Search dblp for Publications

export results for "toc:db/conf/cybersecurity/cybersecurity2012.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cybersecurity/AbadieW12,
  author       = {Andre Abadie and
                  Duminda Wijesekera},
  title        = {Leveraging an Inventory of the Cognitive Radio Attack Surface},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {136--143},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.24},
  doi          = {10.1109/CYBERSECURITY.2012.24},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/AbadieW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/AlEroudK12,
  author       = {Ahmed Aleroud and
                  George Karabatis},
  title        = {A Contextual Anomaly Detection Approach to Discover Zero-Day Attacks},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {40--45},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.12},
  doi          = {10.1109/CYBERSECURITY.2012.12},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/AlEroudK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/AtkinsonWBH12,
  author       = {Simon Reay Atkinson and
                  David Walker and
                  Kevin Beaulne and
                  Liaquat Hossain},
  title        = {Cyber - Transparencies, Assurance and Deterrence},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {119--126},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.22},
  doi          = {10.1109/CYBERSECURITY.2012.22},
  timestamp    = {Mon, 08 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/AtkinsonWBH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/BaumeisterDDT12,
  author       = {Todd Baumeister and
                  Yingfei Dong and
                  Zhenhai Duan and
                  Guanyu Tian},
  title        = {A Routing Table Insertion {(RTI)} Attack on Freenet},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {8--15},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.8},
  doi          = {10.1109/CYBERSECURITY.2012.8},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/BaumeisterDDT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/BayagaF12,
  author       = {Anass Bayaga and
                  Stephen Flowerday},
  title        = {Principal Causes of Information Communication Technology {(ICT)} Risk
                  Failure in an {SME}},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {152--156},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.26},
  doi          = {10.1109/CYBERSECURITY.2012.26},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/BayagaF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/DaiSLG12,
  author       = {Jun Dai and
                  Xiaoyan Sun and
                  Peng Liu and
                  Nicklaus A. Giacobe},
  title        = {Gaining Big Picture Awareness through an Interconnected Cross-Layer
                  Situation Knowledge Reference Model},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {83--92},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.18},
  doi          = {10.1109/CYBERSECURITY.2012.18},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/DaiSLG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/DolevGK12,
  author       = {Shlomi Dolev and
                  Niv Gilboa and
                  Marina Kopeetsky},
  title        = {Permanent Revocation in Attribute Based Broadcast Encryption},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {203--208},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.33},
  doi          = {10.1109/CYBERSECURITY.2012.33},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/DolevGK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/DoyalZY12,
  author       = {Alex Doyal and
                  Justin Zhan and
                  Huiming Anna Yu},
  title        = {Towards Defeating DDoS Attacks},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {209--212},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.34},
  doi          = {10.1109/CYBERSECURITY.2012.34},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/DoyalZY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/ErbacherH12,
  author       = {Robert F. Erbacher and
                  Steve E. Hutchinson},
  title        = {Extending Case-Based Reasoning to Network Alert Reporting},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {187--194},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.31},
  doi          = {10.1109/CYBERSECURITY.2012.31},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/ErbacherH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/FerebeeDW12,
  author       = {Denise Ferebee and
                  Dipankar Dasgupta and
                  Qishi Wu},
  title        = {A Cyber-Security Storm {MAP}},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {93--102},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.19},
  doi          = {10.1109/CYBERSECURITY.2012.19},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/FerebeeDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/GasiorY12,
  author       = {Wade Gasior and
                  Li Yang},
  title        = {Exploring Covert Channel in Android Platform},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {173--177},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.29},
  doi          = {10.1109/CYBERSECURITY.2012.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/GasiorY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/GiuraW12,
  author       = {Paul Giura and
                  Wei Wang},
  title        = {A Context-Based Detection Framework for Advanced Persistent Threats},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {69--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.16},
  doi          = {10.1109/CYBERSECURITY.2012.16},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/GiuraW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/HassanG12,
  author       = {Sharif Hassan and
                  Ratan Guha},
  title        = {Security and Integrity Analysis Using Indicators},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {127--135},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.23},
  doi          = {10.1109/CYBERSECURITY.2012.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/HassanG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/KanampiuZ12,
  author       = {Munene W. Kanampiu and
                  Justin Zhan},
  title        = {A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked
                  Community},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {178--186},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.30},
  doi          = {10.1109/CYBERSECURITY.2012.30},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/KanampiuZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/KishimotoOYYT12,
  author       = {Kazuya Kishimoto and
                  Kenji Ohira and
                  Yukiko Yamaguchi and
                  Hirofumi Yamaki and
                  Hiroki Takakura},
  title        = {An Adaptive Honeypot System to Capture IPv6 Address Scans},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {165--172},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.28},
  doi          = {10.1109/CYBERSECURITY.2012.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/KishimotoOYYT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/KulikovaHBP12,
