniel E. Geer Jr.}, title = {Eisenhower Revisited}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {4}, pages = {88}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.79}, doi = {10.1109/MSP.2011.79}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer11e.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerK11, author = {Daniel E. Geer Jr. and Peter Kuper}, title = {When {\textdollar}80 Billion Is Not Enough}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {5}, pages = {86--87}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.146}, doi = {10.1109/MSP.2011.146}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer11f, author = {Daniel E. Geer Jr.}, title = {Small Is Beautiful, Big Is Inevitable}, journal = {{IEEE} Secur. Priv.}, volume = {9}, number = {6}, pages = {86--87}, year = {2011}, url = {https://doi.org/10.1109/MSP.2011.174}, doi = {10.1109/MSP.2011.174}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer11f.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC10, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {A Life Is Short, a Half-Life Is Forever}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {1}, pages = {86--87}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.29}, doi = {10.1109/MSP.2010.29}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC10a, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {Nothing Ventured, Nothing Gained}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {2}, pages = {86--87}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.79}, doi = {10.1109/MSP.2010.79}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer10, author = {Daniel E. Geer Jr.}, title = {Fratricide}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {3}, pages = {88}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.97}, doi = {10.1109/MSP.2010.97}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer10a, author = {Daniel E. Geer Jr.}, title = {A Time to Rethink}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {4}, pages = {86--87}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.119}, doi = {10.1109/MSP.2010.119}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer10b, author = {Daniel E. Geer Jr.}, title = {An Index of Cybersecurity}, journal = {{IEEE} Secur. Priv.}, volume = {8}, number = {6}, pages = {96}, year = {2010}, url = {https://doi.org/10.1109/MSP.2010.171}, doi = {10.1109/MSP.2010.171}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer10, author = {Dan Geer}, title = {Vulnerable Compliance}, journal = {login Usenix Mag.}, volume = {35}, number = {6}, year = {2010}, url = {https://www.usenix.org/publications/login/december-2010-volume-35-number-6/vulnerable-compliance}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC09, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {The 0wned Price Index}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {1}, pages = {86--87}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.23}, doi = {10.1109/MSP.2009.23}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC09a, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {Hard Data Is Good to Find}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {2}, pages = {94--95}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.39}, doi = {10.1109/MSP.2009.39}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC09b, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {A Doubt of the Benefit}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {3}, pages = {86--87}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.57}, doi = {10.1109/MSP.2009.57}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC09b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer09, author = {Daniel E. Geer Jr.}, title = {Digital Endosymbiosis}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {3}, pages = {88}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.63}, doi = {10.1109/MSP.2009.63}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC09c, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {Risk Concentration}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {5}, pages = {86--87}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.132}, doi = {10.1109/MSP.2009.132}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC09c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC09d, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {Patch Grief with Proverbs}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {6}, pages = {86--87}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.164}, doi = {10.1109/MSP.2009.164}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC09d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer09a, author = {Daniel E. Geer Jr.}, title = {Deskilling Digital Security}, journal = {{IEEE} Secur. Priv.}, volume = {7}, number = {6}, pages = {88}, year = {2009}, url = {https://doi.org/10.1109/MSP.2009.151}, doi = {10.1109/MSP.2009.151}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC08, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {What We Got for Christmas}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {1}, pages = {88}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.26}, doi = {10.1109/MSP.2008.26}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC08a, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {Beware the IDs of March}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {2}, pages = {87}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.27}, doi = {10.1109/MSP.2008.27}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer08, author = {Daniel E. Geer Jr.}, title = {Learn by Analogy or Die Trying}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {3}, pages = {88}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.66}, doi = {10.1109/MSP.2008.66}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC08b, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {Strong Attractors}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {4}, pages = {78--79}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.105}, doi = {10.1109/MSP.2008.105}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC08b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC08c, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {Type {II} Reverse Engineering [For Good Measure]}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {5}, pages = {86--87}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.132}, doi = {10.1109/MSP.2008.132}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC08c.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerC08d, author = {Daniel E. Geer Jr. and Daniel G. Conway}, title = {Security Is a Subset of Reliability}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {6}, pages = {86--87}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.151}, doi = {10.1109/MSP.2008.151}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerC08d.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer08a, author = {Daniel E. Geer Jr.}, title = {Complexity Is the Enemy}, journal = {{IEEE} Secur. Priv.}, volume = {6}, number = {6}, pages = {88}, year = {2008}, url = {https://doi.org/10.1109/MSP.2008.139}, doi = {10.1109/MSP.2008.139}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/JonesG08, author = {Michael B. Jones and Dan Geer}, title = {2008 {USENIX} Nominating Committee Report}, journal = {login Usenix Mag.}, volume = {33}, number = {1}, year = {2008}, url = {https://www.usenix.org/publications/login/february-2008-volume-33-number-1/2008-usenix-nominating-committee-report}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/JonesG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer07, author = {Daniel E. Geer Jr.}, title = {The End of Black and White}, journal = {{IEEE} Secur. Priv.}, volume = {5}, number = {4}, pages = {88}, year = {2007}, url = {https://doi.org/10.1109/MSP.2007.97}, doi = {10.1109/MSP.2007.97}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Geer07, author = {Daniel E. Geer Jr.}, title = {The evolution of security}, journal = {{ACM} Queue}, volume = {5}, number = {3}, pages = {30--35}, year = {2007}, url = {https://doi.org/10.1145/1242489.1242500}, doi = {10.1145/1242489.1242500}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/Geer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer07, author = {Dan Geer}, title = {A Quant Looks at the Future}, journal = {login Usenix Mag.}, volume = {32}, number = {3}, year = {2007}, url = {https://www.usenix.org/publications/login/june-2007-volume-32-number-3/quant-looks-future}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer06, author = {Daniel E. Geer Jr.}, title = {Convergence}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {3}, pages = {88--88}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.61}, doi = {10.1109/MSP.2006.61}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer06a, author = {Daniel E. Geer Jr.}, title = {Evidently Evidentiary}, journal = {{IEEE} Secur. Priv.}, volume = {4}, number = {6}, pages = {96}, year = {2006}, url = {https://doi.org/10.1109/MSP.2006.152}, doi = {10.1109/MSP.2006.152}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer06a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/queue/Geer06, author = {Daniel E. Geer Jr.}, title = {Playing for keeps}, journal = {{ACM} Queue}, volume = {4}, number = {9}, pages = {42--48}, year = {2006}, url = {https://doi.org/10.1145/1180176.1180193}, doi = {10.1145/1180176.1180193}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/queue/Geer06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer05, author = {Daniel E. Geer Jr.}, title = {The Problem Statement is the Problem}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {2}, pages = {80}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.53}, doi = {10.1109/MSP.2005.53}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/Geer05a, author = {Daniel E. Geer Jr.}, title = {When Is a Product a Security Product?}, journal = {{IEEE} Secur. Priv.}, volume = {3}, number = {5}, pages = {80}, year = {2005}, url = {https://doi.org/10.1109/MSP.2005.138}, doi = {10.1109/MSP.2005.138}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/Geer05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer05, author = {Dan Geer}, title = {Monoculture on the Back of the Envelope}, journal = {login Usenix Mag.}, volume = {30}, number = {6}, year = {2005}, url = {https://www.usenix.org/publications/login/december-2005-volume-30-number-6/monoculture-back-envelope}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Geer04, author = {Daniel E. Geer Jr.}, editor = {Matt Blaze}, title = {Metrics, Economics, and Shared Risk at the National Scale}, booktitle = {Proceedings of the 13th {USENIX} Security Symposium, August 9-13, 2004, San Diego, CA, {USA}}, publisher = {{USENIX}}, year = {2004}, url = {http://www.usenix.org/publications/library/proceedings/sec04/tech/slides/geer.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/Geer04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/Geer03b, author = {Daniel E. Geer Jr.}, title = {Risk Management Is Still Where the Money Is}, journal = {Computer}, volume = {36}, number = {12}, pages = {129--131}, year = {2003}, url = {https://doi.org/10.1109/MC.2003.1250894}, doi = {10.1109/MC.2003.1250894}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/Geer03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerHJ03, author = {Daniel E. Geer Jr. and Kevin Soo Hoo and Andrew Jaquith}, title = {Information Security: Why the Future Belongs to the Quants}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {4}, pages = {24--32}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1219053}, doi = {10.1109/MSECP.2003.1219053}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerHJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/GeerAW03, author = {Daniel E. Geer Jr. and David Aucsmith and James A. Whittaker}, title = {Monoculture}, journal = {{IEEE} Secur. Priv.}, volume = {1}, number = {6}, pages = {14--19}, year = {2003}, url = {https://doi.org/10.1109/MSECP.2003.1253563}, doi = {10.1109/MSECP.2003.1253563}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/GeerAW03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer03, author = {Dan Geer}, title = {Comments of the National Strategy to Secure Cyberspace}, journal = {login Usenix Mag.}, volume = {28}, number = {2}, year = {2003}, url = {https://www.usenix.org/publications/login/april-2003-volume-28-number-2/comments-national-strategy-secure-cyberspace}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer03a, author = {Dan Geer}, title = {Getting the Problem Statement Right}, journal = {login Usenix Mag.}, volume = {28}, number = {3}, year = {2003}, url = {https://www.usenix.org/publications/login/june-2003-volume-28-number-3/getting-problem-statement-right}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer03b, author = {Dan Geer}, title = {Patch Work}, journal = {login Usenix Mag.}, volume = {28}, number = {4}, year = {2003}, url = {https://www.usenix.org/publications/login/august-2003-volume-28-number-4/patch-work}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer03b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GeerH02, author = {Daniel E. Geer Jr. and John Harthorne}, title = {Penetration Testing: {A} Duet}, booktitle = {18th Annual Computer Security Applications Conference {(ACSAC} 2002), 9-13 December 2002, Las Vegas, NV, {USA}}, pages = {185--195}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/CSAC.2002.1176290}, doi = {10.1109/CSAC.2002.1176290}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acsac/GeerH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GeerY02, author = {Daniel E. Geer Jr. and Moti Yung}, editor = {Matt Blaze}, title = {Split-and-Delegate: Threshold Cryptography for the Masses}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {220--237}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_16}, doi = {10.1007/3-540-36504-4\_16}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GeerY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nspw/BlakleyMG01, author = {Bob Blakley and Ellen McDermott and Daniel E. Geer Jr.}, editor = {Victor Raskin and Steven J. Greenwald and Brenda Timmerman and Darrell M. Kienzle}, title = {Information security is information risk management}, booktitle = {Proceedings of the New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, USA, September 10-13, 2001}, pages = {97--104}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/508171.508187}, doi = {10.1145/508171.508187}, timestamp = {Thu, 09 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nspw/BlakleyMG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/usenix-login/Geer00, author = {Daniel E. Geer Jr.}, title = {From the President}, journal = {login Usenix Mag.}, volume = {25}, number = {5}, year = {2000}, url = {https://www.usenix.org/publications/login/august-2000-volume-25-number-5/president}, timestamp = {Thu, 02 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/usenix-login/Geer00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/embsys/1999, editor = {Dan Geer and Mike Hawley}, title = {{USENIX} Workshop on Embedded Systems 1999, Cambridge, MA, USA, March 29-31, 1999}, publisher = {{USENIX} Association}, year = {1999}, url = {https://www.usenix.org/conference/workshoponembeddedsystems}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/embsys/1999.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/RubinG98, author = {Aviel D. Rubin and Daniel E. Geer Jr.}, title = {A Survey of Web Security}, journal = {Computer}, volume = {31}, number = {9}, pages = {34--41}, year = {1998}, url = {https://doi.org/10.1109/2.708448}, doi = {10.1109/2.708448}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/RubinG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/RubinG98, author = {Aviel D. Rubin and Daniel E. Geer Jr.}, title = {Mobile Code Security}, journal = {{IEEE} Internet Comput.}, volume = {2}, number = {6}, pages = {30--34}, year = {1998}, url = {https://doi.org/10.1109/4236.735984}, doi = {10.1109/4236.735984}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/RubinG98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csys/DavisG96, author = {Donald T. Davis and Daniel E. Geer Jr.}, title = {Kerberos with Clocks Adrift: History, Protocols, and Implementation}, journal = {Comput. Syst.}, volume = {9}, number = {1}, pages = {29--46}, year = {1996}, url = {http://www.usenix.org/publications/compsystems/1996/win\_davis.pdf}, timestamp = {Sun, 10 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csys/DavisG96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/DavisG95, author = {Don Davis and Daniel E. Geer Jr.}, editor = {Frederick M. Avolio and Steven M. Bellovin}, title = {Kerberos Security with Clocks Adrift}, booktitle = {Proceedings of the 5th {USENIX} Security Symposium, Salt Lake City, Utah, USA, June 5-7, 1995}, publisher = {{USENIX} Association}, year = {1995}, url = {https://www.usenix.org/legacy/publications/library/proceedings/security95/davis.html}, timestamp = {Mon, 01 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uss/DavisG95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/lisa/Geer94, author = {Daniel E. Geer Jr.}, title = {Breaking into Banks: Security Lessons Learned from Financial Services}, booktitle = {Proceedings of the 8th Conference on Systems Administration {(LISA} 1994), San Diego, California, USA, September 19-23, 1994}, publisher = {{USENIX}}, year = {1994}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/lisa/Geer94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/KolstadG91, author = {Rob Kolstad and Daniel E. Geer Jr.}, title = {Software and Intellectual Property - Who Owns Your Work?}, booktitle = {Proceedings of the Summer 1991 {USENIX} Conference, Nashville, TE, USA, June 1991}, pages = {453--454}, publisher = {{USENIX} Association}, year = {1991}, timestamp = {Thu, 15 May 2014 18:36:23 +0200}, biburl = {https://dblp.org/rec/conf/usenix/KolstadG91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/computer/ChampineGR90, author = {George A. Champine and Daniel E. Geer Jr. and William Ruh}, title = {Project Athena as a Distributed Computer System}, journal = {Computer}, volume = {23}, number = {9}, pages = {40--51}, year = {1990}, url = {https://doi.org/10.1109/2.58217}, doi = {10.1109/2.58217}, timestamp = {Fri, 23 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/computer/ChampineGR90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/siguccs/CoppetoAGT89, author = {T. J. Coppeto and B. L. Anderson and Daniel E. Geer Jr. and G. Winfield Treese}, editor = {Penelope Crane}, title = {{OLC:} an on-line consulting system}, booktitle = {Proceedings of the 17th Annual {ACM} {SIGUCCS} Conference on User Services, Bethesda, Maryland, USA, 1989}, pages = {343--353}, publisher = {{ACM}}, year = {1989}, url = {https://doi.org/10.1145/73760.73814}, doi = {10.1145/73760.73814}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/siguccs/CoppetoAGT89.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/usenix/RosensteinGL88, author = {Mark A. Rosenstein and Daniel E. Geer Jr. and Peter J. Levine}, title = {The Athena Service Management System}, booktitle = {Proceedings of the {USENIX} Winter Conference. Dallas, Texas, USA, January 1988}, pages = {203--211}, publisher = {{USENIX} Association}, year = {1988}, timestamp = {Thu, 15 May 2014 18:36:23 +0200}, biburl = {https://dblp.org/rec/conf/usenix/RosensteinGL88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.