BibTeX records: Natalia Stakhanova

download as .bib file

@article{DBLP:journals/toit/PanSZ24,
  author       = {Bofeng Pan and
                  Natalia Stakhanova and
                  Zhongwen Zhu},
  title        = {EtherShield: Time-interval Analysis for Detection of Malicious Behavior
                  on Ethereum},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {24},
  number       = {1},
  pages        = {2:1--2:30},
  year         = {2024},
  url          = {https://doi.org/10.1145/3633514},
  doi          = {10.1145/3633514},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/PanSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/PanSR23,
  author       = {Bofeng Pan and
                  Natalia Stakhanova and
                  Suprio Ray},
  title        = {Data Provenance in Security and Privacy},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {14s},
  pages        = {323:1--323:35},
  year         = {2023},
  url          = {https://doi.org/10.1145/3593294},
  doi          = {10.1145/3593294},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/PanSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/AbazariBRSP23,
  author       = {Farzaneh Abazari and
                  Enrico Branca and
                  Norah Ridley and
                  Natalia Stakhanova and
                  Mila Dalla Preda},
  title        = {Dataset Characteristics for Reliable Code Authorship Attribution},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {1},
  pages        = {506--521},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2021.3138700},
  doi          = {10.1109/TDSC.2021.3138700},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/AbazariBRSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ZincirHeywoodBBCEIKLPSSZ23,
  author       = {Nur Zincir{-}Heywood and
                  Robert Birke and
                  Elias Bou{-}Harb and
                  Giuliano Casale and
                  Khalil El{-}Khatib and
                  Takeru Inoue and
                  Neeraj Kumar and
                  Hanan Lutfiyya and
                  Deepak Puthal and
                  Abdallah Shami and
                  Natalia Stakhanova and
                  Farhana H. Zulkernine},
  title        = {Guest Editorial: Special Section on Machine Learning and Artificial
                  Intelligence for Managing Networks, Systems, and Services - Part {II}},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {2},
  pages        = {882--889},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2023.3280230},
  doi          = {10.1109/TNSM.2023.3280230},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/ZincirHeywoodBBCEIKLPSSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KarS23,
  author       = {Animesh Kar and
                  Natalia Stakhanova},
  editor       = {Jing Deng and
                  Vladimir Kolesnikov and
                  Alexander A. Schwarzmann},
  title        = {Exploiting Android Browser},
  booktitle    = {Cryptology and Network Security - 22nd International Conference, {CANS}
                  2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14342},
  pages        = {162--185},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7563-1\_8},
  doi          = {10.1007/978-981-99-7563-1\_8},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/KarS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/NezhadianBS23,
  author       = {Fatemeh Nezhadian and
                  Enrico Branca and
                  Natalia Stakhanova},
  editor       = {Elias Athanasopoulos and
                  Bart Mennink},
  title        = {Certificate Reuse in Android Applications},
  booktitle    = {Information Security - 26th International Conference, {ISC} 2023,
                  Groningen, The Netherlands, November 15-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14411},
  pages        = {226--245},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49187-0\_12},
  doi          = {10.1007/978-3-031-49187-0\_12},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/NezhadianBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2311-00074,
  author       = {Shahrima Jannat Oishwee and
                  Natalia Stakhanova and
                  Zadia Codabux},
  title        = {Investigating Software Developers' Challenges for Android Permissions
                  in Stack Overflow},
  journal      = {CoRR},
  volume       = {abs/2311.00074},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.00074},
  doi          = {10.48550/ARXIV.2311.00074},
  eprinttype    = {arXiv},
  eprint       = {2311.00074},
  timestamp    = {Tue, 07 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-00074.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/ZincirHeywoodBBCEIKLPSSZ22,
  author       = {Nur Zincir{-}Heywood and
                  Robert Birke and
                  Elias Bou{-}Harb and
                  Giuliano Casale and
                  Khalil El{-}Khatib and
                  Takeru Inoue and
                  Neeraj Kumar and
                  Hanan Lutfiyya and
                  Deepak Puthal and
                  Abdallah Shami and
                  Natalia Stakhanova and
                  Farhana H. Zulkernine},
  title        = {Guest Editorial: Special Issue on Machine Learning and Artificial
                  Intelligence for Managing Networks, Systems, and Services - Part {I}},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {19},
  number       = {4},
  pages        = {3988--3994},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSM.2022.3227775},
  doi          = {10.1109/TNSM.2022.3227775},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/ZincirHeywoodBBCEIKLPSSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/ZendehdelKCSS22,
  author       = {Ghazale Amel Zendehdel and
                  Ratinder Kaur and
                  Inderpreet Chopra and
                  Natalia Stakhanova and
                  Erik J. Scheme},
  title        = {Automated Security Assessment Framework for Wearable BLE-enabled Health
                  Monitoring Devices},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {1},
  pages        = {14:1--14:31},
  year         = {2022},
  url          = {https://doi.org/10.1145/3448649},
  doi          = {10.1145/3448649},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/ZendehdelKCSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/NezhadianBS22,
  author       = {Zahra Nezhadian and
                  Enrico Branca and
                  Natalia Stakhanova},
  title        = {Analysis and prediction of web proxies misbehavior},
  booktitle    = {{ARES} 2022: The 17th International Conference on Availability, Reliability
                  and Security, Vienna,Austria, August 23 - 26, 2022},
  pages        = {61:1--61:11},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3538969.3544412},
  doi          = {10.1145/3538969.3544412},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/NezhadianBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/LinoyRS22,
  author       = {Shlomi Linoy and
                  Suprio Ray and
                  Natalia Stakhanova},
  title        = {Authenticated Multi-Version Index for Blockchain-based Range Queries
                  on Historical Data},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2022, Espoo,
                  Finland, August 22-25, 2022},
  pages        = {177--186},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/Blockchain55522.2022.00032},
  doi          = {10.1109/BLOCKCHAIN55522.2022.00032},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/LinoyRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/ForoughipourSAS22,
  author       = {Ardalan Foroughipour and
                  Natalia Stakhanova and
                  Farzaneh Abazari and
                  Bahman Sistany},
  editor       = {Weizhi Meng and
                  Simone Fischer{-}H{\"{u}}bner and
                  Christian Damsgaard Jensen},
  title        = {AndroClonium: Bytecode-Level Code Clone Detection for Obfuscated Android
                  Apps},
  booktitle    = {{ICT} Systems Security and Privacy Protection - 37th {IFIP} {TC} 11
                  International Conference, {SEC} 2022, Copenhagen, Denmark, June 13-15,
                  2022, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {648},
  pages        = {379--397},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-06975-8\_22},
  doi          = {10.1007/978-3-031-06975-8\_22},
  timestamp    = {Tue, 21 Jun 2022 15:17:37 +0200},
  biburl       = {https://dblp.org/rec/conf/sec/ForoughipourSAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/KarNBS22,
  author       = {Animesh Kar and
                  Andrei Natadze and
                  Enrico Branca and
                  Natalia Stakhanova},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {HTTPFuzz: Web Server Fingerprinting with {HTTP} Request Fuzzing},
  booktitle    = {Proceedings of the 19th International Conference on Security and Cryptography,
                  {SECRYPT} 2022, Lisbon, Portugal, July 11-13, 2022},
  pages        = {261--271},
  publisher    = {{SCITEPRESS}},
  year         = {2022},
  url          = {https://doi.org/10.5220/0011328900003283},
  doi          = {10.5220/0011328900003283},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secrypt/KarNBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/AbazariBNS22,
  author       = {Farzaneh Abazari and
                  Enrico Branca and
                  Evgeniya Novikova and
                  Natalia Stakhanova},
  editor       = {Fengjun Li and
                  Kaitai Liang and
                  Zhiqiang Lin and
                  Sokratis K. Katsikas},
  title        = {Language and Platform Independent Attribution of Heterogeneous Code},
  booktitle    = {Security and Privacy in Communication Networks - 18th {EAI} International
                  Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {462},
  pages        = {173--191},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25538-0\_10},
  doi          = {10.1007/978-3-031-25538-0\_10},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/AbazariBNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnm/LinoySR21,
  author       = {Shlomi Linoy and
                  Natalia Stakhanova and
                  Suprio Ray},
  title        = {De-anonymizing Ethereum blockchain smart contracts through code attribution},
  journal      = {Int. J. Netw. Manag.},
  volume       = {31},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/nem.2130},
  doi          = {10.1002/NEM.2130},
  timestamp    = {Tue, 26 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnm/LinoySR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/LinoyRS21,
  author       = {Shlomi Linoy and
                  Suprio Ray and
                  Natalia Stakhanova},
  editor       = {Yang Xiang and
                  Ziyuan Wang and
                  Honggang Wang and
                  Valtteri Niemi},
  title        = {EtherProv: Provenance-Aware Detection, Analysis, and Mitigation of
                  Ethereum Smart Contract Security Issues},
  booktitle    = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021,
                  Melbourne, Australia, December 6-8, 2021},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/Blockchain53845.2021.00014},
  doi          = {10.1109/BLOCKCHAIN53845.2021.00014},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/LinoyRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/BrancaACS21,
  author       = {Enrico Branca and
                  Farzaneh Abazari and
                  Ronald Rivera Carranza and
                  Natalia Stakhanova},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Shujun Li and
                  Radha Poovendran and
                  Herv{\'{e}} Debar and
                  Moti Yung},
  title        = {Origin Attribution of {RSA} Public Keys},
  booktitle    = {Security and Privacy in Communication Networks - 17th {EAI} International
                  Conference, SecureComm 2021, Virtual Event, September 6-9, 2021, Proceedings,
                  Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {398},
  pages        = {374--396},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90019-9\_19},
  doi          = {10.1007/978-3-030-90019-9\_19},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/BrancaACS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@misc{DBLP:data/10/AbazariBRSP21,
  author       = {Farzaneh Abazari and
                  Enrico Branca and
                  Norah Ridley and
                  Natalia Stakhanova and
                  Mila Dalla Preda},
  title        = {Github Dataset for Authorship Attribution},
  publisher    = {{IEEE} DataPort},
  year         = {2021},
  month        = oct,
  howpublished = {\url{https://doi.org/10.21227/vx0v-j232}},
  note         = {Accessed on YYYY-MM-DD.},
  url          = {https://doi.org/10.21227/vx0v-j232},
  doi          = {10.21227/VX0V-J232},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/data/10/AbazariBRSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icde/LinoyRS20,
  author       = {Shlomi Linoy and
                  Suprio Ray and
                  Natalia Stakhanova},
  title        = {Towards Eidetic Blockchain Systems with Enhanced Provenance},
  booktitle    = {36th {IEEE} International Conference on Data Engineering Workshops,
                  {ICDE} Workshops 2020, Dallas, TX, USA, April 20-24, 2020},
  pages        = {7--10},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ICDEW49219.2020.00-14},
  doi          = {10.1109/ICDEW49219.2020.00-14},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icde/LinoyRS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/KalgutkarKGSM19,
  author       = {Vaibhavi Kalgutkar and
                  Ratinder Kaur and
                  Hugo Gonzalez and
                  Natalia Stakhanova and
                  Alina Matyukhina},
  title        = {Code Authorship Attribution: Methods and Challenges},
  journal      = {{ACM} Comput. Surv.},
  volume       = {52},
  number       = {1},
  pages        = {3:1--3:36},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292577},
  doi          = {10.1145/3292577},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/KalgutkarKGSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IqbalKS19,
  author       = {Junaid Iqbal and
                  Ratinder Kaur and
                  Natalia Stakhanova},
  title        = {PoliDOM: Mitigation of {DOM-XSS} by Detection and Prevention of Unauthorized
                  {DOM} Tampering},
  booktitle    = {Proceedings of the 14th International Conference on Availability,
                  Reliability and Security, {ARES} 2019, Canterbury, UK, August 26-29,
                  2019},
  pages        = {17:1--17:10},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3339252.3339257},
  doi          = {10.1145/3339252.3339257},
  timestamp    = {Sun, 11 Aug 2019 18:58:56 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/IqbalKS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/LinoyMRLSG19,
  author       = {Shlomi Linoy and
                  Hassan Mahdikhani and
                  Suprio Ray and
                  Rongxing Lu and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {Scalable Privacy-Preserving Query Processing over Ethereum Blockchain},
  booktitle    = {{IEEE} International Conference on Blockchain, Blockchain 2019, Atlanta,
                  GA, USA, July 14-17, 2019},
  pages        = {398--404},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/Blockchain.2019.00061},
  doi          = {10.1109/BLOCKCHAIN.2019.00061},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/LinoyMRLSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cnsm/LinoySM19,
  author       = {Shlomi Linoy and
                  Natalia Stakhanova and
                  Alina Matyukhina},
  editor       = {Hanan Lutfiyya and
                  Yixin Diao and
                  Nur Zincir{-}Heywood and
                  R{\'{e}}mi Badonnel and
                  Edmundo R. M. Madeira},
  title        = {Exploring Ethereum's Blockchain Anonymity Using Smart Contract Code
                  Attribution},
  booktitle    = {15th International Conference on Network and Service Management, {CNSM}
                  2019, Halifax, NS, Canada, October 21-25, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.23919/CNSM46954.2019.9012681},
  doi          = {10.23919/CNSM46954.2019.9012681},
  timestamp    = {Fri, 08 Dec 2023 07:53:07 +0100},
  biburl       = {https://dblp.org/rec/conf/cnsm/LinoySM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/MatyukhinaSPP19,
  author       = {Alina Matyukhina and
                  Natalia Stakhanova and
                  Mila Dalla Preda and
                  Celine Perley},
  editor       = {Gail{-}Joon Ahn and
                  Bhavani Thuraisingham and
                  Murat Kantarcioglu and
                  Ram Krishnan},
  title        = {Adversarial Authorship Attribution in Open-Source Projects},
  booktitle    = {Proceedings of the Ninth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2019, Richardson, TX, USA, March 25-27,
                  2019},
  pages        = {291--302},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3292006.3300032},
  doi          = {10.1145/3292006.3300032},
  timestamp    = {Wed, 29 Jun 2022 15:37:41 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/MatyukhinaSPP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KadirSG18,
  author       = {Andi Fitriah Abdul Kadir and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {Understanding Android Financial MalwareAttacks: Taxonomy, Characterization,
                  and Challenges},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {7},
  number       = {3},
  pages        = {1--52},
  year         = {2018},
  url          = {https://doi.org/10.13052/jcsm2245-1439.732},
  doi          = {10.13052/JCSM2245-1439.732},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KadirSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/KalgutkarSCM18,
  author       = {Vaibhavi Kalgutkar and
                  Natalia Stakhanova and
                  Paul Cook and
                  Alina Matyukhina},
  editor       = {Sebastian Doerr and
                  Mathias Fischer and
                  Sebastian Schrittwieser and
                  Dominik Herrmann},
  title        = {Android authorship attribution through string analysis},
  booktitle    = {Proceedings of the 13th International Conference on Availability,
                  Reliability and Security, {ARES} 2018, Hamburg, Germany, August 27-30,
                  2018},
  pages        = {4:1--4:10},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230833.3230849},
  doi          = {10.1145/3230833.3230849},
  timestamp    = {Thu, 17 Jan 2019 22:19:51 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/KalgutkarSCM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/GonzalezSG18,
  author       = {Hugo Gonzalez and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  editor       = {Ziming Zhao and
                  Gail{-}Joon Ahn and
                  Ram Krishnan and
                  Gabriel Ghinita},
  title        = {Authorship Attribution of Android Apps},
  booktitle    = {Proceedings of the Eighth {ACM} Conference on Data and Application
                  Security and Privacy, {CODASPY} 2018, Tempe, AZ, USA, March 19-21,
                  2018},
  pages        = {277--286},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3176258.3176322},
  doi          = {10.1145/3176258.3176322},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/codaspy/GonzalezSG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/KaurLIGS18,
  author       = {Ratinder Kaur and
                  Yan Li and
                  Junaid Iqbal and
                  Hugo Gonzalez and
                  Natalia Stakhanova},
  editor       = {Sorel Reisman and
                  Sheikh Iqbal Ahamed and
                  Claudio Demartini and
                  Thomas M. Conte and
                  Ling Liu and
                  William R. Claycomb and
                  Motonori Nakamura and
                  Edmundo Tovar and
                  Stelvio Cimato and
                  Chung{-}Horng Lung and
                  Hiroki Takakura and
                  Ji{-}Jiang Yang and
                  Toyokazu Akiyama and
                  Zhiyong Zhang and
                  Kamrul Hasan},
  title        = {A Security Assessment of {HCE-NFC} Enabled E-Wallet Banking Android
                  Apps},
  booktitle    = {2018 {IEEE} 42nd Annual Computer Software and Applications Conference,
                  {COMPSAC} 2018, Tokyo, Japan, 23-27 July 2018, Volume 2},
  pages        = {492--497},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/COMPSAC.2018.10282},
  doi          = {10.1109/COMPSAC.2018.10282},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/KaurLIGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/KaurNGS18,
  author       = {Ratinder Kaur and
                  Ye Ning and
                  Hugo Gonzalez and
                  Natalia Stakhanova},
  editor       = {Kieran McLaughlin and
                  Ali A. Ghorbani and
                  Sakir Sezer and
                  Rongxing Lu and
                  Liqun Chen and
                  Robert H. Deng and
                  Paul Miller and
                  Stephen Marsh and
                  Jason R. C. Nurse},
  title        = {Unmasking Android Obfuscation Tools Using Spatial Analysis},
  booktitle    = {16th Annual Conference on Privacy, Security and Trust, {PST} 2018,
                  Belfast, Northern Ireland, Uk, August 28-30, 2018},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/PST.2018.8514207},
  doi          = {10.1109/PST.2018.8514207},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/KaurNGS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2018ssprew,
  editor       = {Jeffrey Todd McDonald and
                  S{\'{e}}bastien Bardin and
                  Natalia Stakhanova},
  title        = {Proceedings of the 8th Software Security, Protection, and Reverse
                  Engineering Workshop, San Juan, PR, USA, December 3-4, 2018},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3289239},
  doi          = {10.1145/3289239},
  isbn         = {978-1-4503-6096-8},
  timestamp    = {Fri, 21 Dec 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2018ssprew.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JaziGSG17,
  author       = {Hossein Hadian Jazi and
                  Hugo Gonzalez and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {Detecting HTTP-based application layer DoS attacks on web servers
                  in the presence of sampling},
  journal      = {Comput. Networks},
  volume       = {121},
  pages        = {25--36},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.comnet.2017.03.018},
  doi          = {10.1016/J.COMNET.2017.03.018},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/JaziGSG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/MamunRLSG16,
  author       = {Mohammad Saiful Islam Mamun and
                  Mohammad Ahmad Rathore and
                  Arash Habibi Lashkari and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  editor       = {Jiageng Chen and
                  Vincenzo Piuri and
                  Chunhua Su and
                  Moti Yung},
  title        = {Detecting Malicious URLs Using Lexical Analysis},
  booktitle    = {Network and System Security - 10th International Conference, {NSS}
                  2016, Taipei, Taiwan, September 28-30, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9955},
  pages        = {467--482},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-46298-1\_30},
  doi          = {10.1007/978-3-319-46298-1\_30},
  timestamp    = {Thu, 23 Jun 2022 19:57:36 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/MamunRLSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/GonzalezSG16,
  author       = {Hugo Gonzalez and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {Measuring code reuse in Android apps},
  booktitle    = {14th Annual Conference on Privacy, Security and Trust, {PST} 2016,
                  Auckland, New Zealand, December 12-14, 2016},
  pages        = {187--195},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/PST.2016.7906925},
  doi          = {10.1109/PST.2016.7906925},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/GonzalezSG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2016ssprew,
  editor       = {Mila Dalla Preda and
                  Natalia Stakhanova and
                  Jeffrey Todd McDonald},
  title        = {Proceedings of the 6th Workshop on Software Security, Protection,
                  and Reverse Engineering, SSPREW@ACSAC 2016, Los Angeles, California,
                  USA, December 5-6, 2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/3015135},
  doi          = {10.1145/3015135},
  isbn         = {978-1-4503-4841-6},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2016ssprew.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/MantasSGJG15,
  author       = {Georgios Mantas and
                  Natalia Stakhanova and
                  Hugo Gonzalez and
                  Hossein Hadian Jazi and
                  Ali A. Ghorbani},
  title        = {Application-layer denial of service attacks: taxonomy and survey},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {7},
  number       = {2/3/4},
  pages        = {216--239},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJICS.2015.073028},
  doi          = {10.1504/IJICS.2015.073028},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/MantasSGJG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/Gosselin-Lavigne15,
  author       = {Marc Antoine Gosselin{-}Lavigne and
                  Hugo Gonzalez and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {A Performance Evaluation of Hash Functions for {IP} Reputation Lookup
                  Using Bloom Filters},
  booktitle    = {10th International Conference on Availability, Reliability and Security,
                  {ARES} 2015, Toulouse, France, August 24-27, 2015},
  pages        = {516--521},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ARES.2015.101},
  doi          = {10.1109/ARES.2015.101},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/Gosselin-Lavigne15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/JainGS15,
  author       = {Ashutosh Jain and
                  Hugo Gonzalez and
                  Natalia Stakhanova},
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda and
                  Natalia Stakhanova},
  title        = {Enriching reverse engineering through visual exploration of Android
                  binaries},
  booktitle    = {Proceedings of the 5th Program Protection and Reverse Engineering
                  Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015},
  pages        = {9:1--9:9},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2843859.2843866},
  doi          = {10.1145/2843859.2843866},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/JainGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/GonzalezKSAG15,
  author       = {Hugo Gonzalez and
                  Andi A. Kadir and
                  Natalia Stakhanova and
                  Abdullah J. Alzahrani and
                  Ali A. Ghorbani},
  editor       = {Juan Caballero and
                  Michalis Polychronakis},
  title        = {Exploring reverse engineering symptoms in Android apps},
  booktitle    = {Proceedings of the Eighth European Workshop on System Security, EuroSec
                  2015, Bordeaux, France, April 21, 2015},
  pages        = {7:1--7:7},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2751323.2751330},
  doi          = {10.1145/2751323.2751330},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/GonzalezKSAG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/MamunGS15,
  author       = {Mohammad Saiful Islam Mamun and
                  Ali A. Ghorbani and
                  Natalia Stakhanova},
  editor       = {Sihan Qing and
                  Eiji Okamoto and
                  Kwangjo Kim and
                  Dongmei Liu},
  title        = {An Entropy Based Encrypted Traffic Classifier},
  booktitle    = {Information and Communications Security - 17th International Conference,
                  {ICICS} 2015, Beijing, China, December 9-11, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9543},
  pages        = {282--294},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-29814-6\_23},
  doi          = {10.1007/978-3-319-29814-6\_23},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/MamunGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/KadirSG15,
  author       = {Andi Fitriah Abdul Kadir and
                  Natalia Stakhanova and
                  Ali Akbar Ghorbani},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {Android Botnets: What URLs are Telling Us},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {78--91},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_6},
  doi          = {10.1007/978-3-319-25645-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/KadirSG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acsac/2015pprew,
  editor       = {Jeffrey Todd McDonald and
                  Mila Dalla Preda and
                  Natalia Stakhanova},
  title        = {Proceedings of the 5th Program Protection and Reverse Engineering
                  Workshop, PPREW@ACSAC, Los Angeles, CA, USA, December 8, 2015},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2843859},
  doi          = {10.1145/2843859},
  isbn         = {978-1-4503-3642-0},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/2015pprew.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/CazalasMAS14,
  author       = {Joshua Cazalas and
                  Jeffrey Todd McDonald and
                  Todd R. Andel and
                  Natalia Stakhanova},
  editor       = {Mila Dalla Preda and
                  Jeffrey Todd McDonald},
  title        = {Probing the Limits of Virtualized Software Protection},
  booktitle    = {Proceedings of the 4th Program Protection and Reverse Engineering
                  Workshop, PPREW@ACSAC 2014, New Orleans, LA, USA, December 9, 2014},
  pages        = {5:1--5:11},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2689702.2689707},
  doi          = {10.1145/2689702.2689707},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/CazalasMAS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SamaniJSG14,
  author       = {Elaheh Biglar Beigi Samani and
                  Hossein Hadian Jazi and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {Towards effective feature selection in machine learning-based botnet
                  detection approaches},
  booktitle    = {{IEEE} Conference on Communications and Network Security, {CNS} 2014,
                  San Francisco, CA, USA, October 29-31, 2014},
  pages        = {247--255},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/CNS.2014.6997492},
  doi          = {10.1109/CNS.2014.6997492},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SamaniJSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/GonzalezSG14,
  author       = {Hugo Gonzalez and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  editor       = {Jing Tian and
                  Jiwu Jing and
                  Mudhakar Srivatsa},
  title        = {DroidKin: Lightweight Detection of Android Apps Similarity},
  booktitle    = {International Conference on Security and Privacy in Communication
                  Networks - 10th International {ICST} Conference, SecureComm 2014,
                  Beijing, China, September 24-26, 2014, Revised Selected Papers, Part
                  {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {152},
  pages        = {436--453},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-23829-6\_30},
  doi          = {10.1007/978-3-319-23829-6\_30},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/securecomm/GonzalezSG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/virology/ChouchaneSWL13,
  author       = {Radhouane Chouchane and
                  Natalia Stakhanova and
                  Andrew Walenstein and
                  Arun Lakhotia},
  title        = {Detecting machine-morphed malware variants via engine attribution},
  journal      = {J. Comput. Virol. Hacking Tech.},
  volume       = {9},
  number       = {3},
  pages        = {137--157},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11416-013-0183-6},
  doi          = {10.1007/S11416-013-0183-6},
  timestamp    = {Fri, 13 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/virology/ChouchaneSWL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pst/2013,
  editor       = {Jordi Castell{\`{a}}{-}Roca and
                  Josep Domingo{-}Ferrer and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Ali A. Ghorbani and
                  Christian Damsgaard Jensen and
                  Jes{\'{u}}s A. Manj{\'{o}}n and
                  Iosif{-}Viorel Onut and
                  Natalia Stakhanova and
                  Vicen{\c{c}} Torra and
                  Jie Zhang},
  title        = {Eleventh Annual International Conference on Privacy, Security and
                  Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
                  July 10-12, 2013},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6589044/proceeding},
  isbn         = {978-1-4673-5839-2},
  timestamp    = {Tue, 23 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pst/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/StakhanovaSBW12,
  author       = {Natalia Stakhanova and
                  Chris Strasburg and
                  Samik Basu and
                  Johnny S. Wong},
  title        = {Towards cost-sensitive assessment of intrusion response selection},
  journal      = {J. Comput. Secur.},
  volume       = {20},
  number       = {2-3},
  pages        = {169--198},
  year         = {2012},
  url          = {https://doi.org/10.3233/JCS-2011-0436},
  doi          = {10.3233/JCS-2011-0436},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/StakhanovaSBW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/malware/StakhanovaCG11,
  author       = {Natalia Stakhanova and
                  Mathieu Couture and
                  Ali A. Ghorbani},