  author       = {Olga Kulikova and
                  Ronald Heil and
                  Jan van den Berg and
                  Wolter Pieters},
  title        = {Cyber Crisis Management: {A} Decision-Support Framework for Disclosing
                  Security Incident Information},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {103--112},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.20},
  doi          = {10.1109/CYBERSECURITY.2012.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/KulikovaHBP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/LinS12,
  author       = {Chung{-}Wei Lin and
                  Alberto L. Sangiovanni{-}Vincentelli},
  title        = {Cyber-Security for the Controller Area Network {(CAN)} Communication
                  Protocol},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {1--7},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.7},
  doi          = {10.1109/CYBERSECURITY.2012.7},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/LinS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/NimgaonkarKG12,
  author       = {Satyajeet Nimgaonkar and
                  Srujan Kotikela and
                  Mahadevan Gomathisankaran},
  title        = {CTrust: {A} Framework for Secure and Trustworthy Application Execution
                  in Cloud Computing},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {24--31},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.10},
  doi          = {10.1109/CYBERSECURITY.2012.10},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/NimgaonkarKG12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/PatilZLR12,
  author       = {Pallavi Patil and
                  Pavol Zavarsky and
                  Dale Lindskog and
                  Ron Ruhl},
  title        = {Fault Tree Analysis of Accidental Insider Security Events},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {113--118},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.21},
  doi          = {10.1109/CYBERSECURITY.2012.21},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/PatilZLR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/RybnicekPRT12,
  author       = {Marlies Rybnicek and
                  Rainer Poisel and
                  Manfred Ruzicka and
                  Simon Tjoa},
  title        = {A Generic Approach to Critical Infrastructure Modeling and Simulation},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {144--151},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.25},
  doi          = {10.1109/CYBERSECURITY.2012.25},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/RybnicekPRT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/SanchezD12,
  author       = {Fernando Sanchez and
                  Zhenhai Duan},
  title        = {A Sender-Centric Approach to Detecting Phishing Emails},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {32--39},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.11},
  doi          = {10.1109/CYBERSECURITY.2012.11},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/SanchezD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/ShimAM12,
  author       = {Woohyun Shim and
                  Luca Allodi and
                  Fabio Massacci},
  title        = {Crime Pays If You Are Just an Average Hacker},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {62--68},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.15},
  doi          = {10.1109/CYBERSECURITY.2012.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/ShimAM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/SkrupskyMBHVZ12,
  author       = {Nazari Skrupsky and
                  Maliheh Monshizadeh and
                  Prithvi Bisht and
                  Timothy L. Hinrichs and
                  V. N. Venkatakrishnan and
                  Lenore D. Zuck},
  title        = {{WAVES:} Automatic Synthesis of Client-Side Validation Code for Web
                  Applications},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {46--53},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.13},
  doi          = {10.1109/CYBERSECURITY.2012.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/SkrupskyMBHVZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/SongMM12,
  author       = {Hanchen Song and
                  Chris Muelder and
                  Kwan{-}Liu Ma},
  title        = {Crucial Nodes Centric Visual Monitoring and Analysis of Computer Networks},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {16--23},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.9},
  doi          = {10.1109/CYBERSECURITY.2012.9},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/SongMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/VriesHBD12,
  author       = {Johannes de Vries and
                  Hans Hoogstraaten and
                  Jan van den Berg and
                  Semir Daskapan},
  title        = {Systems for Detecting Advanced Persistent Threats: {A} Development
                  Roadmap Using Intelligent Data Analysis},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {54--61},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.14},
  doi          = {10.1109/CYBERSECURITY.2012.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/VriesHBD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/ZawoadH12,
  author       = {Shams Zawoad and
                  Ragib Hasan},
  title        = {I Have the Proof: Providing Proofs of Past Data Possession in Cloud
                  Forensics},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {75--82},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.17},
  doi          = {10.1109/CYBERSECURITY.2012.17},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/ZawoadH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/ZhouLSAML12,
  author       = {Bo Zhou and
                  David Llewellyn{-}Jones and
                  Qi Shi and
                  Muhammad Asim and
                  Madjid Merabti and
                  David J. Lamb},
  title        = {A Compose Language-Based Framework for Secure Service Composition},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {195--202},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.32},
  doi          = {10.1109/CYBERSECURITY.2012.32},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/ZhouLSAML12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersecurity/Zseby12,
  author       = {Tanja Zseby},
  title        = {Is IPv6 Ready for the Smart Grid?},
  booktitle    = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  pages        = {157--164},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/CyberSecurity.2012.27},
  doi          = {10.1109/CYBERSECURITY.2012.27},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/Zseby12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersecurity/2012,
  title        = {2012 {ASE} International Conference on Cyber Security, Alexandria,
                  VA, USA, December 14-16, 2012},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/6542298/proceeding},
  isbn         = {978-1-4799-0219-4},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersecurity/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics