Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/hotsos/hotsos2014.bht:"
@inproceedings{DBLP:conf/hotsos/BiswasLDO14, author = {Trisha Biswas and Kendra Lesser and Rudra Dutta and Meeko M. K. Oishi}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Examining reliability of wireless multihop network routing with linear systems}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {19}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600195}, doi = {10.1145/2600176.2600195}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/BiswasLDO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/CaoCKIS14, author = {Phuong Cao and Key{-}whan Chung and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer and Adam J. Slagell}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Preemptive intrusion detection}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {21}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600197}, doi = {10.1145/2600176.2600197}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/CaoCKIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/CaoLNKIS14, author = {Phuong Cao and Hongyang Li and Klara Nahrstedt and Zbigniew T. Kalbarczyk and Ravishankar K. Iyer and Adam J. Slagell}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Personalized password guessing: a new security threat}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {22}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600198}, doi = {10.1145/2600176.2600198}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/CaoLNKIS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/ChakrabortyHYRA14, author = {Arpan Chakraborty and Brent E. Harrison and Pu Yang and David L. Roberts and Robert St. Amant}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Exploring key-level analytics for computational modeling of typing behavior}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {34}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600210}, doi = {10.1145/2600176.2600210}, timestamp = {Thu, 24 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/ChakrabortyHYRA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/DaXX14, author = {Gaofeng Da and Maochao Xu and Shouhuai Xu}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {A new approach to modeling and analyzing security of networked systems}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {6}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600184}, doi = {10.1145/2600176.2600184}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/DaXX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/DasBC14, author = {Anupam Das and Nikita Borisov and Matthew Caesar}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Analyzing an adaptive reputation metric for anonymity systems}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {11}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600187}, doi = {10.1145/2600176.2600187}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/DasBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/DavisSLEMW14, author = {Agnes Davis and Ashwin Shashidharan and Qian Liu and William Enck and Anne McLaughlin and Benjamin Watson}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Insecure behaviors on mobile devices under stress}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {31}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600207}, doi = {10.1145/2600176.2600207}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/DavisSLEMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/DurbeckAM14, author = {Lisa J. K. Durbeck and Peter M. Athanas and Nicholas J. Macias}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Secure-by-construction composable componentry for network processing}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {27}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600203}, doi = {10.1145/2600176.2600203}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/DurbeckAM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/EscobarMMS14, author = {Santiago Escobar and Catherine Meadows and Jos{\'{e}} Meseguer and Sonia Santiago}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {A rewriting-based forwards semantics for Maude-NPA}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {3}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600186}, doi = {10.1145/2600176.2600186}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/EscobarMMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/FeigenbaumJW14, author = {Joan Feigenbaum and Aaron D. Jaggard and Rebecca N. Wright}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Open vs. closed systems for accountability}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {4}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600179}, doi = {10.1145/2600176.2600179}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/FeigenbaumJW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/ForgetKACCT14, author = {Alain Forget and Saranga Komanduri and Alessandro Acquisti and Nicolas Christin and Lorrie Faith Cranor and Rahul Telang}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Building the security behavior observatory: an infrastructure for long-term monitoring of client machines}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {24}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600200}, doi = {10.1145/2600176.2600200}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/ForgetKACCT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/HanLX14, author = {Yujuan Han and Wenlian Lu and Shouhuai Xu}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Characterizing the power of moving target defense via cyber epidemic dynamics}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {10}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600180}, doi = {10.1145/2600176.2600180}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/HanLX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/HeDSN14, author = {Xiaofan He and Huaiyu Dai and Wenbo Shen and Peng Ning}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Channel correlation modeling for link signature security assessment}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {25}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600201}, doi = {10.1145/2600176.2600201}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/HeDSN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/HuangN14, author = {Jingwei Huang and David M. Nicol}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Evidence-based trust reasoning}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {17}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600193}, doi = {10.1145/2600176.2600193}, timestamp = {Thu, 11 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/HuangN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/HwangWV14, author = {JeeHyun Hwang and Laurie A. Williams and Mladen A. Vouk}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Access control policy evolution: an empirical study}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {28}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600204}, doi = {10.1145/2600176.2600204}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/HwangWV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/Ibrahim14, author = {Naseem Ibrahim}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Trustworthy context-dependent services}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {20}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600196}, doi = {10.1145/2600176.2600196}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/Ibrahim14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/KastnerP14, author = {Christian K{\"{a}}stner and J{\"{u}}rgen Pfeffer}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Limiting recertification in highly configurable systems: analyzing interactions and isolation among configuration options}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {23}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600199}, doi = {10.1145/2600176.2600199}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/KastnerP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/KhalajVA14, author = {Ebrahim Khalaj and Radu Vanciu and Marwan Abi{-}Antoun}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Is there value in reasoning about security at the architectural level: a comparative evaluation}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {30}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600206}, doi = {10.1145/2600176.2600206}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/KhalajVA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/KingW14, author = {Jason Tyler King and Laurie A. Williams}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Log your {CRUD:} design principles for software logging mechanisms}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {5}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600183}, doi = {10.1145/2600176.2600183}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/KingW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/KurilovaONCPA14, author = {Darya Kurilova and Cyrus Omar and Ligia Nistor and Benjamin Chung and Alex Potanin and Jonathan Aldrich}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Type-specific languages to fight injection attacks}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {18}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600194}, doi = {10.1145/2600176.2600194}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/KurilovaONCPA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/LaymanDZ14, author = {Lucas Layman and Sylvain David Diffo and Nico Zazworka}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Human factors in webserver log file analysis: a controlled experiment on investigating malicious activity}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {9}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600185}, doi = {10.1145/2600176.2600185}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/LaymanDZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/LaymanZ14, author = {Lucas Layman and Nico Zazworka}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {InViz: instant visualization of security attacks}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {15}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600191}, doi = {10.1145/2600176.2600191}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/LaymanZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/LiuBWME14, author = {Qian Liu and Juhee Bae and Benjamin Watson and Anne McLaughlin and William Enck}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Modeling and sensing risky user behavior on mobile devices}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {33}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600209}, doi = {10.1145/2600176.2600209}, timestamp = {Fri, 02 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/LiuBWME14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/MaassSA14, author = {Michael Maass and William L. Scherlis and Jonathan Aldrich}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {In-nimbo sandboxing}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {1}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600177}, doi = {10.1145/2600176.2600177}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/MaassSA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/Mitra14, author = {Sayan Mitra}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Proving abstractions of dynamical systems through numerical simulations}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {12}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600188}, doi = {10.1145/2600176.2600188}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/Mitra14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/RaoHBLN14, author = {Ashwini Rao and Hanan Hibshi and Travis D. Breaux and Jean{-}Michel Lehker and Jianwei Niu}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Less is more?: investigating the role of examples in security studies using analogical transfer}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {7}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600182}, doi = {10.1145/2600176.2600182}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/RaoHBLN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/RayC14, author = {Arnab Ray and Rance Cleaveland}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {An analysis method for medical device security}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {16}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600192}, doi = {10.1145/2600176.2600192}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/RayC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/SchmerlCGGCMGB14, author = {Bradley R. Schmerl and Javier C{\'{a}}mara and Jeffrey Gennari and David Garlan and Paulo Casanova and Gabriel A. Moreno and Thomas J. Glazier and Jeffrey M. Barnes}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Architecture-based self-protection: composing and reasoning about denial-of-service mitigations}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {2}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600181}, doi = {10.1145/2600176.2600181}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/SchmerlCGGCMGB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/SubramaniVW14, author = {Shweta Subramani and Mladen A. Vouk and Laurie A. Williams}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {An analysis of Fedora security profile}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {35}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600211}, doi = {10.1145/2600176.2600211}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/SubramaniVW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/TembeZLHMMG14, author = {Rucha Tembe and Olga A. Zielinska and Yuqi Liu and Kyung Wha Hong and Emerson R. Murphy{-}Hill and Christopher B. Mayhorn and Xi Ge}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Phishing in international waters: exploring cross-national differences in phishing conceptualizations between Chinese, Indian and American samples}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {8}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600178}, doi = {10.1145/2600176.2600178}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/TembeZLHMMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/Venkatakrishnan14, author = {Roopak Venkatakrishnan and Mladen A. Vouk}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Diversity-based detection of security anomalies}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {29}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600205}, doi = {10.1145/2600176.2600205}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/Venkatakrishnan14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/Xu14, author = {Shouhuai Xu}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Emergent behavior in cybersecurity}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {13}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600189}, doi = {10.1145/2600176.2600189}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/Xu14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/Xu14a, author = {Shouhuai Xu}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Cybersecurity dynamics}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {14}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600190}, doi = {10.1145/2600176.2600190}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/Xu14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/YangXPEX14, author = {Wei Yang and Xusheng Xiao and Rahul Pandita and William Enck and Tao Xie}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Improving mobile application security via bridging user expectations and application behaviors}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {32}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600208}, doi = {10.1145/2600176.2600208}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/YangXPEX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotsos/YuNV14, author = {Xianqing Yu and Peng Ning and Mladen A. Vouk}, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Securing Hadoop in cloud}, booktitle = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, pages = {26}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2600176.2600202}, doi = {10.1145/2600176.2600202}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hotsos/YuNV14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/hotsos/2014, editor = {Laurie A. Williams and David M. Nicol and Munindar P. Singh}, title = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014}, publisher = {{ACM}}, year = {2014}, url = {http://dl.acm.org/citation.cfm?id=2600176}, isbn = {978-1-4503-2907-1}, timestamp = {Tue, 05 May 2015 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hotsos/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.