  title        = {Exploring network-based malware classification},
  booktitle    = {6th International Conference on Malicious and Unwanted Software, {MALWARE}
                  2011, Fajardo, Puerto Rico, USA, October 18-19, 2011},
  pages        = {14--20},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/MALWARE.2011.6112321},
  doi          = {10.1109/MALWARE.2011.6112321},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/malware/StakhanovaCG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StakhanovaBW10,
  author       = {Natalia Stakhanova and
                  Samik Basu and
                  Johnny Wong},
  title        = {On the symbiosis of specification-based and anomaly-based detection},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {253--268},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.08.007},
  doi          = {10.1016/J.COSE.2009.08.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StakhanovaBW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsmc/TavallaeeSG10,
  author       = {Mahbod Tavallaee and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  title        = {Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods},
  journal      = {{IEEE} Trans. Syst. Man Cybern. Part {C}},
  volume       = {40},
  number       = {5},
  pages        = {516--524},
  year         = {2010},
  url          = {https://doi.org/10.1109/TSMCC.2010.2048428},
  doi          = {10.1109/TSMCC.2010.2048428},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsmc/TavallaeeSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dimva/RenSG10,
  author       = {Hanli Ren and
                  Natalia Stakhanova and
                  Ali A. Ghorbani},
  editor       = {Christian Kreibich and
                  Marko Jahnke},
  title        = {An Online Adaptive Approach to Alert Correlation},
  booktitle    = {Detection of Intrusions and Malware, and Vulnerability Assessment,
                  7th International Conference, {DIMVA} 2010, Bonn, Germany, July 8-9,
                  2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6201},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14215-4\_9},
  doi          = {10.1007/978-3-642-14215-4\_9},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dimva/RenSG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosec/StakhanovaG10,
  author       = {Natalia Stakhanova and
                  Ali A. Ghorbani},
  editor       = {Manuel Costa and
                  Engin Kirda},
  title        = {Managing intrusion detection rule sets},
  booktitle    = {Proceedings of the Third European Workshop on System Security, {EUROSEC}
                  2010, Paris, France, April 13, 2010},
  pages        = {29--35},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1752046.1752051},
  doi          = {10.1145/1752046.1752051},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurosec/StakhanovaG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/StakhanovaRG10,
  author       = {Natalia Stakhanova and
                  Hanli Ren and
                  Ali A. Ghorbani},
  editor       = {Mike Burmester and
                  Gene Tsudik and
                  Spyros S. Magliveras and
                  Ivana Ilic},
  title        = {Selective Regular Expression Matching},
  booktitle    = {Information Security - 13th International Conference, {ISC} 2010,
                  Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6531},
  pages        = {226--240},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-18178-8\_20},
  doi          = {10.1007/978-3-642-18178-8\_20},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/StakhanovaRG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/StrasburgSBW09,
  author       = {Chris Strasburg and
                  Natalia Stakhanova and
                  Samik Basu and
                  Johnny S. Wong},
  editor       = {Wanqing Li and
                  Willy Susilo and
                  Udaya Kiran Tupakula and
                  Reihaneh Safavi{-}Naini and
                  Vijay Varadharajan},
  title        = {Intrusion response cost assessment methodology},
  booktitle    = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2009, Sydney, Australia, March
                  10-12, 2009},
  pages        = {388--391},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1533057.1533112},
  doi          = {10.1145/1533057.1533112},
  timestamp    = {Fri, 18 Mar 2022 11:47:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/StrasburgSBW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/StrasburgSBW09,
  author       = {Chris Strasburg and
                  Natalia Stakhanova and
                  Samik Basu and
                  Johnny S. Wong},
  editor       = {Sheikh Iqbal Ahamed and
                  Elisa Bertino and
                  Carl K. Chang and
                  Vladimir Getov and
                  Lin Liu and
                  Ming Hua and
                  Rajesh Subramanyan},
  title        = {A Framework for Cost Sensitive Assessment of Intrusion Response Selection},
  booktitle    = {Proceedings of the 33rd Annual {IEEE} International Computer Software
                  and Applications Conference, {COMPSAC} 2009, Seattle, Washington,
                  USA, July 20-24, 2009. Volume 1},
  pages        = {355--360},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/COMPSAC.2009.54},
  doi          = {10.1109/COMPSAC.2009.54},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/StrasburgSBW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/StakhanovaSG08,
  author       = {Natalia Stakhanova and
                  Oleg Stakhanov and
                  Ali A. Ghorbani},
  title        = {A Behavioral Model of Ideologically-motivated "Snowball"
