Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/cybersecurity/cybersecurity2012.bht:"
@inproceedings{DBLP:conf/cybersecurity/AbadieW12, author = {Andre Abadie and Duminda Wijesekera}, title = {Leveraging an Inventory of the Cognitive Radio Attack Surface}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {136--143}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.24}, doi = {10.1109/CYBERSECURITY.2012.24}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/AbadieW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/AlEroudK12, author = {Ahmed Aleroud and George Karabatis}, title = {A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {40--45}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.12}, doi = {10.1109/CYBERSECURITY.2012.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/AlEroudK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/AtkinsonWBH12, author = {Simon Reay Atkinson and David Walker and Kevin Beaulne and Liaquat Hossain}, title = {Cyber - Transparencies, Assurance and Deterrence}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {119--126}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.22}, doi = {10.1109/CYBERSECURITY.2012.22}, timestamp = {Mon, 08 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecurity/AtkinsonWBH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/BaumeisterDDT12, author = {Todd Baumeister and Yingfei Dong and Zhenhai Duan and Guanyu Tian}, title = {A Routing Table Insertion {(RTI)} Attack on Freenet}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {8--15}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.8}, doi = {10.1109/CYBERSECURITY.2012.8}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/BaumeisterDDT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/BayagaF12, author = {Anass Bayaga and Stephen Flowerday}, title = {Principal Causes of Information Communication Technology {(ICT)} Risk Failure in an {SME}}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {152--156}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.26}, doi = {10.1109/CYBERSECURITY.2012.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/BayagaF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/DaiSLG12, author = {Jun Dai and Xiaoyan Sun and Peng Liu and Nicklaus A. Giacobe}, title = {Gaining Big Picture Awareness through an Interconnected Cross-Layer Situation Knowledge Reference Model}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {83--92}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.18}, doi = {10.1109/CYBERSECURITY.2012.18}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/DaiSLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/DolevGK12, author = {Shlomi Dolev and Niv Gilboa and Marina Kopeetsky}, title = {Permanent Revocation in Attribute Based Broadcast Encryption}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {203--208}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.33}, doi = {10.1109/CYBERSECURITY.2012.33}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/DolevGK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/DoyalZY12, author = {Alex Doyal and Justin Zhan and Huiming Anna Yu}, title = {Towards Defeating DDoS Attacks}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {209--212}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.34}, doi = {10.1109/CYBERSECURITY.2012.34}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/DoyalZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/ErbacherH12, author = {Robert F. Erbacher and Steve E. Hutchinson}, title = {Extending Case-Based Reasoning to Network Alert Reporting}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {187--194}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.31}, doi = {10.1109/CYBERSECURITY.2012.31}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/ErbacherH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/FerebeeDW12, author = {Denise Ferebee and Dipankar Dasgupta and Qishi Wu}, title = {A Cyber-Security Storm {MAP}}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {93--102}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.19}, doi = {10.1109/CYBERSECURITY.2012.19}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/FerebeeDW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/GasiorY12, author = {Wade Gasior and Li Yang}, title = {Exploring Covert Channel in Android Platform}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {173--177}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.29}, doi = {10.1109/CYBERSECURITY.2012.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/GasiorY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/GiuraW12, author = {Paul Giura and Wei Wang}, title = {A Context-Based Detection Framework for Advanced Persistent Threats}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {69--74}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.16}, doi = {10.1109/CYBERSECURITY.2012.16}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/GiuraW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/HassanG12, author = {Sharif Hassan and Ratan Guha}, title = {Security and Integrity Analysis Using Indicators}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {127--135}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.23}, doi = {10.1109/CYBERSECURITY.2012.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/HassanG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/KanampiuZ12, author = {Munene W. Kanampiu and Justin Zhan}, title = {A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {178--186}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.30}, doi = {10.1109/CYBERSECURITY.2012.30}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/KanampiuZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/KishimotoOYYT12, author = {Kazuya Kishimoto and Kenji Ohira and Yukiko Yamaguchi and Hirofumi Yamaki and Hiroki Takakura}, title = {An Adaptive Honeypot System to Capture IPv6 Address Scans}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {165--172}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.28}, doi = {10.1109/CYBERSECURITY.2012.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/KishimotoOYYT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/KulikovaHBP12, author = {Olga Kulikova and Ronald Heil and Jan van den Berg and Wolter Pieters}, title = {Cyber Crisis Management: {A} Decision-Support Framework for Disclosing Security Incident Information}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {103--112}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.20}, doi = {10.1109/CYBERSECURITY.2012.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/KulikovaHBP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/LinS12, author = {Chung{-}Wei Lin and Alberto L. Sangiovanni{-}Vincentelli}, title = {Cyber-Security for the Controller Area Network {(CAN)} Communication Protocol}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {1--7}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.7}, doi = {10.1109/CYBERSECURITY.2012.7}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/LinS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/NimgaonkarKG12, author = {Satyajeet Nimgaonkar and Srujan Kotikela and Mahadevan Gomathisankaran}, title = {CTrust: {A} Framework for Secure and Trustworthy Application Execution in Cloud Computing}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {24--31}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.10}, doi = {10.1109/CYBERSECURITY.2012.10}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/NimgaonkarKG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/PatilZLR12, author = {Pallavi Patil and Pavol Zavarsky and Dale Lindskog and Ron Ruhl}, title = {Fault Tree Analysis of Accidental Insider Security Events}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {113--118}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.21}, doi = {10.1109/CYBERSECURITY.2012.21}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/PatilZLR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/RybnicekPRT12, author = {Marlies Rybnicek and Rainer Poisel and Manfred Ruzicka and Simon Tjoa}, title = {A Generic Approach to Critical Infrastructure Modeling and Simulation}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {144--151}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.25}, doi = {10.1109/CYBERSECURITY.2012.25}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/RybnicekPRT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/SanchezD12, author = {Fernando Sanchez and Zhenhai Duan}, title = {A Sender-Centric Approach to Detecting Phishing Emails}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {32--39}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.11}, doi = {10.1109/CYBERSECURITY.2012.11}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/SanchezD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/ShimAM12, author = {Woohyun Shim and Luca Allodi and Fabio Massacci}, title = {Crime Pays If You Are Just an Average Hacker}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {62--68}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.15}, doi = {10.1109/CYBERSECURITY.2012.15}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/ShimAM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/SkrupskyMBHVZ12, author = {Nazari Skrupsky and Maliheh Monshizadeh and Prithvi Bisht and Timothy L. Hinrichs and V. N. Venkatakrishnan and Lenore D. Zuck}, title = {{WAVES:} Automatic Synthesis of Client-Side Validation Code for Web Applications}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {46--53}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.13}, doi = {10.1109/CYBERSECURITY.2012.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/SkrupskyMBHVZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/SongMM12, author = {Hanchen Song and Chris Muelder and Kwan{-}Liu Ma}, title = {Crucial Nodes Centric Visual Monitoring and Analysis of Computer Networks}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {16--23}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.9}, doi = {10.1109/CYBERSECURITY.2012.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/SongMM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/VriesHBD12, author = {Johannes de Vries and Hans Hoogstraaten and Jan van den Berg and Semir Daskapan}, title = {Systems for Detecting Advanced Persistent Threats: {A} Development Roadmap Using Intelligent Data Analysis}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {54--61}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.14}, doi = {10.1109/CYBERSECURITY.2012.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/VriesHBD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/ZawoadH12, author = {Shams Zawoad and Ragib Hasan}, title = {I Have the Proof: Providing Proofs of Past Data Possession in Cloud Forensics}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {75--82}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.17}, doi = {10.1109/CYBERSECURITY.2012.17}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/ZawoadH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/ZhouLSAML12, author = {Bo Zhou and David Llewellyn{-}Jones and Qi Shi and Muhammad Asim and Madjid Merabti and David J. Lamb}, title = {A Compose Language-Based Framework for Secure Service Composition}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {195--202}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.32}, doi = {10.1109/CYBERSECURITY.2012.32}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecurity/ZhouLSAML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cybersecurity/Zseby12, author = {Tanja Zseby}, title = {Is IPv6 Ready for the Smart Grid?}, booktitle = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, pages = {157--164}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/CyberSecurity.2012.27}, doi = {10.1109/CYBERSECURITY.2012.27}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cybersecurity/Zseby12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/cybersecurity/2012, title = {2012 {ASE} International Conference on Cyber Security, Alexandria, VA, USA, December 14-16, 2012}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6542298/proceeding}, isbn = {978-1-4799-0219-4}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cybersecurity/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.