Search dblp for Publications

export results for "toc:db/conf/cybersa/cybersa2015.bht:"

 download as .bib file

@inproceedings{DBLP:conf/cybersa/AdenusiAKT15,
  author       = {Dauda Adenusi and
                  Boniface Kayode Alese and
                  Bamidele Moses Kuboye and
                  Aderonke Favour{-}Bethy Thompson},
  title        = {Development of cyber situation awareness model},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--11},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166135},
  doi          = {10.1109/CYBERSA.2015.7166135},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/AdenusiAKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/AggarwalMGPSD15,
  author       = {Palvi Aggarwal and
                  Zahid Maqbool and
                  Antra Grover and
                  V. S. Chandrasekhar Pammi and
                  Saumya Singh and
                  Varun Dutt},
  title        = {Cyber security: {A} game-theoretic analysis of defender and attacker
                  strategies in defacing-website games},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166127},
  doi          = {10.1109/CYBERSA.2015.7166127},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/AggarwalMGPSD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/AlSagriA15,
  author       = {Hatoon S. AlSagri and
                  Saad S. Alaboodi},
  title        = {Privacy awareness of online social networking in Saudi Arabia},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166111},
  doi          = {10.1109/CYBERSA.2015.7166111},
  timestamp    = {Tue, 13 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/AlSagriA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/AminIBK15,
  author       = {Ruhul Amin and
                  SK Hafizul Islam and
                  G. P. Biswas and
                  Muhammad Khurram Khan},
  title        = {An efficient remote mutual authentication scheme using smart mobile
                  phone over insecure networks},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166114},
  doi          = {10.1109/CYBERSA.2015.7166114},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cybersa/AminIBK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/BhuttoDLM15,
  author       = {Zulfiqar Bhutto and
                  Kamran Dahri and
                  Iqra Lakho and
                  Shahzad Memon},
  title        = {Social Video Streaming {(SVS):} {A} prototype application for street
                  crime reporting},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166131},
  doi          = {10.1109/CYBERSA.2015.7166131},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/BhuttoDLM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/BjerkestrandTP15,
  author       = {Therese Bjerkestrand and
                  Dimitris Tsaptsinos and
                  Eckhard Pfluegel},
  title        = {An evaluation of feature selection and reduction algorithms for network
                  {IDS} data},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166129},
  doi          = {10.1109/CYBERSA.2015.7166129},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/BjerkestrandTP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/BodeOAT15,
  author       = {Moyinoluwa Abidemi Bode and
                  Samuel Adebayo Oluwadare and
                  Boniface Kayode Alese and
                  Aderonke Favour{-}Bethy Thompson},
  title        = {Risk analysis in cyber situation awareness using Bayesian approach},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--12},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166119},
  doi          = {10.1109/CYBERSA.2015.7166119},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/BodeOAT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/ClarkePT15,
  author       = {Charles A. Clarke and
                  Eckhard Pfluegel and
                  Dimitris Tsaptsinos},
  title        = {Multi-channel overlay protocols: Implementing ad-hoc message authentication
                  in social media platforms},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166118},
  doi          = {10.1109/CYBERSA.2015.7166118},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/ClarkePT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/DahriRMD15,
  author       = {Kamran Dahri and
                  Shakeel Rajput and
                  Shahzad Memon and
                  Lachhman Das Dhomeja},
  title        = {Smart Activities Monitoring System {(SAMS)} for security applications},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166138},
  doi          = {10.1109/CYBERSA.2015.7166138},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/DahriRMD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/DehghanniriLB15,
  author       = {Hashem Dehghanniri and
                  Emmanuel Letier and
                  Herv{\'{e}} Borrion},
  title        = {Improving security decision under uncertainty: {A} multidisciplinary
                  approach},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166134},
  doi          = {10.1109/CYBERSA.2015.7166134},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/DehghanniriLB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/EnacheIS15,
  author       = {Adriana{-}Cristina Enache and
                  Mihai Ionita and
                  Valentin Sgarciu},
  title        = {An immune intelligent approach for security assurance},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166116},
  doi          = {10.1109/CYBERSA.2015.7166116},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/EnacheIS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/EvangelopoulouJ15,
  author       = {Maria Evangelopoulou and
                  Christopher W. Johnson},
  title        = {Empirical framework for situation awareness measurement techniques
                  in network defense},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166132},
  doi          = {10.1109/CYBERSA.2015.7166132},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/EvangelopoulouJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/FonteneleS15,
  author       = {Marcelo Paiva Fontenele and
                  Lily Sun},
  title        = {Talent discovery for cyber security: An organisational perspective},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166122},
  doi          = {10.1109/CYBERSA.2015.7166122},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/FonteneleS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/HallHJ15,
  author       = {Mark John Hall and
                  Devon David Hansen and
                  Kevin Jones},
  title        = {Cross-domain situational awareness and collaborative working for cyber
                  security},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166110},
  doi          = {10.1109/CYBERSA.2015.7166110},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/HallHJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/LaingV15,
  author       = {Christopher Laing and
                  Paul Vickers},
  title        = {Context informed intelligent information infrastructures for better
                  situational awareness},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166136},
  doi          = {10.1109/CYBERSA.2015.7166136},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/LaingV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/MaghrabiP15,
  author       = {Louai Maghrabi and
                  Eckhard Pfluegel},
  title        = {Moving assets to the cloud: {A} game theoretic approach based on trust},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166120},
  doi          = {10.1109/CYBERSA.2015.7166120},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/MaghrabiP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/MemonMDP15,
  author       = {Shahzad Memon and
                  Sorath Mahar and
                  Lachhman Das Dhomeja and
                  Farman Pirzado},
  title        = {Prospects and challenges for social media in Pakistan},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166124},
  doi          = {10.1109/CYBERSA.2015.7166124},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/MemonMDP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/NasirSNM15,
  author       = {Muhammad Ali Nasir and
                  Shizra Sultan and
                  Samia Nefti{-}Meziani and
                  Umar Manzoor},
  title        = {Potential cyber-attacks against global oil supply chain},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166137},
  doi          = {10.1109/CYBERSA.2015.7166137},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/NasirSNM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/NassarODB15,
  author       = {Mohamed Nassar and
                  Adel Al{-}Rahal Orabi and
                  Marwan Doha and
                  Bechara al Bouna},
  title        = {An SQL-like query tool for data anonymization and outsourcing},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--3},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166130},
  doi          = {10.1109/CYBERSA.2015.7166130},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/NassarODB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/Neogy15,
  author       = {Sarmistha Neogy},
  title        = {Security management in Wireless Sensor Networks},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166112},
  doi          = {10.1109/CYBERSA.2015.7166112},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/Neogy15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/NeogyS15,
  author       = {Sarmistha Neogy and
                  Sayantani Saha},
  title        = {Developing a secure remote patient monitoring system},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166123},
  doi          = {10.1109/CYBERSA.2015.7166123},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/NeogyS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/Onwubiko15,
  author       = {Cyril Onwubiko},
  title        = {Cyber security operations centre: Security monitoring for protecting
                  business and supporting cyber defense strategy},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--10},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166125},
  doi          = {10.1109/CYBERSA.2015.7166125},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/Onwubiko15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/PirscoveanuHLSP15,
  author       = {Radu S. Pirscoveanu and
                  Steven Strandlund Hansen and
                  Thor M. T. Larsen and
                  Matija Stevanovic and
                  Jens Myrup Pedersen and
                  Alexandre Czech},
  title        = {Analysis of Malware behavior: Type classification using machine learning},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166115},
  doi          = {10.1109/CYBERSA.2015.7166115},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/PirscoveanuHLSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/PirscoveanuHLSP15a,
  author       = {Radu S. Pirscoveanu and
                  Steven Strandlund Hansen and
                  Thor M. T. Larsen and
                  Matija Stevanovic and
                  Jens Myrup Pedersen and
                  Alexandre Czech},
  title        = {Analysis of malware behavior: Type classification using machine learning},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166128},
  doi          = {10.1109/CYBERSA.2015.7166128},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/PirscoveanuHLSP15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/RickusPA15,
  author       = {Andrius Rickus and
                  Eckhard Pfluegel and
                  Nigel Atkins},
  title        = {Chaos-based image encryption using an {AONT} mode of operation},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166113},
  doi          = {10.1109/CYBERSA.2015.7166113},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/RickusPA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/ShovgenyaST15,
  author       = {Yegor Shovgenya and
                  Florian Skopik and
                  Klaus Theuerkauf},
  title        = {On demand for situational awareness for preventing attacks on the
                  smart grid},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166133},
  doi          = {10.1109/CYBERSA.2015.7166133},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/ShovgenyaST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/SkopikWSF15,
  author       = {Florian Skopik and
                  Markus Wurzenberger and
                  Giuseppe Settanni and
                  Roman Fiedler},
  title        = {Establishing national cyber situational awareness through incident
                  information clustering},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166126},
  doi          = {10.1109/CYBERSA.2015.7166126},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/SkopikWSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/Timonen15,
  author       = {Jussi Timonen},
  title        = {Improving situational awareness of cyber physical systems based on
                  operator's goals},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166121},
  doi          = {10.1109/CYBERSA.2015.7166121},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/Timonen15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cybersa/WurzenbergerSSF15,
  author       = {Markus Wurzenberger and
                  Florian Skopik and
                  Giuseppe Settanni and
                  Roman Fiedler},
  title        = {Beyond gut instincts: Understanding, rating and comparing self-learning
                  IDSs},
  booktitle    = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  pages        = {1},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/CyberSA.2015.7166117},
  doi          = {10.1109/CYBERSA.2015.7166117},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/WurzenbergerSSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cybersa/2015,
  title        = {2015 International Conference on Cyber Situational Awareness, Data
                  Analytics and Assessment (CyberSA), London, United Kingdom, June 8-9,
                  2015},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://ieeexplore.ieee.org/xpl/conhome/7153065/proceeding},
  isbn         = {978-0-9932-3380-7},
  timestamp    = {Wed, 16 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cybersa/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}