                  Attacks},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {88--95},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.57},
  doi          = {10.1109/ARES.2008.57},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/StakhanovaSG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/StakhanovaSBW08,
  author       = {Natalia Stakhanova and
                  Chris Strasburg and
                  Samik Basu and
                  Johnny S. Wong},
  editor       = {Richard Lippmann and
                  Engin Kirda and
                  Ari Trachtenberg},
  title        = {On Evaluation of Response Cost for Intrusion Response Systems},
  booktitle    = {Recent Advances in Intrusion Detection, 11th International Symposium,
                  {RAID} 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5230},
  pages        = {390--391},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-87403-4\_21},
  doi          = {10.1007/978-3-540-87403-4\_21},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/StakhanovaSBW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/HelmerWSHMWWS07,
  author       = {Guy G. Helmer and
                  Johnny Wong and
                  Mark Slagell and
                  Vasant G. Honavar and
                  Les Miller and
                  Yanxin Wang and
                  Xia Wang and
                  Natalia Stakhanova},
  title        = {Software fault tree and coloured Petri net-based specification, design
                  and implementation of agent-based intrusion detection systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {109--142},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012246},
  doi          = {10.1504/IJICS.2007.012246},
  timestamp    = {Thu, 01 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/HelmerWSHMWWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijics/StakhanovaBW07,
  author       = {Natalia Stakhanova and
                  Samik Basu and
                  Johnny Wong},
  title        = {A taxonomy of intrusion response systems},
  journal      = {Int. J. Inf. Comput. Secur.},
  volume       = {1},
  number       = {1/2},
  pages        = {169--184},
  year         = {2007},
  url          = {https://doi.org/10.1504/IJICS.2007.012248},
  doi          = {10.1504/IJICS.2007.012248},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijics/StakhanovaBW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/StakhanovaBZWW07,
  author       = {Natalia Stakhanova and
                  Samik Basu and
                  Wensheng Zhang and
                  Xia Wang and
                  Johnny Wong},
  title        = {Specification Synthesis for Monitoring and Analysis of {MANET} Protocols},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {183--187},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.342},
  doi          = {10.1109/AINAW.2007.342},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/StakhanovaBZWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/StakhanovaBW07,
  author       = {Natalia Stakhanova and
                  Samik Basu and
                  Johnny Wong},
  title        = {A Cost-Sensitive Model for Preemptive Intrusion Response Systems},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), May 21-23, 2007, Niagara Falls, Canada},
  pages        = {428--435},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINA.2007.9},
  doi          = {10.1109/AINA.2007.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/StakhanovaBW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/StakhanovaBLW06,
  author       = {Natalia Stakhanova and
                  Samik Basu and
                  Robyn R. Lutz and
                  Johnny Wong},
  title        = {Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring},
  booktitle    = {Second International Symposium on Dependable Autonomic and Secure
                  Computing {(DASC} 2006), 29 September - 1 October 2006, Indianapolis,
                  Indiana, {USA}},
  pages        = {333--340},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/DASC.2006.23},
  doi          = {10.1109/DASC.2006.23},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/StakhanovaBLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/StakhanovaBWS05,
  author       = {Natalia Stakhanova and
                  Samik Basu and
                  Johnny Wong and
                  Oleg Stakhanov},
  title        = {Trust Framework for {P2P} Networks Using Peer-Profile Based Anomaly
                  Technique},
  booktitle    = {25th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2005 Workshops), 6-10 June 2005, Columbus, OH, {USA}},
  pages        = {203--209},
  publisher    = {{IEEE} Computer Society},
  year         = {2005},
  url          = {https://doi.org/10.1109/ICDCSW.2005.137},
  doi          = {10.1109/ICDCSW.2005.137},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/StakhanovaBWS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ISCApdcs/StakhanovaFWC04,
  author       = {Natalia Stakhanova and
                  Sergio Ferrero and
                  Johnny S. Wong and
                  Ying Cai},
  editor       = {David A. Bader and
                  Ashfaq A. Khokhar},
  title        = {A Reputation-based Trust Management in Peer-to-Peer Network Systems},
  booktitle    = {Proceedings of the {ISCA} 17th International Conference on Parallel
                  and Distributed Computing Systems, September 15-17, 2004, The Canterbury
                  Hotel, San Francisco, California, {USA}},
  pages        = {510--515},
  publisher    = {{ISCA}},
  year         = {2004},
  timestamp    = {Mon, 09 Aug 2021 16:35:42 +0200},
  biburl       = {https://dblp.org/rec/conf/ISCApdcs/StakhanovaFWC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics