BibTeX record conf/icccsec/ShiYLW15

download as .bib file

@inproceedings{DBLP:conf/icccsec/ShiYLW15,
  author    = {Jiangyong Shi and
               Yuexiang Yang and
               Chengye Li and
               Xiaolei Wang},
  title     = {{SPEMS:} {A} Stealthy and Practical Execution Monitoring System Based
               on {VMI}},
  booktitle = {Cloud Computing and Security - First International Conference, {ICCCS}
               2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers},
  pages     = {380--389},
  year      = {2015},
  crossref  = {DBLP:conf/icccsec/2015},
  url       = {https://doi.org/10.1007/978-3-319-27051-7\_32},
  doi       = {10.1007/978-3-319-27051-7\_32},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccsec/ShiYLW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icccsec/2015,
  editor    = {Zhiqiu Huang and
               Xingming Sun and
               Junzhou Luo and
               Jian Wang},
  title     = {Cloud Computing and Security - First International Conference, {ICCCS}
               2015, Nanjing, China, August 13-15, 2015. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9483},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-27051-7},
  doi       = {10.1007/978-3-319-27051-7},
  isbn      = {978-3-319-27050-0},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icccsec/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics