Search dblp for Publications

export results for "stream:streams/conf/infosec:"

 download as .bib file

@inproceedings{DBLP:conf/infosec/Al-AhmadM15,
  author       = {Walid Al{-}Ahmad and
                  Basil Mohammed},
  title        = {A code of practice for effective information security risk management
                  using {COBIT} 5},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {145--151},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435520},
  doi          = {10.1109/INFOSEC.2015.7435520},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/Al-AhmadM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/AlamBKF15,
  author       = {Delwar Alam and
                  Touhid Bhuiyan and
                  Md. Alamgir Kabir and
                  Tanjila Farah},
  title        = {SQLi vulnerabilty in education sector websites of Bangladesh},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {152--157},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435521},
  doi          = {10.1109/INFOSEC.2015.7435521},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosec/AlamBKF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/AmankwaLK15,
  author       = {Eric Amankwa and
                  Marianne Loock and
                  Elmarie Kritzinger},
  title        = {Enhancing information security education and awareness: Proposed characteristics
                  for a model},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {72--77},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435509},
  doi          = {10.1109/INFOSEC.2015.7435509},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosec/AmankwaLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/CharlesP15,
  author       = {T. Charles and
                  M. Pollock},
  title        = {Digital forensic investigations at universities in South Africa},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {53--58},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435506},
  doi          = {10.1109/INFOSEC.2015.7435506},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/CharlesP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/CheribiK15,
  author       = {Haoua Cheribi and
                  Mohamed{-}Khireddine Kholladi},
  title        = {A security model for complex applications based on normative multi-agents
                  system},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {41--46},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435504},
  doi          = {10.1109/INFOSEC.2015.7435504},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/CheribiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/DarAUK15,
  author       = {Muhammad Najam Dar and
                  M. Usman Akram and
                  Anam Usman and
                  Shoab Ahmad Khan},
  title        = {{ECG} biometric identification for general population using multiresolution
                  analysis of {DWT} based features},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {5--10},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435498},
  doi          = {10.1109/INFOSEC.2015.7435498},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/DarAUK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/DoroudianATG15,
  author       = {Mostafa Doroudian and
                  Narges Arastouie and
                  Mohammad Talebi and
                  Ali Reza Ghanbarian},
  title        = {Multilayered database intrusion detection system for detecting malicious
                  behaviors in big data transaction},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {105--110},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435514},
  doi          = {10.1109/INFOSEC.2015.7435514},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/DoroudianATG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/HopkinsD15,
  author       = {Michael Hopkins and
                  Ali Dehghantanha},
  title        = {Exploit Kits: The production line of the Cybercrime economy?},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {23--27},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435501},
  doi          = {10.1109/INFOSEC.2015.7435501},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/HopkinsD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/HughesSH15,
  author       = {Kevin Hughes and
                  Adrie Stander and
                  Val A. Hooper},
  title        = {eDiscovery in South Africa and the challenges it faces},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {59--65},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435507},
  doi          = {10.1109/INFOSEC.2015.7435507},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/HughesSH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/IsongGOF15,
  author       = {Bassey Isong and
                  Naison Gasela and
                  Ifeoma U. Ohaeri and
                  Elegbeleye Femi},
  title        = {RFID-based design-theoretical framework for combating police impersonation
                  in South Africa},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {78--85},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435510},
  doi          = {10.1109/INFOSEC.2015.7435510},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/IsongGOF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/KyawCJ15,
  author       = {Ar Kar Kyaw and
                  Yuzhu Chen and
                  Justin Joseph},
  title        = {Pi-IDS: evaluation of open-source intrusion detection systems on Raspberry
                  Pi 2},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {165--170},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435523},
  doi          = {10.1109/INFOSEC.2015.7435523},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/KyawCJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/KyawSJ15,
  author       = {Ar Kar Kyaw and
                  Franco Sioquim and
                  Justin Joseph},
  title        = {Dictionary attack on Wordpress: Security and forensic analysis},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {158--164},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435522},
  doi          = {10.1109/INFOSEC.2015.7435522},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/KyawSJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/Mathonsi15,
  author       = {Topside E. Mathonsi},
  title        = {Optimized handoff and secure roaming model for wireless networks},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {134--139},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435518},
  doi          = {10.1109/INFOSEC.2015.7435518},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/Mathonsi15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/MejaeleO15,
  author       = {Lineo Mejaele and
                  Elisha Oketch Ochola},
  title        = {Analysing the impact of black hole attack on DSR-based {MANET:} The
                  hidden network destructor},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {140--144},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435519},
  doi          = {10.1109/INFOSEC.2015.7435519},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/MejaeleO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/MoorosiM15,
  author       = {Nyalleng Moorosi and
                  Vukosi Marivate},
  title        = {Privacy in mining crime data from social Media: {A} South African
                  perspective},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {171--175},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435524},
  doi          = {10.1109/INFOSEC.2015.7435524},
  timestamp    = {Mon, 16 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/MoorosiM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/MushcabG15,
  author       = {Reema Al Mushcab and
                  Pavel Gladyshev},
  title        = {The significance of different backup applications in retrieving social
                  networking forensic artifacts from Android-based mobile devices},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {66--71},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435508},
  doi          = {10.1109/INFOSEC.2015.7435508},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/MushcabG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/NjengaN15,
  author       = {Kennedy Njenga and
                  Sifiso Ndlovu},
  title        = {Mobile banking and information security risks: Demand-side predilections
                  of South African lead-users},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {86--92},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435511},
  doi          = {10.1109/INFOSEC.2015.7435511},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/NjengaN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/ParkerB15,
  author       = {Shabier Parker and
                  Jean{-}Paul Van Belle},
  title        = {Lifelogging and lifeblogging: Privacy issues and influencing factors
                  in South Africa},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {111--117},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435515},
  doi          = {10.1109/INFOSEC.2015.7435515},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/ParkerB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/ParkerOBK15,
  author       = {Fayyaadh Parker and
                  Jacques Ophoff and
                  Jean{-}Paul Van Belle and
                  Ross Karia},
  title        = {Security awareness and adoption of security controls by smartphone
                  users},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {99--104},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435513},
  doi          = {10.1109/INFOSEC.2015.7435513},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/infosec/ParkerOBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/SaadSS15,
  author       = {Mustafa Hassan Saad and
                  Ahmed Serageldin and
                  Goda Ismaeel Salama},
  title        = {Android spyware disease and medication},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {118--125},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435516},
  doi          = {10.1109/INFOSEC.2015.7435516},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/SaadSS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/SarfrazR15,
  author       = {Muhammad Sarfraz and
                  Syed M. A. J. Rizvi},
  title        = {An intelligent system for Online Signature Verification},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {17--22},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435500},
  doi          = {10.1109/INFOSEC.2015.7435500},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/SarfrazR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/ShabutDAP15,
  author       = {Antesar M. Shabut and
                  Keshav P. Dahal and
                  Irfan Awan and
                  Zeeshan Pervez},
  title        = {Route optimasation based on multidimensional trust evaluation model
                  in mobile ad hoc networks},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {28--34},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435502},
  doi          = {10.1109/INFOSEC.2015.7435502},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/ShabutDAP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/ShangWZQ15,
  author       = {Wenli Shang and
                  Ming Wan and
                  Peng Zeng and
                  Quansheng Qiao},
  title        = {Research on self-learning method on generation and optimization of
                  industrial firewall rules},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {47--52},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435505},
  doi          = {10.1109/INFOSEC.2015.7435505},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/ShangWZQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/TahirA15,
  author       = {Madiha Tahir and
                  M. Usman Akram},
  title        = {Online signature verification using hybrid features},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {11--16},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435499},
  doi          = {10.1109/INFOSEC.2015.7435499},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/TahirA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/VuurenKM15,
  author       = {Ileen E. van Vuuren and
                  Elmarie Kritzinger and
                  Conrad Mueller},
  title        = {Identifying gaps in {IT} retail Information Security policy implementation
                  processes},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {126--133},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435517},
  doi          = {10.1109/INFOSEC.2015.7435517},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/VuurenKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/WaheedAWS15,
  author       = {Zahra Waheed and
                  M. Usman Akram and
                  Amna Waheed and
                  Arslan Shaukat},
  title        = {Robust extraction of blood vessels for retinal recognition},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435497},
  doi          = {10.1109/INFOSEC.2015.7435497},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/WaheedAWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/WalazaLK15,
  author       = {Mvelo Walaza and
                  Marianne Loock and
                  Elmarie Kritzinger},
  title        = {A pragmatic approach towards the integration of {ICT} security awareness
                  into the South African education system},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {35--40},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435503},
  doi          = {10.1109/INFOSEC.2015.7435503},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/WalazaLK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infosec/ZhuJ15,
  author       = {Ruilin Zhu and
                  Lech J. Janczewski},
  title        = {Typology of information systems security research: {A} methodological
                  perspective},
  booktitle    = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  pages        = {93--98},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/InfoSec.2015.7435512},
  doi          = {10.1109/INFOSEC.2015.7435512},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/ZhuJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/infosec/2015,
  title        = {2015 Second International Conference on Information Security and Cyber
                  Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17,
                  2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7431308/proceeding},
  isbn         = {978-1-4673-6988-6},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infosec/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics