BibTeX records: James Riordan

download as .bib file

@article{DBLP:journals/sensors/TrslicWROTD20,
  author    = {Petar Trslic and
               Anthony Weir and
               James Riordan and
               Edin Omerdic and
               Daniel Toal and
               Gerard Dooly},
  title     = {Vision-Based Localization System Suited to Resident Underwater Vehicles},
  journal   = {Sensors},
  volume    = {20},
  number    = {2},
  pages     = {529},
  year      = {2020},
  url       = {https://doi.org/10.3390/s20020529},
  doi       = {10.3390/s20020529},
  timestamp = {Sat, 08 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sensors/TrslicWROTD20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossw/SchlossR18,
  author    = {James R. Schloss and
               James Riordan},
  title     = {{GPUE:} Graphics Processing Unit Gross-Pitaevskii Equation solver},
  journal   = {J. Open Source Software},
  volume    = {3},
  number    = {32},
  pages     = {1037},
  year      = {2018},
  url       = {https://doi.org/10.21105/joss.01037},
  doi       = {10.21105/joss.01037},
  timestamp = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jossw/SchlossR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/RossiTSRTD18,
  author    = {Matija Rossi and
               Petar Trslic and
               Satja Sivcev and
               James Riordan and
               Daniel Toal and
               Gerard Dooly},
  title     = {Real-Time Underwater StereoFusion},
  journal   = {Sensors},
  volume    = {18},
  number    = {11},
  pages     = {3936},
  year      = {2018},
  url       = {https://doi.org/10.3390/s18113936},
  doi       = {10.3390/s18113936},
  timestamp = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/sensors/RossiTSRTD18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/WagnerSPRN17,
  author    = {Neal Wagner and
               Cem Safak Sahin and
               Jaime Pena and
               James Riordan and
               Sebastian Neumayer},
  editor    = {Shafagh Jafer and
               Jose J. Padilla and
               Erika Frydenlund},
  title     = {Capturing the security effects of network segmentation via a continuous-time
               markov chain model},
  booktitle = {Proceedings of the 50th Annual Simulation Symposium, Virginia Beach,
               VA, USA, April 23 - 26, 2017},
  pages     = {17:1--17:12},
  publisher = {Society for Computer Simulation International / {ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3106405},
  timestamp = {Fri, 15 Dec 2017 13:25:19 +0100},
  biburl    = {https://dblp.org/rec/conf/springsim/WagnerSPRN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ssci/WagnerSWRPHS16,
  author    = {Neal Wagner and
               Cem Safak Sahin and
               Michael L. Winterrose and
               James Riordan and
               Jaime Pena and
               Diana Hanson and
               William W. Streilein},
  title     = {Towards automated cyber decision support: {A} case study on network
               segmentation for security},
  booktitle = {2016 {IEEE} Symposium Series on Computational Intelligence, {SSCI}
               2016, Athens, Greece, December 6-9, 2016},
  pages     = {1--10},
  publisher = {{IEEE}},
  year      = {2016},
  url       = {https://doi.org/10.1109/SSCI.2016.7849908},
  doi       = {10.1109/SSCI.2016.7849908},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/conf/ssci/WagnerSWRPHS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/WagnerLWRYS15,
  author    = {Neal Wagner and
               Richard Lippmann and
               Michael L. Winterrose and
               James Riordan and
               Tamara Yu and
               William W. Streilein},
  editor    = {Levent Yilmaz and
               Tuncer I. {\"{O}}ren and
               Gregory R. Madey and
               Maarten Sierhuis and
               Yu Zhang},
  title     = {Agent-based simulation for assessing network security risk due to
               unauthorized hardware},
  booktitle = {Proceedings of the Symposium on Agent-Directed Simulation, part of
               the 2015 Spring Simulation Multiconference, SpringSim '15, Alexandria,
               VA, USA, April 12-15, 2015},
  pages     = {18--26},
  publisher = {{SCS/ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2872541},
  timestamp = {Tue, 15 Nov 2016 10:37:33 +0100},
  biburl    = {https://dblp.org/rec/conf/springsim/WagnerLWRYS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CarterRO14,
  author    = {Kevin M. Carter and
               James Riordan and
               Hamed Okhravi},
  editor    = {Sushil Jajodia and
               Kun Sun},
  title     = {A Game Theoretic Approach to Strategy Determination for Dynamic Platform
               Defenses},
  booktitle = {Proceedings of the First {ACM} Workshop on Moving Target Defense,
               {MTD} '14, Scottsdale, Arizona, USA, November 7, 2014},
  pages     = {21--30},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2663474.2663478},
  doi       = {10.1145/2663474.2663478},
  timestamp = {Tue, 06 Nov 2018 11:07:29 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/CarterRO14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/OkhraviRC14,
  author    = {Hamed Okhravi and
               James Riordan and
               Kevin M. Carter},
  editor    = {Angelos Stavrou and
               Herbert Bos and
               Georgios Portokalidis},
  title     = {Quantitative Evaluation of Dynamic Platform Techniques as a Defensive
               Mechanism},
  booktitle = {Research in Attacks, Intrusions and Defenses - 17th International
               Symposium, {RAID} 2014, Gothenburg, Sweden, September 17-19, 2014.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8688},
  pages     = {405--425},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11379-1\_20},
  doi       = {10.1007/978-3-319-11379-1\_20},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/raid/OkhraviRC14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CarterOR14,
  author    = {Kevin M. Carter and
               Hamed Okhravi and
               James Riordan},
  title     = {Quantitative Analysis of Active Cyber Defenses Based on Temporal Platform
               Diversity},
  journal   = {CoRR},
  volume    = {abs/1401.8255},
  year      = {2014},
  url       = {http://arxiv.org/abs/1401.8255},
  archivePrefix = {arXiv},
  eprint    = {1401.8255},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/corr/CarterOR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vizsec/YuLRB10,
  author    = {Tamara Yu and
               Richard Lippmann and
               James Riordan and
               Stephen W. Boyer},
  editor    = {John Gerth},
  title     = {{EMBER:} a global perspective on extreme malicious behavior},
  booktitle = {7th International Symposium on Visualization for Cyber Security, VizSec
               '10, Ottawa, ON, Canada, September 14, 2010},
  pages     = {1--12},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/1850795.1850796},
  doi       = {10.1145/1850795.1850796},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/vizsec/YuLRB10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/BuduraBR09,
  author    = {Adriana Budura and
               Daniela Bourges{-}Waldegg and
               James Riordan},
  title     = {Deriving Expertise Profiles from Tags},
  booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational
               Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
               29-31, 2009},
  pages     = {34--41},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {https://doi.org/10.1109/CSE.2009.404},
  doi       = {10.1109/CSE.2009.404},
  timestamp = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl    = {https://dblp.org/rec/conf/cse/BuduraBR09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sruti/ZamboniRY07,
  author    = {Diego Zamboni and
               James Riordan and
               Milton Yates},
  editor    = {Steven M. Bellovin},
  title     = {Boundary Detection and Containment of Local Worm Infections},
  booktitle = {3rd Workshop on Steps to Reducing Unwanted Traffic on the Internet,
               SRUTI'07, Santa Clara, CA, USA, June 18, 2007},
  publisher = {{USENIX} Association},
  year      = {2007},
  url       = {https://www.usenix.org/conference/sruti-07/boundary-detection-and-containment-local-worm-infections},
  timestamp = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl    = {https://dblp.org/rec/conf/sruti/ZamboniRY07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/RiordanA00,
  author    = {James Riordan and
               Dominique Alessandri},
  editor    = {Herv{\'{e}} Debar and
               Ludovic M{\'{e}} and
               Shyhtsun Felix Wu},
  title     = {Target Naming and Service Apoptosis},
  booktitle = {Recent Advances in Intrusion Detection, Third International Workshop,
               {RAID} 2000, Toulouse, France, October 2-4, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1907},
  pages     = {217--226},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-39945-3\_14},
  doi       = {10.1007/3-540-39945-3\_14},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/raid/RiordanA00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/SchneierR98,
  author    = {Bruce Schneier and
               James Riordan},
  title     = {A Certified E-Mail Protocol},
  booktitle = {14th Annual Computer Security Applications Conference {(ACSAC} 1998),
               7-11 December 1998, Scottsdale, AZ, {USA}},
  pages     = {347--352},
  publisher = {{IEEE} Computer Society},
  year      = {1998},
  url       = {https://doi.org/10.1109/CSAC.1998.738655},
  doi       = {10.1109/CSAC.1998.738655},
  timestamp = {Wed, 16 Oct 2019 14:14:56 +0200},
  biburl    = {https://dblp.org/rec/conf/acsac/SchneierR98.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mas/RiordanS98,
  author    = {James Riordan and
               Bruce Schneier},
  editor    = {Giovanni Vigna},
  title     = {Environmental Key Generation Towards Clueless Agents},
  booktitle = {Mobile Agents and Security},
  series    = {Lecture Notes in Computer Science},
  volume    = {1419},
  pages     = {15--24},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/3-540-68671-1\_2},
  doi       = {10.1007/3-540-68671-1\_2},
  timestamp = {Tue, 14 May 2019 10:00:37 +0200},
  biburl    = {https://dblp.org/rec/conf/mas/RiordanS98.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics